aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2011-10-05 05:48:44 -0400
committerJason A. Donenfeld <Jason@zx2c4.com>2011-10-05 05:48:44 -0400
commit57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334 (patch)
treead0c5049fbc42369485fa6ced38a8c9bd48793ed
parentAdd targets. (diff)
downloadCVE-2011-1485-57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334.tar.xz
CVE-2011-1485-57d183137dbd5f6a0214ba1ccbd2be3f5eaa5334.zip
Fix patch date.
-rw-r--r--polkit-pwnage.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/polkit-pwnage.c b/polkit-pwnage.c
index 6f513b7..4552059 100644
--- a/polkit-pwnage.c
+++ b/polkit-pwnage.c
@@ -55,7 +55,7 @@
* ** Targets **
* This exploit is known to work on polkit-1 <= 0.101. However, Ubuntu, which
* as of writing uses 0.101, has backported 0.102's bug fix. A way to check
- * this is by looking at the mtime of /usr/bin/pkexec -- April 22, 2011 or
+ * this is by looking at the mtime of /usr/bin/pkexec -- April 19, 2011 or
* later and you're out of luck. It's likely other distributions do the same.
* Fortunately, this exploit is clean enough that you can try it out without
* too much collateral.