29a80f
commit a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
29a80f
Author: Jan Rybar <jrybar@redhat.com>
29a80f
Date:   Tue Jan 25 17:21:46 2022 +0000
29a80f
29a80f
    pkexec: local privilege escalation (CVE-2021-4034)
29a80f
29a80f
diff --git a/src/programs/pkcheck.c b/src/programs/pkcheck.c
29a80f
index f1bb4e1..768525c 100644
29a80f
--- a/src/programs/pkcheck.c
29a80f
+++ b/src/programs/pkcheck.c
29a80f
@@ -363,6 +363,11 @@ main (int argc, char *argv[])
29a80f
   local_agent_handle = NULL;
29a80f
   ret = 126;
29a80f
 
29a80f
+  if (argc < 1)
29a80f
+    {
29a80f
+      exit(126);
29a80f
+    }
29a80f
+
29a80f
   /* Disable remote file access from GIO. */
29a80f
   setenv ("GIO_USE_VFS", "local", 1);
29a80f
 
29a80f
diff --git a/src/programs/pkexec.c b/src/programs/pkexec.c
29a80f
index 7698c5c..84e5ef6 100644
29a80f
--- a/src/programs/pkexec.c
29a80f
+++ b/src/programs/pkexec.c
29a80f
@@ -488,6 +488,15 @@ main (int argc, char *argv[])
29a80f
   pid_t pid_of_caller;
29a80f
   gpointer local_agent_handle;
29a80f
 
29a80f
+
29a80f
+  /*
29a80f
+   * If 'pkexec' is called THIS wrong, someone's probably evil-doing. Don't be nice, just bail out.
29a80f
+   */
29a80f
+  if (argc<1)
29a80f
+    {
29a80f
+      exit(127);
29a80f
+    }
29a80f
+
29a80f
   ret = 127;
29a80f
   authority = NULL;
29a80f
   subject = NULL;
29a80f
@@ -614,10 +623,10 @@ main (int argc, char *argv[])
29a80f
 
29a80f
       path = g_strdup (pwstruct.pw_shell);
29a80f
       if (!path)
29a80f
-	{
29a80f
+        {
29a80f
           g_printerr ("No shell configured or error retrieving pw_shell\n");
29a80f
           goto out;
29a80f
-	}
29a80f
+        }
29a80f
       /* If you change this, be sure to change the if (!command_line)
29a80f
 	 case below too */
29a80f
       command_line = g_strdup (path);
29a80f
@@ -636,7 +645,15 @@ main (int argc, char *argv[])
29a80f
           goto out;
29a80f
         }
29a80f
       g_free (path);
29a80f
-      argv[n] = path = s;
29a80f
+      path = s;
29a80f
+
29a80f
+      /* argc<2 and pkexec runs just shell, argv is guaranteed to be null-terminated.
29a80f
+       * /-less shell shouldn't happen, but let's be defensive and don't write to null-termination
29a80f
+       */
29a80f
+      if (argv[n] != NULL)
29a80f
+      {
29a80f
+        argv[n] = path;
29a80f
+      }
29a80f
     }
29a80f
   if (access (path, F_OK) != 0)
29a80f
     {