Devuan logs - #658, boring messages


Message sent to [email protected], [email protected], Devuan Dev Team <[email protected]>:


X-Loop: [email protected]
Subject: bug#658: policykit-1: CVE-2021-4034
Reply-To: Dimitris <[email protected]>, [email protected]
Resent-From: Dimitris <[email protected]>
Resent-To: [email protected]
Resent-CC: [email protected], Devuan Dev Team <[email protected]>
X-Loop: [email protected]
Resent-Date: Wed, 26 Jan 2022 10:26:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Devuan-PR-Message: report 658
X-Devuan-PR-Package: policykit-1
X-Devuan-PR-Keywords: 
Received: via spool by [email protected] id=B.164319273526496
          (code B); Wed, 26 Jan 2022 10:26:01 +0000
Received: (at submit) by bugs.devuan.org; 26 Jan 2022 10:25:35 +0000
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 10:25:35 +0000 (UTC)
Received: from cacofonix.stinpriza.org (cacofonix.stinpriza.org [148.251.45.81])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 562386617D6
	for <[email protected]>; Wed, 26 Jan 2022 11:24:31 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=stinpriza.org [email protected] header.b="dWMmA0AS";
	dkim-atps=neutral
Received: from [192.168.0.102] (unknown [45.153.183.197])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by cacofonix.stinpriza.org (Postfix) with ESMTPSA id 0D0B32A42F31
	for <[email protected]>; Wed, 26 Jan 2022 12:24:29 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=stinpriza.org; s=mail;
	t=1643192670; bh=FZxlfPOwbgQpABLC9Mo7GDP1x2d2YcDISmp/X7oakt4=;
	h=Date:To:From:Subject:From;
	b=dWMmA0ASZzzgkJ0J99tShgbE8oe41DMxochT9hXgDcnyxZ7/BDGQgd4442XfR3tHF
	 jMMiWCtdXzHGanCnA1yCg1dDVr6tQDcGbilD39GJotS3354g/3TFj7iVeskuLi7EeZ
	 zoRUODjymee+A9pXYkO+YwNTahlD0WTQlLRtogQI3PU03t6GhA/cy5sxv61kFLGFc6
	 UZFsYL5hs/jcrOTl+6QOueZvkZtiR8aNsIgJq2RiEJ0v3jDHuAcB8YMnP3T+WxweFR
	 QmGl2euzMihNvWR0FTTckPk6a8yKtAi3d9J0WVhzJYSW8JGanyMcK5D5WC4Z05JyUY
	 Pic0ukiZxSOLQ==
Message-ID: <[email protected]>
Date: Wed, 26 Jan 2022 12:24:28 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.1
Content-Language: en-US
To: Devuan Bug Tracking System <[email protected]>
From: Dimitris <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.11 (cacofonix.stinpriza.org [0.0.0.0]); Wed, 26 Jan 2022 12:24:30 +0200 (EET)
X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_BLOCKED
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Package: policykit-1
Version: 0.105-31+devuan1
Severity: critical
Tags: security
Justification: root security hole
X-Debbugs-Cc: [email protected]

hey,

just a heads up on a very recent vulnerability found in polkit. a Local 
Privilege Escalation in polkit's pkexec (CVE-2021-4034). fixed in some 
versions in debian, probably devuan needs to address this too.

links :
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://security-tracker.debian.org/tracker/CVE-2021-4034

thanks in advance,
d.


-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 5 (daedalus/ceres)
Release:	5
Codename:	daedalus ceres
Architecture: x86_64

Kernel: Linux 5.16.2-xanmod1 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=el_GR.UTF-8, LC_CTYPE=el_GR.UTF-8 (charmap=UTF-8), LANGUAGE 
not set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Versions of packages policykit-1 depends on:
ii  dbus                                                   1.12.20-3+devuan3
ii  libc6                                                  2.33-4
ii  libelogind0                                            246.10-3
ii  libexpat1                                              2.4.3-2
ii  libglib2.0-0                                           2.70.2-1
ii  libpam-elogind [logind]                                246.10-3
ii  libpam0g                                               1.4.0-11
ii  libpolkit-agent-1-0                                    0.105-31+devuan1
ii  libpolkit-gobject-1-0                                  0.105-31+devuan1
ii  libpolkit-gobject-elogind-1-0 [libpolkit-gobject-1-0]  0.105-31+devuan1

Versions of packages policykit-1 recommends:
ii  lxpolkit [polkit-1-auth-agent]           0.5.5-2+b1
ii  policykit-1-gnome [polkit-1-auth-agent]  0.105-7+b1

policykit-1 suggests no packages.

