[-- Attachment #1: Type: text/plain, Size: 1125 bytes --] I just found this article on polkit having a CVE: https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ (https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/) It looks pretty nasty... " The vulnerability enables an unprivileged local user to get a root shell on the system. It’s easy to exploit with a few standard command line tools, as you can see in this short video (https://youtu.be/QZhz64yEd0g). In this blog post, I’ll explain how the exploit works and show you where the bug was in the source code. " In the hacker news comments it is fixed in: https://news.ycombinator.com/item?id=27462247 (https://news.ycombinator.com/item?id=27462247) Polkit version 0.119 fixes it, here's the diff: https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13... (https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81) You all awesome devs have probably already fixed it, but I am just emailing to make sure. Thanks! Joshua "Aim for stars...because even if you'll fall at least you'll fall on Uranus." [-- Attachment #2: Type: text/html, Size: 1570 bytes --]
[-- Attachment #1: Type: text/plain, Size: 320 bytes --] jbranso@dismail.de 写道: > You all awesome devs have probably already fixed it, but I am > just emailing to make sure. It was fixed in Guix[0], but thank you for your vigilance! o7 Rest well, T G-R [0]: https://git.savannah.gnu.org/cgit/guix.git/commit/?id=9178566954cc7f34d2d991d31df4565adad93508 [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 247 bytes --]
Guix commit 9178566954cc7f34d2d991d31df4565adad93508 ought to fix this with a patch and graft. If you haven't updated already, consider doing so. If you want to play with polkit, you can always roll back :P