Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix arbitrary execution via dbus security flaw #2017

Merged
merged 1 commit into from
Jan 27, 2022

Conversation

Davidy22
Copy link
Collaborator

@Davidy22 Davidy22 commented Jan 21, 2022

Highlighted in and fixes #1796. Also removed comments that won't be true or relevant with this change. These changes orphan the execute_command_by_uuid() method, but the method can probably still be used elsewhere, maybe given a command line flag like what execute_command() has.

Highlighted in Guake#1796. Also removed comments that won't be true or relevant with this change. These changes orphan the execute_command_by_uuid() method, but the method can probably still be used elsewhere.
@Davidy22
Copy link
Collaborator Author

@gsemet, it really doesn't look like the pull request hook works the way you said it does. Looks a lot to me like CI isn't being run on pull requests.

@gsemet
Copy link
Member

gsemet commented Jan 22, 2022

Ok i will check it

@Davidy22
Copy link
Collaborator Author

CI didn't run on this because of the issue, but it does pass on the repo this is being made from

@gsemet gsemet merged commit b769b3a into Guake:master Jan 27, 2022
@Davidy22 Davidy22 deleted the security branch January 27, 2022 06:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants