ELSA-2022-0267

ELSA-2022-0267 - polkit security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-01-25

Description


[0.115-13.0.1]
- Increase timeout to avoid defunct processes [Orabug: 26930744]

[0.115-13.el8_5.1]
- pkexec: argv overflow results in local privilege esc.
- Resolves: CVE-2021-4034


Related CVEs


CVE-2021-4034

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) polkit-0.115-13.0.1.el8_5.1.src.rpme892b306eeaa2c732fe29b6b3444c15bfebd85ade3b9ae870aa3404f0b83f8fe-ol8_aarch64_baseos_latest
polkit-0.115-13.0.1.el8_5.1.src.rpme892b306eeaa2c732fe29b6b3444c15bfebd85ade3b9ae870aa3404f0b83f8fe-ol8_aarch64_u5_baseos_patch
polkit-0.115-13.0.1.el8_5.1.aarch64.rpm664e462de4e298339df0289f31f855d5a34a527547d4f383483a5c23b4e27e39-ol8_aarch64_baseos_latest
polkit-0.115-13.0.1.el8_5.1.aarch64.rpm664e462de4e298339df0289f31f855d5a34a527547d4f383483a5c23b4e27e39-ol8_aarch64_u5_baseos_patch
polkit-devel-0.115-13.0.1.el8_5.1.aarch64.rpmd68858557a3339475e017cd3ba5185d8c9e4fe0613222c558ab68447dd6afe92-ol8_aarch64_baseos_latest
polkit-devel-0.115-13.0.1.el8_5.1.aarch64.rpmd68858557a3339475e017cd3ba5185d8c9e4fe0613222c558ab68447dd6afe92-ol8_aarch64_u5_baseos_patch
polkit-docs-0.115-13.0.1.el8_5.1.noarch.rpm2172ed25627ab0d904795e3e725fa8f2a922984c7f2ebc9e3ac2b6c739e22965-ol8_aarch64_baseos_latest
polkit-docs-0.115-13.0.1.el8_5.1.noarch.rpm2172ed25627ab0d904795e3e725fa8f2a922984c7f2ebc9e3ac2b6c739e22965-ol8_aarch64_u5_baseos_patch
polkit-libs-0.115-13.0.1.el8_5.1.aarch64.rpm7de5d12ff3d930a157fe7bd5b85c3353fd818e4c2d5a6b7202317b9e1c10e2be-ol8_aarch64_baseos_latest
polkit-libs-0.115-13.0.1.el8_5.1.aarch64.rpm7de5d12ff3d930a157fe7bd5b85c3353fd818e4c2d5a6b7202317b9e1c10e2be-ol8_aarch64_u5_baseos_patch
Oracle Linux 8 (x86_64) polkit-0.115-13.0.1.el8_5.1.src.rpme892b306eeaa2c732fe29b6b3444c15bfebd85ade3b9ae870aa3404f0b83f8fe-ol8_x86_64_baseos_latest
polkit-0.115-13.0.1.el8_5.1.src.rpme892b306eeaa2c732fe29b6b3444c15bfebd85ade3b9ae870aa3404f0b83f8fe-ol8_x86_64_u5_baseos_patch
polkit-0.115-13.0.1.el8_5.1.x86_64.rpm090adeb753be3eba40e3fdb9075af35d5f1222e19fe67a58a9e25f13f2dc32c9-ol8_x86_64_baseos_latest
polkit-0.115-13.0.1.el8_5.1.x86_64.rpm090adeb753be3eba40e3fdb9075af35d5f1222e19fe67a58a9e25f13f2dc32c9-ol8_x86_64_u5_baseos_patch
polkit-devel-0.115-13.0.1.el8_5.1.i686.rpm49e5706791a60b7045689dea02123522219d47035413550da7acb5208f03fa72-ol8_x86_64_baseos_latest
polkit-devel-0.115-13.0.1.el8_5.1.i686.rpm49e5706791a60b7045689dea02123522219d47035413550da7acb5208f03fa72-ol8_x86_64_u5_baseos_patch
polkit-devel-0.115-13.0.1.el8_5.1.x86_64.rpm8b7dfb66f33e178a73d551dd034fe16709ccfd63e0bed25d24b0cb027e7d04bf-ol8_x86_64_baseos_latest
polkit-devel-0.115-13.0.1.el8_5.1.x86_64.rpm8b7dfb66f33e178a73d551dd034fe16709ccfd63e0bed25d24b0cb027e7d04bf-ol8_x86_64_u5_baseos_patch
polkit-docs-0.115-13.0.1.el8_5.1.noarch.rpm2172ed25627ab0d904795e3e725fa8f2a922984c7f2ebc9e3ac2b6c739e22965-ol8_x86_64_baseos_latest
polkit-docs-0.115-13.0.1.el8_5.1.noarch.rpm2172ed25627ab0d904795e3e725fa8f2a922984c7f2ebc9e3ac2b6c739e22965-ol8_x86_64_u5_baseos_patch
polkit-libs-0.115-13.0.1.el8_5.1.i686.rpmbb4f5f696517dd730d31cc7bae76cbc4b01da247266a85fd2e22b6c71cc91284-ol8_x86_64_baseos_latest
polkit-libs-0.115-13.0.1.el8_5.1.i686.rpmbb4f5f696517dd730d31cc7bae76cbc4b01da247266a85fd2e22b6c71cc91284-ol8_x86_64_u5_baseos_patch
polkit-libs-0.115-13.0.1.el8_5.1.x86_64.rpm4ae36b16cb449dfc658054f12c3e8e3c62684667925d07b1051fb26493e56f3a-ol8_x86_64_baseos_latest
polkit-libs-0.115-13.0.1.el8_5.1.x86_64.rpm4ae36b16cb449dfc658054f12c3e8e3c62684667925d07b1051fb26493e56f3a-ol8_x86_64_u5_baseos_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete