<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4833&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Security Alert: PolicyKit]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4833</link>
		<description><![CDATA[The most recent posts in Security Alert: PolicyKit.]]></description>
		<lastBuildDate>Sat, 29 Jan 2022 23:04:00 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34263#p34263</link>
			<description><![CDATA[<p>Good piece from Ariadne about this:</p><p><a href="https://ariadne.space/2022/01/27/cve-2021-4034/" rel="nofollow">https://ariadne.space/2022/01/27/cve-2021-4034/</a></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Sat, 29 Jan 2022 23:04:00 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34263#p34263</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34199#p34199</link>
			<description><![CDATA[<p>I read that too. Thank you for the updates today :-)</p>]]></description>
			<author><![CDATA[dummy@example.com (GlennW)]]></author>
			<pubDate>Wed, 26 Jan 2022 23:23:03 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34199#p34199</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34198#p34198</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>... only a local vulnerability with a severity of 7.8.</p></div></blockquote></div><p>Update available as of early afternoon -03:00 GMT.<br />Go Devuan !</p><p>BTW:<br />-----------------------------------------------------------------------------------------------------------------------------------<br /><em>To obtain a root shell use su -. Using just su will result in &quot;command not found&quot; messages.</em><br />-----------------------------------------------------------------------------------------------------------------------------------<br />The slickest <span class="bbc">stiky</span> I&#039;ve seen yet.&#160; 8^D</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 26 Jan 2022 23:08:32 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34198#p34198</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34196#p34196</link>
			<description><![CDATA[<p>Technical explanation here:</p><p><a href="https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034" rel="nofollow">https://blog.qualys.com/vulnerabilities … -2021-4034</a></p><p>Of particular note:</p><div class="quotebox"><blockquote><div><p>we note that OpenBSD is not exploitable, because its kernel refuses to execve() a program if argc is 0</p></div></blockquote></div><p>Puffy ftw! <img src="https://dev1galaxy.org/img/smilies/big_smile.png" width="15" height="15" alt="big_smile" /></p><p>Anyway it&#039;s only a local vulnerability with a severity of 7.8. Ho hum.</p><p>EDIT:</p><div class="quotebox"><cite>Micronaut wrote:</cite><blockquote><div><p>is it really a systemd specific problem?</p></div></blockquote></div><p>Nope.</p><p>As noted above <a href="https://github.com/openbsd/ports/tree/master/sysutils/polkit" rel="nofollow">OpenBSD has polkit</a> but that OS is fundamentally incompatible with systemd, as is <a href="https://pkgs.alpinelinux.org/packages?name=polkit&amp;branch=edge" rel="nofollow">Alpine Linux</a>.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Wed, 26 Jan 2022 20:37:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34196#p34196</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34195#p34195</link>
			<description><![CDATA[<p>don&#039;t know mch about policykit, but it can&#039;t be a systemd issue... buggy pkexec binary was present since it was introduced back in 2009. (long before systemd entered debian).. so i&#039;d say nothing to do with systemd.</p><p>and devuan is already patched, just upgrade..: <a href="https://bugs.devuan.org/cgi/bugreport.cgi?bug=658" rel="nofollow">https://bugs.devuan.org/cgi/bugreport.cgi?bug=658</a></p>]]></description>
			<author><![CDATA[dummy@example.com (xinomilo)]]></author>
			<pubDate>Wed, 26 Jan 2022 20:02:20 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34195#p34195</guid>
		</item>
		<item>
			<title><![CDATA[Security Alert: PolicyKit]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=34193#p34193</link>
			<description><![CDATA[<p>Slashdot has posted a story about a major flaw in PolicyKit, a widely used SUID utility in many Linux distributions. The arguments in the comments started quickly about whether this is a &quot;systemd specific&quot; problem. </p><p><a href="https://linux.slashdot.org/story/22/01/25/2259214/major-linux-policykit-security-vulnerability-uncovered-pwnkit" rel="nofollow">https://linux.slashdot.org/story/22/01/ … red-pwnkit</a></p><p>So, is it really a systemd specific problem? Is PolicyKit found in Devuan or other distros that do not use systemd? In other words will there be a patch for Devuan?</p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Wed, 26 Jan 2022 19:55:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=34193#p34193</guid>
		</item>
	</channel>
</rss>
