137 lines
11 KiB
XML
137 lines
11 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for polkit is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2022-1502</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2022-01-27</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2022-01-27</InitialReleaseDate>
|
|
<CurrentReleaseDate>2022-01-27</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2022-01-27</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">polkit security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for polkit is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Define and Handle authorizations tool.
|
|
|
|
Security Fix(es):
|
|
|
|
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.(CVE-2021-4034)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for polkit is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
|
|
|
|
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">polkit</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1502</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-4034</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-4034</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">openEuler-20.03-LTS-SP2</FullProductName>
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="polkit-debugsource-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-debugsource-0.116-8.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-libs-0.116-8.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-devel-0.116-8.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-debuginfo-0.116-8.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-0.116-8.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-debuginfo-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-devel-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debugsource-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-debugsource-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-libs-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-devel-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-debuginfo-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-libs-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debugsource-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-debugsource-0.116-9.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="noarch">
|
|
<FullProductName ProductID="polkit-help-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-help-0.116-8.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-help-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-help-0.116-9.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-help-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-help-0.116-9.oe1.noarch.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="polkit-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-0.116-8.oe1.src.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-0.116-9.oe1.src.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-0.116-9.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="polkit-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-0.116-8.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-debuginfo-0.116-8.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debugsource-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-debugsource-0.116-8.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-libs-0.116-8.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-8" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">polkit-devel-0.116-8.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-libs-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-devel-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-debuginfo-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debugsource-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP2">polkit-debugsource-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debuginfo-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-debuginfo-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-debugsource-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-debugsource-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-libs-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-libs-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="polkit-devel-0.116-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">polkit-devel-0.116-9.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A local privilege escalation vulnerability was found on polkit s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2022-01-27</ReleaseDate>
|
|
<CVE>CVE-2021-4034</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
<ProductID>openEuler-20.03-LTS-SP2</ProductID>
|
|
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.8</BaseScore>
|
|
<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>polkit security update</Description>
|
|
<DATE>2022-01-27</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1502</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |