ASA-202012-12 - log back

ASA-202012-12 edited at 17 Dec 2020 19:24:04
Workaround
- As Polkit-1-support is enabled in Arch, it is possible to limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules.
+ As Polkit-1-support is enabled in Arch, it is possible to limit
+ privileges for the `org.blueman.dhcp.client` action to users that are
+ able to run arbitrary commands as root anyway in
+ /usr/share/polkit-1/rules.d/blueman.rules.
ASA-202012-12 edited at 09 Dec 2020 18:14:47
Workaround
+ As Polkit-1-support is enabled in Arch, it is possible to limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules.
ASA-202012-12 edited at 09 Dec 2020 18:13:20
Impact
+ A local attacker might be able to escalate privileges.
ASA-202012-12 created at 09 Dec 2020 18:12:18