Package: policykit-1
Version: 0.105-3+nmu1
Severity: important
Tags: security pending
X-Debbugs-Cc: secur...@debian.org
Security team: Do you want to do a DSA for this, or should this just be a
stable-update?
I've uploaded policykit-1/0.105-21 with a backport of the patch, but I'd
appreciate a ch
policykit-1_0.105-21_source.changes uploaded successfully to localhost
along with the files:
policykit-1_0.105-21.dsc
policykit-1_0.105-21.debian.tar.xz
policykit-1_0.105-21_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 11 Jul 2018 12:21:07 +0100
with message-id <2018072107.ga4...@espresso.pseudorandom.co.uk>
and subject line Re: Bug#903563: polkit: CVE-2018-1116: polkitd trusting
client-supplied UID allows spoofed authentication dialogs
has caused the Debian Bug report #903563,
regard
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 11 Jul 2018 09:29:32 +0100
Source: policykit-1
Binary: policykit-1 policykit-1-doc libpolkit-gobject-1-0
libpolkit-gobject-1-dev libpolkit-agent-1-0 libpolkit-agent-1-dev
libpolkit-backend-1-0 libpolkit-backend-1
volume-key_0.3.10-1_source.changes uploaded successfully to localhost
along with the files:
volume-key_0.3.10-1.dsc
volume-key_0.3.10.orig.tar.xz
volume-key_0.3.10-1.debian.tar.xz
volume-key_0.3.10-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debia
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 11 Jul 2018 16:45:13 +0200
Source: volume-key
Binary: libvolume-key1 libvolume-key-dev volume-key
Architecture: source
Version: 0.3.10-1
Distribution: unstable
Urgency: medium
Maintainer: Utopia Maintenance Team
cockpit_172-1_source.changes uploaded successfully to localhost
along with the files:
cockpit_172-1.dsc
cockpit_172.orig.tar.xz
cockpit_172-1.debian.tar.xz
cockpit_172-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
__
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 11 Jul 2018 15:15:07 +
Source: cockpit
Binary: cockpit cockpit-bridge cockpit-dashboard cockpit-doc cockpit-docker
cockpit-machines cockpit-networkmanager cockpit-packagekit cockpit-storaged
cockpit-system co
policykit-1_0.115-1_source.changes uploaded successfully to localhost
along with the files:
policykit-1_0.115-1.dsc
policykit-1_0.115.orig.tar.gz
policykit-1_0.115.orig.tar.gz.asc
policykit-1_0.115-1.debian.tar.xz
policykit-1_0.115-1_source.buildinfo
Greetings,
Your Debian queue
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 11 Jul 2018 12:24:20 +0100
Source: policykit-1
Binary: policykit-1 policykit-1-doc libpolkit-gobject-1-0
libpolkit-gobject-1-dev libpolkit-agent-1-0 libpolkit-agent-1-dev
gir1.2-polkit-1.0
Architecture: source
Ve
Your message dated Wed, 11 Jul 2018 19:38:26 +
with message-id
and subject line Bug#903563: fixed in policykit-1 0.115-1
has caused the Debian Bug report #903563,
regarding polkit: CVE-2018-1116: polkitd trusting client-supplied UID allows
spoofed authentication dialogs
to be marked as done.
Good morning,
the promlem is not only openvpn related, I have the same with a cisco
anyconnect VPN using also network-manager-openconnect.
Rolling back to 1.10.8-1 works just to bring the tunnel back up.
Greetings
--
I'm just a placeholder for a really awesome signature...
...that is still miss
12 matches
Mail list logo