Devuan bug report logs - #658
policykit-1: CVE-2021-4034

version graph

Package: policykit-1; Maintainer for policykit-1 is Devuan Dev Team <devuan-dev@lists.dyne.org>; Source for policykit-1 is src:policykit-1.

Reported by: Dimitris <dimitris@stinpriza.org>

Date: Wed, 26 Jan 2022 10:26:01 UTC

Severity: critical

Found in version 0.105-31+devuan1

Fixed in versions 0.105-31.1+devuan1, 0.105-25+devuan0~bpo2+2, 0.105-31+devuan2, 0.105-25+devuan9

Done: Mark Hindley <mark@hindley.org.uk>

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#658: policykit-1: CVE-2021-4034
Reply-To: Dimitris <dimitris@stinpriza.org>, 658@bugs.devuan.org
Resent-From: Dimitris <dimitris@stinpriza.org>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: dimitris@stinpriza.org, Devuan Dev Team <devuan-dev@lists.dyne.org>
X-Loop: owner@bugs.devuan.org
Resent-Date: Wed, 26 Jan 2022 10:26:01 +0000
Resent-Message-ID: <handler.658.B.164319273526496@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: report 658
X-Devuan-PR-Package: policykit-1
X-Devuan-PR-Keywords: 
Received: via spool by submit@bugs.devuan.org id=B.164319273526496
          (code B); Wed, 26 Jan 2022 10:26:01 +0000
Received: (at submit) by bugs.devuan.org; 26 Jan 2022 10:25:35 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 10:25:35 +0000 (UTC)
Received: from cacofonix.stinpriza.org (cacofonix.stinpriza.org [148.251.45.81])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 562386617D6
	for <submit@bugs.devuan.org>; Wed, 26 Jan 2022 11:24:31 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=stinpriza.org header.i=@stinpriza.org header.b="dWMmA0AS";
	dkim-atps=neutral
Received: from [192.168.0.102] (unknown [45.153.183.197])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by cacofonix.stinpriza.org (Postfix) with ESMTPSA id 0D0B32A42F31
	for <submit@bugs.devuan.org>; Wed, 26 Jan 2022 12:24:29 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=stinpriza.org; s=mail;
	t=1643192670; bh=FZxlfPOwbgQpABLC9Mo7GDP1x2d2YcDISmp/X7oakt4=;
	h=Date:To:From:Subject:From;
	b=dWMmA0ASZzzgkJ0J99tShgbE8oe41DMxochT9hXgDcnyxZ7/BDGQgd4442XfR3tHF
	 jMMiWCtdXzHGanCnA1yCg1dDVr6tQDcGbilD39GJotS3354g/3TFj7iVeskuLi7EeZ
	 zoRUODjymee+A9pXYkO+YwNTahlD0WTQlLRtogQI3PU03t6GhA/cy5sxv61kFLGFc6
	 UZFsYL5hs/jcrOTl+6QOueZvkZtiR8aNsIgJq2RiEJ0v3jDHuAcB8YMnP3T+WxweFR
	 QmGl2euzMihNvWR0FTTckPk6a8yKtAi3d9J0WVhzJYSW8JGanyMcK5D5WC4Z05JyUY
	 Pic0ukiZxSOLQ==
Message-ID: <40c391db-619c-579c-c077-3360f12400d3@stinpriza.org>
Date: Wed, 26 Jan 2022 12:24:28 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.1
Content-Language: en-US
To: Devuan Bug Tracking System <submit@bugs.devuan.org>
From: Dimitris <dimitris@stinpriza.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.11 (cacofonix.stinpriza.org [0.0.0.0]); Wed, 26 Jan 2022 12:24:30 +0200 (EET)
X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_BLOCKED
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org
Package: policykit-1
Version: 0.105-31+devuan1
Severity: critical
Tags: security
Justification: root security hole
X-Debbugs-Cc: dimitris@stinpriza.org

hey,

just a heads up on a very recent vulnerability found in polkit. a Local 
Privilege Escalation in polkit's pkexec (CVE-2021-4034). fixed in some 
versions in debian, probably devuan needs to address this too.

links :
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://security-tracker.debian.org/tracker/CVE-2021-4034

thanks in advance,
d.


-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 5 (daedalus/ceres)
Release:	5
Codename:	daedalus ceres
Architecture: x86_64

Kernel: Linux 5.16.2-xanmod1 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=el_GR.UTF-8, LC_CTYPE=el_GR.UTF-8 (charmap=UTF-8), LANGUAGE 
not set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Versions of packages policykit-1 depends on:
ii  dbus                                                   1.12.20-3+devuan3
ii  libc6                                                  2.33-4
ii  libelogind0                                            246.10-3
ii  libexpat1                                              2.4.3-2
ii  libglib2.0-0                                           2.70.2-1
ii  libpam-elogind [logind]                                246.10-3
ii  libpam0g                                               1.4.0-11
ii  libpolkit-agent-1-0                                    0.105-31+devuan1
ii  libpolkit-gobject-1-0                                  0.105-31+devuan1
ii  libpolkit-gobject-elogind-1-0 [libpolkit-gobject-1-0]  0.105-31+devuan1

Versions of packages policykit-1 recommends:
ii  lxpolkit [polkit-1-auth-agent]           0.5.5-2+b1
ii  policykit-1-gnome [polkit-1-auth-agent]  0.105-7+b1

policykit-1 suggests no packages.

Versions of packages policykit-1 is related to:
ii  elogind                          246.10-3
ii  libpam-elogind [libpam-systemd]  246.10-3
pn  systemd                          <none>

-- no debconf information

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sun Nov 24 01:42:04 2024;