We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
` zanyxdev@xxxxxxx:~/forks_projets/CVE-2021-4034$ ./cve-2021-4034 pkexec --version | --help | --disable-internal-agent | [--user username] PROGRAM [ARGUMENTS...]
See the pkexec manual page for more details. zanyxdev@xxxxxxx:~/forks_projets/CVE-2021-4034$ pkexec --version pkexec version 0.105 `
Linux xxxxxx 5.10.0-11-amd64 #1 SMP Debian 5.10.92-1 (2022-01-18) x86_64 GNU/Linux policykit-1-doc/stable-security,stable-security 0.105-31+deb11u1 all policykit-1-gnome/stable,now 0.105-7 amd64 policykit-1-gnome/stable 0.105-7 i386 policykit-1/stable-security,now 0.105-31+deb11u1 amd64 policykit-1/stable-security 0.105-31+deb11u1 i386
The text was updated successfully, but these errors were encountered:
yum install gcc
Sorry, something went wrong.
The version you have (0.105.31+deb11u1) is patched to remove this vulnerability.
Source: https://tracker.debian.org/news/1297854/accepted-policykit-1-0105-31deb11u1-source-into-stable-security-embargoed-stable-security/
Closing for now.
No branches or pull requests
`
zanyxdev@xxxxxxx:~/forks_projets/CVE-2021-4034$ ./cve-2021-4034
pkexec --version |
--help |
--disable-internal-agent |
[--user username] PROGRAM [ARGUMENTS...]
See the pkexec manual page for more details.
zanyxdev@xxxxxxx:~/forks_projets/CVE-2021-4034$ pkexec --version
pkexec version 0.105
`
The text was updated successfully, but these errors were encountered: