| From a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81 Mon Sep 17 00:00:00 2001 |
| From: Jan Rybar <jrybar@redhat.com> |
| Date: Wed, 2 Jun 2021 15:43:38 +0200 |
| Subject: [PATCH] GHSL-2021-074: authentication bypass vulnerability in polkit |
| |
| initial values returned if error caught |
| |
| CVE: CVE-2021-3560 |
| |
| Upstream-Status: Backport [https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81] |
| |
| Signed-off-by: Mingli Yu <mingli.yu@windriver.com> |
| --- |
| src/polkit/polkitsystembusname.c | 3 +++ |
| 1 file changed, 3 insertions(+) |
| |
| diff --git a/src/polkit/polkitsystembusname.c b/src/polkit/polkitsystembusname.c |
| index 8daa12c..8ed1363 100644 |
| --- a/src/polkit/polkitsystembusname.c |
| +++ b/src/polkit/polkitsystembusname.c |
| @@ -435,6 +435,9 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName *system_bus |
| while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error)) |
| g_main_context_iteration (tmp_context, TRUE); |
| |
| + if (data.caught_error) |
| + goto out; |
| + |
| if (out_uid) |
| *out_uid = data.uid; |
| if (out_pid) |
| -- |
| 2.29.2 |
| |