This is polkit 0.116. Highlights: Fix of CVE-2018-19788, high UIDs caused overflow in polkit; Fix of CVE-2019-6133, kernel vulnerability (Slowfork) allowed local privilege escalation. Changes since polkit 0.115: Kyle Walker: Leaking zombie child processes Jan Rybar: Possible resource leak found by static analyzer Output messages tuneup Sanity fixes pkttyagent tty echo disabled on SIGINT Ray Strode: HACKING: add link to Code of Conduct Philip Withnall: polkitbackend: comment typos fix Zbigniew Jędrzejewski-Szmek: configure.ac: fix detection of systemd with cgroups v2 CVE-2018-19788 High UIDs overflow fix Colin Walters: CVE-2019-6133 Slowfork vulnerability fix Matthew Leeds: Allow unset process-uid Emmanuele Bassi Port the JS authority to mozjs-60 Göran Uddeborg: Use JS_EncodeStringToUTF8 Many thanks to all contributors! Jan Rybar et al., April 25, 2019
15 lines
1.2 KiB
Text
15 lines
1.2 KiB
Text
$NetBSD: distinfo,v 1.10 2020/04/05 06:14:07 wiz Exp $
|
|
|
|
SHA1 (polkit-0.116.tar.gz) = 7fafbf4d2b9a308ad4ad3a174b01970b78c09eea
|
|
RMD160 (polkit-0.116.tar.gz) = 2cbf1170514cd2d4c2bac82927bc2669990b28e1
|
|
SHA512 (polkit-0.116.tar.gz) = b66b01cc2bb4349de70147f41f161f0f6f41e7230b581dfb054058b48969ec57041ab05b51787c749ccfc36aa5f317952d7e7ba337b4f6f6c0a923ed5866c2d5
|
|
Size (polkit-0.116.tar.gz) = 1548311 bytes
|
|
SHA1 (patch-src_polkit_polkitunixprocess.c) = 88818b7b64502f64eade34ad379c07f2b0fd1aea
|
|
SHA1 (patch-src_polkitbackend_polkitbackendinteractiveauthority.c) = dd91b4e74e6c39f24e0f5a9b3150fdac12899cb5
|
|
SHA1 (patch-src_polkitbackend_polkitbackendjsauthority.cpp) = 432a3d7d082ba6e596ba164d91408fc521b84422
|
|
SHA1 (patch-src_polkitbackend_polkitd.c) = b8e11b40e2b171d4f030eb4c4cbc6fdc7a96b2c2
|
|
SHA1 (patch-src_programs_pkexec.c) = bfc0414c7a943c8e8b8412566a2519198eab8abd
|
|
SHA1 (patch-src_programs_pkttyagent.c) = 2c249b61501a1ad2c077bc83fd497e45f2db69a8
|
|
SHA1 (patch-test_mocklib_src_netdb.c) = 0fe71068a6261d5e2c8874f2b4507e7e3c002526
|
|
SHA1 (patch-test_mocklibc_src_grp.c) = 435ff94fd4c7f5511d74d03839fad453dd841633
|
|
SHA1 (patch-test_mocklibc_src_pwd.c) = c65b02209db1bd1d531444026822fcca73d5027a
|