Versions of packages policykit-1 is related to:
ii  elogind                          246.10-3
ii  libpam-elogind [libpam-systemd]  246.10-3
pn  systemd                          <none>

-- no debconf information

Message sent:


Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
Content-Type: text/plain; charset=utf-8
X-Loop: [email protected]
From: "Devuan bug Tracking System" <[email protected]>
To: Dimitris <[email protected]>
Subject: bug#658: Acknowledgement (policykit-1: CVE-2021-4034)
Message-ID: <[email protected]>
References: <[email protected]>
X-Devuan-PR-Message: ack 658
X-Devuan-PR-Package: policykit-1
Reply-To: [email protected]
Date: Wed, 26 Jan 2022 10:26:05 +0000

Thank you for filing a new bug report with Devuan.

You can follow progress on this bug here: 658: https://bugs.devuan.org/cgi/=
bugreport.cgi?bug=3D658.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

As you requested using X-Debbugs-CC, your message was also forwarded to
  [email protected]
(after having been given a bug report number, if it did not have one).

Your message has been sent to the package maintainer(s):
 Devuan Dev Team <[email protected]>

If you wish to submit further information on this problem, please
send it to [email protected].

Please do not send mail to [email protected] unless you wish
to report a problem with the Bug-tracking system.

--=20
658: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D658
Devuan Bug Tracking System
Contact [email protected] with problems

Message sent to [email protected], Devuan Dev Team <[email protected]>:


X-Loop: [email protected]
Subject: bug#658: policykit-1: CVE-2021-4034
Reply-To: Dimitris <[email protected]>, [email protected]
Resent-From: Dimitris <[email protected]>
Resent-To: [email protected]
Resent-CC: Devuan Dev Team <[email protected]>
X-Loop: [email protected]
Resent-Date: Wed, 26 Jan 2022 12:12:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Devuan-PR-Message: followup 658
X-Devuan-PR-Package: policykit-1
X-Devuan-PR-Keywords: 
References: <[email protected]> <[email protected]> <[email protected]>
Received: via spool by [email protected] id=B658.16431990342771
          (code B ref 658); Wed, 26 Jan 2022 12:12:01 +0000
Received: (at 658) by bugs.devuan.org; 26 Jan 2022 12:10:34 +0000
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 12:10:34 +0000 (UTC)
Received: from cacofonix.stinpriza.org (cacofonix.stinpriza.org [148.251.45.81])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 458646617E8
	for <[email protected]>; Wed, 26 Jan 2022 13:10:15 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=stinpriza.org [email protected] header.b="M8MFf+aF";
	dkim-atps=neutral
Received: from [192.168.0.102] (unknown [45.153.183.197])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by cacofonix.stinpriza.org (Postfix) with ESMTPSA id 52E8F2A42F3B
	for <[email protected]>; Wed, 26 Jan 2022 14:10:14 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=stinpriza.org; s=mail;
	t=1643199014; bh=9syBQPccdp+5g5Yje5YpE34XUgMz3yFR2xmnh0fn++s=;
	h=Date:To:References:From:Subject:In-Reply-To:From;
	b=M8MFf+aFdzcpVKBKw3JmD09TwgcxK7WhLKOlvHHWmcqwkhuWI976i28XLsZ+NHyto
	 KwXYhZbZgVoh56GfelZoyg5qxFpLel0iK4JBhJpF1LMs1sboe5gH+E1IU+JkKNmBAh
	 bVokHPXwfwpKCHsfMyMYajTMEw9r4MSglPJS24GccuuZFd/fcsQg+O09a8oBQ1IwHQ
	 xxhSdO49BF4/Jq3Nz/7Grb0Cl6vBfqGo6tDXI6jSN6eofNwV0uIOhcO5VR4BVdEdaX
	 1DUuhn41xht3uwGmbNyI8Z3qA6J36bDq7crtItuQ0Lk7q6EcavmkRBPCWQs2u9fOSq
	 2pc5UYMJcUoJg==
Message-ID: <[email protected]>
Date: Wed, 26 Jan 2022 14:10:13 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.1
To: [email protected]
Content-Language: en-US
From: Dimitris <[email protected]>
In-Reply-To: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.11 (cacofonix.stinpriza.org [0.0.0.0]); Wed, 26 Jan 2022 14:10:14 +0200 (EET)
X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED,SPF_PASS,
	URIBL_BLOCKED autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

seems a new version (0.105-31.1+devuan1) just came in ceres, which 
merges debian/0.105-31.1, so this is probably fixed for daedalus/ceres!

leaving it open, so you can confirm security fix & close as you think.

thanks!
d.

Message sent:


Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
Content-Type: text/plain; charset=utf-8
X-Loop: [email protected]
From: "Devuan bug Tracking System" <[email protected]>
To: Dimitris <[email protected]>
Subject: bug#658: Info received (policykit-1: CVE-2021-4034)
Message-ID: <[email protected]>
References: <[email protected]>
X-Devuan-PR-Message: ack-info 658
X-Devuan-PR-Package: policykit-1
Reply-To: [email protected]
Date: Wed, 26 Jan 2022 12:12:03 +0000

Thank you for the additional information you have supplied regarding
this bug report.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
 Devuan Dev Team <[email protected]>

If you wish to submit further information on this problem, please
send it to [email protected].

Please do not send mail to [email protected] unless you wish
to report a problem with the Bug-tracking system.

--=20
658: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D658
Devuan Bug Tracking System
Contact [email protected] with problems

Message sent:


MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
X-Loop: [email protected]
From: "Devuan bug Tracking System" <[email protected]>
To: Mark Hindley <[email protected]>
Subject: bug#658: marked as done (policykit-1: CVE-2021-4034)
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
X-Devuan-PR-Message: closed 658
X-Devuan-PR-Package: policykit-1
Reply-To: [email protected]
Date: Wed, 26 Jan 2022 13:10:02 +0000
Content-Type: multipart/mixed; boundary="----------=_1643202602-13971-0"

This is a multi-part message in MIME format...

------------=_1643202602-13971-0
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Your message dated Wed, 26 Jan 2022 13:07:44 +0000
with message-id <[email protected]>
and subject line Re: bug#658: policykit-1: CVE-2021-4034
has caused the Devuan bug report #658,
regarding policykit-1: CVE-2021-4034
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


--=20
658: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D658
Devuan Bug Tracking System
Contact [email protected] with problems

------------=_1643202602-13971-0
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at submit) by bugs.devuan.org; 26 Jan 2022 10:25:35 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 10:25:35 +0000 (UTC)
Received: from cacofonix.stinpriza.org (cacofonix.stinpriza.org [148.251.45.81])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 562386617D6
	for <[email protected]>; Wed, 26 Jan 2022 11:24:31 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=stinpriza.org [email protected] header.b="dWMmA0AS";
	dkim-atps=neutral
Received: from [192.168.0.102] (unknown [45.153.183.197])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by cacofonix.stinpriza.org (Postfix) with ESMTPSA id 0D0B32A42F31
	for <[email protected]>; Wed, 26 Jan 2022 12:24:29 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=stinpriza.org; s=mail;
	t=1643192670; bh=FZxlfPOwbgQpABLC9Mo7GDP1x2d2YcDISmp/X7oakt4=;
	h=Date:To:From:Subject:From;
	b=dWMmA0ASZzzgkJ0J99tShgbE8oe41DMxochT9hXgDcnyxZ7/BDGQgd4442XfR3tHF
	 jMMiWCtdXzHGanCnA1yCg1dDVr6tQDcGbilD39GJotS3354g/3TFj7iVeskuLi7EeZ
	 zoRUODjymee+A9pXYkO+YwNTahlD0WTQlLRtogQI3PU03t6GhA/cy5sxv61kFLGFc6
	 UZFsYL5hs/jcrOTl+6QOueZvkZtiR8aNsIgJq2RiEJ0v3jDHuAcB8YMnP3T+WxweFR
	 QmGl2euzMihNvWR0FTTckPk6a8yKtAi3d9J0WVhzJYSW8JGanyMcK5D5WC4Z05JyUY
	 Pic0ukiZxSOLQ==
Message-ID: <[email protected]>
Date: Wed, 26 Jan 2022 12:24:28 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.1
Content-Language: en-US
To: Devuan Bug Tracking System <[email protected]>
From: Dimitris <[email protected]>
Subject: policykit-1: CVE-2021-4034
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.11 (cacofonix.stinpriza.org [0.0.0.0]); Wed, 26 Jan 2022 12:24:30 +0200 (EET)
X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_BLOCKED
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Package: policykit-1
Version: 0.105-31+devuan1
Severity: critical
Tags: security
Justification: root security hole
X-Debbugs-Cc: [email protected]

hey,

just a heads up on a very recent vulnerability found in polkit. a Local 
Privilege Escalation in polkit's pkexec (CVE-2021-4034). fixed in some 
versions in debian, probably devuan needs to address this too.

