Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jan 2022 23:05:56 +0000
From:      bugzilla-noreply@freebsd.org
To:        desktop@FreeBSD.org
Subject:   [Bug 261482] sysutils/polkit: Add upstream fix for CVE-2021-4034 "pwnkit" security vulnerability
Message-ID:  <bug-261482-39348-O28PtM4C03@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-261482-39348@https.bugs.freebsd.org/bugzilla/>
References:  <bug-261482-39348@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261482

--- Comment #4 from commit-hook@FreeBSD.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/ports/commit/?id=3D7e3378fc941d3710b4d864e3fffa0c7=
8004b0632

commit 7e3378fc941d3710b4d864e3fffa0c78004b0632
Author:     Adriaan de Groot <adridg@FreeBSD.org>
AuthorDate: 2022-01-26 23:02:41 +0000
Commit:     Adriaan de Groot <adridg@FreeBSD.org>
CommitDate: 2022-01-26 23:05:01 +0000

    security/vuxml: notify polkit local-privilege-escalation

    It was unclear if the actual explot would work on FreeBSD,
    since there's no GNU libc which the payload would work on.
    The following changes are / have been applied:
    - fix in polkit from upstream (from Greg V)
    - at kernel level, fixes to disallow argc=3D=3D0 (from kevans, I think)

    PR:     261482

 security/vuxml/vuln-2022.xml | 29 +++++++++++++++++++++++++++++
 1 file changed, 29 insertions(+)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-261482-39348-O28PtM4C03>