Summary: | <sys-auth/polkit-0.116: Start time bypass (CVE-2019-6133) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ajak, freedesktop-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
sys-auth/polkit-0.116-r1
|
Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2020-04-16 13:28:01 UTC
@maintainer(s), please advise if ready for stabilisation or call yourself I guess it will be fine. sparc stable amd64 stable arm stable ppc stable ppc64 stable x86 stable arm64 stable @s390: ping GLSA vote: no! s390: ping Please cleanup. Dropping s390. Resetting sanity check; keywords are not fully specified and arches are not CC-ed. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1bed18530dc535caec4a9fbfe2f9c4de9ac3d730 commit 1bed18530dc535caec4a9fbfe2f9c4de9ac3d730 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2020-10-04 15:58:22 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2020-10-04 15:58:22 +0000 sys-auth/polkit: Cleanup vulnerable 0.115-r4 Bug: https://bugs.gentoo.org/717712 Package-Manager: Portage-3.0.8, Repoman-3.0.1 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> sys-auth/polkit/Manifest | 1 - sys-auth/polkit/files/CVE-2018-19788.patch | 339 --------------------- .../files/polkit-0.115-spidermonkey-60.patch | 180 ----------- sys-auth/polkit/polkit-0.115-r4.ebuild | 144 --------- 4 files changed, 664 deletions(-) Thank you! |