links :
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://security-tracker.debian.org/tracker/CVE-2021-4034

thanks in advance,
d.


-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 5 (daedalus/ceres)
Release:	5
Codename:	daedalus ceres
Architecture: x86_64

Kernel: Linux 5.16.2-xanmod1 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=el_GR.UTF-8, LC_CTYPE=el_GR.UTF-8 (charmap=UTF-8), LANGUAGE 
not set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Versions of packages policykit-1 depends on:
ii  dbus                                                   1.12.20-3+devuan3
ii  libc6                                                  2.33-4
ii  libelogind0                                            246.10-3
ii  libexpat1                                              2.4.3-2
ii  libglib2.0-0                                           2.70.2-1
ii  libpam-elogind [logind]                                246.10-3
ii  libpam0g                                               1.4.0-11
ii  libpolkit-agent-1-0                                    0.105-31+devuan1
ii  libpolkit-gobject-1-0                                  0.105-31+devuan1
ii  libpolkit-gobject-elogind-1-0 [libpolkit-gobject-1-0]  0.105-31+devuan1

Versions of packages policykit-1 recommends:
ii  lxpolkit [polkit-1-auth-agent]           0.5.5-2+b1
ii  policykit-1-gnome [polkit-1-auth-agent]  0.105-7+b1

policykit-1 suggests no packages.

Versions of packages policykit-1 is related to:
ii  elogind                          246.10-3
ii  libpam-elogind [libpam-systemd]  246.10-3
pn  systemd                          <none>

-- no debconf information

------------=_1643202602-13971-0
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at 658-done) by bugs.devuan.org; 26 Jan 2022 13:09:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 13:09:03 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 9DC7B6617D5
	for <[email protected]>; Wed, 26 Jan 2022 14:07:47 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1nCi1Z-0002UQ-2J; Wed, 26 Jan 2022 13:07:45 +0000
Received: (nullmailer pid 19532 invoked by uid 1000);
	Wed, 26 Jan 2022 13:07:44 -0000
Date: Wed, 26 Jan 2022 13:07:44 +0000
From: Mark Hindley <[email protected]>
To: Dimitris <[email protected]>, [email protected]
Subject: Re: bug#658: policykit-1: CVE-2021-4034
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS,
	URIBL_BLOCKED autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Version: 0.105-31.1+devuan1

Dimitris,

On Wed, Jan 26, 2022 at 12:24:28PM +0200, Dimitris wrote:
> Package: policykit-1
> Version: 0.105-31+devuan1
> Severity: critical
> Tags: security
> Justification: root security hole
> X-Debbugs-Cc: [email protected]

Updated binaries are already in unstable, daedalus, chimaera-security and
beowulf-security. Ascii-security is building.

Mark
------------=_1643202602-13971-0--

Message sent:


MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
X-Loop: [email protected]
From: "Devuan bug Tracking System" <[email protected]>
To: Dimitris <[email protected]>
Subject: bug#658 closed by Mark Hindley <[email protected]> (Re:
 bug#658: policykit-1: CVE-2021-4034)
Message-ID: <[email protected]>
References: <[email protected]>
 <[email protected]>
X-Devuan-PR-Message: they-closed 658
X-Devuan-PR-Package: policykit-1
Reply-To: [email protected]
Date: Wed, 26 Jan 2022 13:10:04 +0000
Content-Type: multipart/mixed; boundary="----------=_1643202604-13971-1"

This is a multi-part message in MIME format...

------------=_1643202604-13971-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

This is an automatic notification regarding your bug report
which was filed against the policykit-1 package:

#658: policykit-1: CVE-2021-4034

It has been closed by Mark Hindley <[email protected]>.

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Mark Hindley <mark@hin=
dley.org.uk> by
replying to this email.


