[ALSA-2022:0267] Important: polkit security update
Type:
security
Severity:
important
Release date:
2022-01-25
Description:
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 polkit-devel-0.115-13.el8_5.2.aarch64.rpm 4eccdfb2eba91aee33fbcf3b3a30ae6413efc4a6b7a1cb4e357f8ae3e5fe69ff
aarch64 polkit-0.115-13.el8_5.2.aarch64.rpm 80c04290c1d836a7c90dc098ecb26fd40e82f2f868777be9fadc689ce74717f7
aarch64 polkit-libs-0.115-13.el8_5.2.aarch64.rpm b6e2f051d05038aaaccb07d322bc058068eaeebe8c1e657866a36232298ce550
noarch polkit-docs-0.115-13.el8_5.2.noarch.rpm 1ccaede2442065ea35f3bf7c995639031d32f16e6ce6d0ac6189904d92b674d0
ppc64le polkit-devel-0.115-13.el8_5.2.ppc64le.rpm 0015c800e4fbc2f10d3c23266bce0ffef669e4083be82cb0f2422ddbe250cadc
ppc64le polkit-libs-0.115-13.el8_5.2.ppc64le.rpm b5a740538ec81d96dc18cf1461c10af8d77de9d3ab6b8f747869e6d9df193c90
ppc64le polkit-0.115-13.el8_5.2.ppc64le.rpm d519f05b274eb4b5409e68c406e043df80774275c2091ea9fd4834b7ac0bb1dc
x86_64 polkit-0.115-13.el8_5.2.x86_64.rpm 747e165773f53cc79c8ed8327b179ac94d150eaefbce96e1ff13c0d55790f38b
x86_64 polkit-devel-0.115-13.el8_5.2.x86_64.rpm 878e7784134a1e3a63219aed52d09607ad1f21baea62b7c36091d04e6ba1e3b3
x86_64 polkit-devel-0.115-13.el8_5.2.x86_64.rpm 878e7784134a1e3a63219aed52d09607ad1f21baea62b7c36091d04e6ba1e3b3
x86_64 polkit-libs-0.115-13.el8_5.2.x86_64.rpm 9970348ddf09a9ddb18f5b6c031bb0c9e1b1b70de35c3b62b003b7b714d71f89
x86_64 polkit-libs-0.115-13.el8_5.2.x86_64.rpm 9970348ddf09a9ddb18f5b6c031bb0c9e1b1b70de35c3b62b003b7b714d71f89
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.