First published: Tue Jan 25 2022(Updated: )
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.<br>Security Fix(es):<br><li> polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/polkit | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit-debuginfo | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit-debuginfo | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit-devel | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit-devel | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
redhat/polkit-docs | <0.112-12.el7_3.1 | 0.112-12.el7_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0270 is classified as important.
To fix RHSA-2022:0270, update polkit and its associated packages to version 0.112-12.el7_3.1.
RHSA-2022:0270 affects Red Hat Enterprise Linux 7 systems that use the polkit packages.
The vulnerability in RHSA-2022:0270 involves local privilege escalation in pkexec due to incorrect handling of operating parameters.
There is no specific workaround for RHSA-2022:0270, and it is recommended to apply the available security update.