diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2011-10-05 05:48:44 -0400 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2011-10-05 05:48:44 -0400 |
commit | 57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334 (patch) | |
tree | ad0c5049fbc42369485fa6ced38a8c9bd48793ed | |
parent | Add targets. (diff) | |
download | CVE-2011-1485-57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334.tar.xz CVE-2011-1485-57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334.zip |
Fix patch date.
-rw-r--r-- | polkit-pwnage.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/polkit-pwnage.c b/polkit-pwnage.c index 6f513b7..4552059 100644 --- a/polkit-pwnage.c +++ b/polkit-pwnage.c @@ -55,7 +55,7 @@ * ** Targets ** * This exploit is known to work on polkit-1 <= 0.101. However, Ubuntu, which * as of writing uses 0.101, has backported 0.102's bug fix. A way to check - * this is by looking at the mtime of /usr/bin/pkexec -- April 22, 2011 or + * this is by looking at the mtime of /usr/bin/pkexec -- April 19, 2011 or * later and you're out of luck. It's likely other distributions do the same. * Fortunately, this exploit is clean enough that you can try it out without * too much collateral. |