--=20
658: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D658
Devuan Bug Tracking System
Contact [email protected] with problems

------------=_1643202604-13971-1
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at 658-done) by bugs.devuan.org; 26 Jan 2022 13:09:03 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 13:09:03 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 9DC7B6617D5
	for <[email protected]>; Wed, 26 Jan 2022 14:07:47 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1nCi1Z-0002UQ-2J; Wed, 26 Jan 2022 13:07:45 +0000
Received: (nullmailer pid 19532 invoked by uid 1000);
	Wed, 26 Jan 2022 13:07:44 -0000
Date: Wed, 26 Jan 2022 13:07:44 +0000
From: Mark Hindley <[email protected]>
To: Dimitris <[email protected]>, [email protected]
Subject: Re: bug#658: policykit-1: CVE-2021-4034
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS,
	URIBL_BLOCKED autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Version: 0.105-31.1+devuan1

Dimitris,

On Wed, Jan 26, 2022 at 12:24:28PM +0200, Dimitris wrote:
> Package: policykit-1
> Version: 0.105-31+devuan1
> Severity: critical
> Tags: security
> Justification: root security hole
> X-Debbugs-Cc: [email protected]

Updated binaries are already in unstable, daedalus, chimaera-security and
beowulf-security. Ascii-security is building.

Mark
------------=_1643202604-13971-1
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at submit) by bugs.devuan.org; 26 Jan 2022 10:25:35 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 26 Jan 2022 10:25:35 +0000 (UTC)
Received: from cacofonix.stinpriza.org (cacofonix.stinpriza.org [148.251.45.81])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id 562386617D6
	for <[email protected]>; Wed, 26 Jan 2022 11:24:31 +0100 (CET)
Authentication-Results: mail.dyne.org;
	dkim=pass (2048-bit key; unprotected) header.d=stinpriza.org [email protected] header.b="dWMmA0AS";
	dkim-atps=neutral
Received: from [192.168.0.102] (unknown [45.153.183.197])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256)
	(No client certificate requested)
	by cacofonix.stinpriza.org (Postfix) with ESMTPSA id 0D0B32A42F31
	for <[email protected]>; Wed, 26 Jan 2022 12:24:29 +0200 (EET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=stinpriza.org; s=mail;
	t=1643192670; bh=FZxlfPOwbgQpABLC9Mo7GDP1x2d2YcDISmp/X7oakt4=;
	h=Date:To:From:Subject:From;
	b=dWMmA0ASZzzgkJ0J99tShgbE8oe41DMxochT9hXgDcnyxZ7/BDGQgd4442XfR3tHF
	 jMMiWCtdXzHGanCnA1yCg1dDVr6tQDcGbilD39GJotS3354g/3TFj7iVeskuLi7EeZ
	 zoRUODjymee+A9pXYkO+YwNTahlD0WTQlLRtogQI3PU03t6GhA/cy5sxv61kFLGFc6
	 UZFsYL5hs/jcrOTl+6QOueZvkZtiR8aNsIgJq2RiEJ0v3jDHuAcB8YMnP3T+WxweFR
	 QmGl2euzMihNvWR0FTTckPk6a8yKtAi3d9J0WVhzJYSW8JGanyMcK5D5WC4Z05JyUY
	 Pic0ukiZxSOLQ==
Message-ID: <[email protected]>
Date: Wed, 26 Jan 2022 12:24:28 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.1
Content-Language: en-US
To: Devuan Bug Tracking System <[email protected]>
From: Dimitris <[email protected]>
Subject: policykit-1: CVE-2021-4034
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.11 (cacofonix.stinpriza.org [0.0.0.0]); Wed, 26 Jan 2022 12:24:30 +0200 (EET)
X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_PASS,URIBL_BLOCKED
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

Package: policykit-1
Version: 0.105-31+devuan1
Severity: critical
Tags: security
Justification: root security hole
X-Debbugs-Cc: [email protected]

hey,

just a heads up on a very recent vulnerability found in polkit. a Local 
Privilege Escalation in polkit's pkexec (CVE-2021-4034). fixed in some 
versions in debian, probably devuan needs to address this too.

links :
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://security-tracker.debian.org/tracker/CVE-2021-4034

thanks in advance,
d.


-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 5 (daedalus/ceres)
Release:	5
Codename:	daedalus ceres
Architecture: x86_64

Kernel: Linux 5.16.2-xanmod1 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=el_GR.UTF-8, LC_CTYPE=el_GR.UTF-8 (charmap=UTF-8), LANGUAGE 
not set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Versions of packages policykit-1 depends on:
ii  dbus                                                   1.12.20-3+devuan3
ii  libc6                                                  2.33-4
ii  libelogind0                                            246.10-3
ii  libexpat1                                              2.4.3-2
ii  libglib2.0-0                                           2.70.2-1
ii  libpam-elogind [logind]                                246.10-3
ii  libpam0g                                               1.4.0-11
ii  libpolkit-agent-1-0                                    0.105-31+devuan1
ii  libpolkit-gobject-1-0                                  0.105-31+devuan1
ii  libpolkit-gobject-elogind-1-0 [libpolkit-gobject-1-0]  0.105-31+devuan1

Versions of packages policykit-1 recommends:
ii  lxpolkit [polkit-1-auth-agent]           0.5.5-2+b1
ii  policykit-1-gnome [polkit-1-auth-agent]  0.105-7+b1

policykit-1 suggests no packages.

Versions of packages policykit-1 is related to:
ii  elogind                          246.10-3
ii  libpam-elogind [libpam-systemd]  246.10-3
pn  systemd                          <none>

-- no debconf information

------------=_1643202604-13971-1--

Message received at [email protected]:


Received: (at control) by bugs.devuan.org; 27 Jan 2022 17:21:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Thu, 27 Jan 2022 17:21:06 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id A36C76617F5
	for <[email protected]>; Thu, 27 Jan 2022 18:20:57 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1nD8S8-0002sT-BJ
	for [email protected]; Thu, 27 Jan 2022 17:20:56 +0000
Received: (nullmailer pid 20028 invoked by uid 1000);
	Thu, 27 Jan 2022 17:20:55 -0000
Date: Thu, 27 Jan 2022 17:20:55 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Subject: add other CVE-2021-4034 fixed versions
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RCVD_IN_DNSWL_BLOCKED,
	RDNS_DYNAMIC,SPF_PASS autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

package policykit-1
fixed 658 0.105-25+devuan0~bpo2+2
fixed 658 0.105-25+devuan9
fixed 658 0.105-31+devuan2
thanks


Message received at [email protected]:


Received: (at control) by bugs.devuan.org; 27 Jan 2022 17:21:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Thu, 27 Jan 2022 17:21:06 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id A36C76617F5
	for <[email protected]>; Thu, 27 Jan 2022 18:20:57 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1nD8S8-0002sT-BJ
	for [email protected]; Thu, 27 Jan 2022 17:20:56 +0000
Received: (nullmailer pid 20028 invoked by uid 1000);
	Thu, 27 Jan 2022 17:20:55 -0000
Date: Thu, 27 Jan 2022 17:20:55 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Subject: add other CVE-2021-4034 fixed versions
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RCVD_IN_DNSWL_BLOCKED,
	RDNS_DYNAMIC,SPF_PASS autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

package policykit-1
fixed 658 0.105-25+devuan0~bpo2+2
fixed 658 0.105-25+devuan9
fixed 658 0.105-31+devuan2
thanks


Message received at [email protected]:


Received: (at control) by bugs.devuan.org; 27 Jan 2022 17:21:06 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Thu, 27 Jan 2022 17:21:06 +0000 (UTC)
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by mail.dyne.org (Postfix) with ESMTPS id A36C76617F5
	for <[email protected]>; Thu, 27 Jan 2022 18:20:57 +0100 (CET)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1nD8S8-0002sT-BJ
	for [email protected]; Thu, 27 Jan 2022 17:20:56 +0000
Received: (nullmailer pid 20028 invoked by uid 1000);
	Thu, 27 Jan 2022 17:20:55 -0000
Date: Thu, 27 Jan 2022 17:20:55 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Subject: add other CVE-2021-4034 fixed versions
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debbugs-No-Ack: No Thanks
X-Spam-Status: No, score=0.4 required=5.0 tests=RCVD_IN_DNSWL_BLOCKED,
	RDNS_DYNAMIC,SPF_PASS autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mail.dyne.org

package policykit-1
fixed 658 0.105-25+devuan0~bpo2+2
fixed 658 0.105-25+devuan9
fixed 658 0.105-31+devuan2
thanks


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 18 Jan 2025 08:39:01 UTC