tools/centos-mirror-tools/config/centos/flock
Joe Slater 6d7ab17023 polkit: fix CVE-2021-4034 polkit privilege escalation
pkexec always assumes there is at least one argument, which can be
exploited by crafting the environment and calling it with no
arguments.  No specific exploit has been published.

Update to polkit-0.112-26.el7_9.1.

== testing ==
We just want to see if pkexec stills works.
build and install an iso, then

$ sudo pkexec --user puppet id
Password:      # enter sysadmin password
uid=52(puppet) gid=52(puppet) groups=52(puppet)
$
====

Closes-bug: 1960087
Signed-off-by: Joe Slater <joe.slater@windriver.com>
Change-Id: I267e29d90e75dc772e17f0b5866850b4bb5ac3d2
2022-02-07 18:38:47 +00:00
..
yum.repos.d Build layering, script and lst update 2020-02-10 10:45:40 -05:00
other_downloads.lst Build layering, script and lst update 2020-02-10 10:45:40 -05:00
required_layer_iso_inc.cfg Build layering, script and lst update 2020-02-10 10:45:40 -05:00
required_layer_pkgs.cfg Build layering, script and lst update 2020-02-10 10:45:40 -05:00
required_layer_wheel_inc.cfg Enable build of docker images, charts and wheels from a layered build 2020-04-14 22:00:52 -04:00
rpms_3rdparties.lst Upversion OPAE SDK 2021-07-14 12:06:16 -04:00
rpms_centos.lst polkit: fix CVE-2021-4034 polkit privilege escalation 2022-02-07 18:38:47 +00:00
rpms_centos3rdparties.lst nss: fix CVE-2021-43527 2022-01-19 13:38:45 -05:00