Date: Wed, 26 Jan 2022 23:05:56 +0000 From: bugzilla-noreply@freebsd.org To: desktop@FreeBSD.org Subject: [Bug 261482] sysutils/polkit: Add upstream fix for CVE-2021-4034 "pwnkit" security vulnerability Message-ID: <bug-261482-39348-O28PtM4C03@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-261482-39348@https.bugs.freebsd.org/bugzilla/> References: <bug-261482-39348@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261482 --- Comment #4 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/ports/commit/?id=3D7e3378fc941d3710b4d864e3fffa0c7= 8004b0632 commit 7e3378fc941d3710b4d864e3fffa0c78004b0632 Author: Adriaan de Groot <adridg@FreeBSD.org> AuthorDate: 2022-01-26 23:02:41 +0000 Commit: Adriaan de Groot <adridg@FreeBSD.org> CommitDate: 2022-01-26 23:05:01 +0000 security/vuxml: notify polkit local-privilege-escalation It was unclear if the actual explot would work on FreeBSD, since there's no GNU libc which the payload would work on. The following changes are / have been applied: - fix in polkit from upstream (from Greg V) - at kernel level, fixes to disallow argc=3D=3D0 (from kevans, I think) PR: 261482 security/vuxml/vuln-2022.xml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-261482-39348-O28PtM4C03>