Gentoo 202201-01 High: Polkit Local Escalation
Summary
Flawed input validation of arguments was discovered in the 'pkexec' program's main() function.
Resolution
Upgrade Polkit to a patched version.
emerge --ask --verbose ">=sys-auth/polkit-0.120-r2"
References
[ 1 ] CVE-2021-4034 https://nvd.nist.gov/vuln/detail/CVE-2021-4034
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202201-01
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
polkit is a toolkit for managing policies related to unprivileged processes communicating with privileged process.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-auth/polkit < 0.120-r2 >= 0.120-r2
Impact
===== A local attacker could achieve root privilege escalation.
Workaround
Run the following command as root: # chmod 0755 /usr/bin/pkexec