me
/
guix
Archived
1
0
Fork 0

news: Update erratum for '--keep-failed' vulnerability.

* etc/news.scm: Change commit to behave in a (hopefully) more expected
manner.  Change http:// to https:// URL whilst here.
master
Tobias Geerinckx-Rice 2021-03-18 22:13:52 +01:00
parent f62633a527
commit 79f9091b0f
No known key found for this signature in database
GPG Key ID: 0DB0FF884F556D79
1 changed files with 2 additions and 2 deletions

View File

@ -20,7 +20,7 @@
(channel-news (channel-news
(version 0) (version 0)
(entry (commit "ec7fb669945bfb47c5e1fdf7de3a5d07f7002ccf") (entry (commit "9ade2b720af91acecf76278b4d9b99ace406781e")
(title (title
(en "Update on previous @command{guix-daemon} local privilege escalation")) (en "Update on previous @command{guix-daemon} local privilege escalation"))
(body (body
@ -33,7 +33,7 @@ This is not entirely correct. Exploiting the bug on such systems is harder,
but not impossible. To avoid unpleasant surprises, all users are advised to but not impossible. To avoid unpleasant surprises, all users are advised to
upgrade @command{guix-daemon}. Run @command{info \"(guix) Upgrading Guix\"} upgrade @command{guix-daemon}. Run @command{info \"(guix) Upgrading Guix\"}
for info on how to do that. See for info on how to do that. See
@uref{http://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/} @uref{https://guix.gnu.org/en/blog/2021/risk-of-local-privilege-escalation-via-guix-daemon/}
for more information on this bug."))) for more information on this bug.")))
(entry (commit "ec7fb669945bfb47c5e1fdf7de3a5d07f7002ccf") (entry (commit "ec7fb669945bfb47c5e1fdf7de3a5d07f7002ccf")