Control: tags -1 + patch

On Thu, Jun 03, 2021 at 03:49:02PM +0200, Salvatore Bonaccorso wrote:
> Source: policykit-1
> Version: 0.105-30
> Severity: grave
> Tags: security upstream
> Justification: user security hole
> Forwarded: https://gitlab.freedesktop.org/polkit/polkit/-/issues/140
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> <t...@security.debian.org>
> Control: found -1 0.105-26
> 
> Hi,
> 
> The following vulnerability was published for policykit-1.
> 
> CVE-2021-3560[0]:
> | local privilege escalation using
> | polkit_system_bus_name_get_creds_sync()
> 
> The issue was introduced upstream with [2] in 0.113 but the
> introducing change is in Debian as well (and Ubuntu[3]).
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2021-3560
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560
> [1] https://gitlab.freedesktop.org/polkit/polkit/-/issues/140
> [2] 
> https://gitlab.freedesktop.org/polkit/polkit/-/commit/bfa5036bfb93582c5a87c44b847957479d911e38
> [3] https://ubuntu.com/security/notices/USN-4980-1
> [4] https://bugzilla.redhat.com/show_bug.cgi?id=1961710
> 
> Can you fix this targetted please for bullseye and ask the release
> team for an unblock?

Attached the patch.

Regards,
Salvatore
--- a/src/polkit/polkitsystembusname.c
+++ b/src/polkit/polkitsystembusname.c
@@ -435,6 +435,9 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName           *system_bus
   while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error))
     g_main_context_iteration (tmp_context, TRUE);
 
+  if (data.caught_error)
+    goto out;
+
   if (out_uid)
     *out_uid = data.uid;
   if (out_pid)

Reply via email to