[BlueOnyx:25319] CVE-2021-4034 (PwnKit) *** IMPORTANT ***

Michael Stauber mstauber at blueonyx.it
Tue Jan 25 23:57:29 -05 2022


Hi all,

-------------------------------------------------------------
HTML version of this message is available here:
https://www.blueonyx.it/news/301/15/CVE-2021-4034-PwnKit/
-------------------------------------------------------------

A vulnerability in Polkit's pkexec component identified as CVE-2021-4034 
(PwnKit) is present in the default configuration of all major Linux 
distributions and can be exploited to gain full root privileges on the 
system, researchers warned today.

CVE-2021-4034 has been named PwnKit and its origin has been tracked to 
the initial commit of pkexec, more than 12 years ago, meaning that all 
Polkit versions are affected.

Part of the Polkit open-source application framework that negotiates the 
interaction between privileged and unprivileged processes, pkexec allows 
an authorized user to execute commands as another user, doubling as an 
alternative to sudo.

*** Easy to exploit, PoC expected soon ***

Researchers at Qualys information security company found that the pkexec 
program could be used by local attackers to increase privileges to root 
on default installations of Ubuntu, Debian, Fedora, and CentOS.

They warn that PwnKit is likely exploitable on other Linux operating 
systems as well.

More information: 
https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/

Mitigation and Security Fixes

Running the command ...

chmod 0755 /usr/bin/pkexec

... as "root" removes the SUID-bit from /usr/bin/pkexec and mitigates 
the issue until upstream (CentOS, AlmaLinux, etc.) release updated 
"polkit" RPMs that permanently fix the issue.

For BlueOnyx and Aventurin{e} we have released a hotfix (wrapped into 
the "swatch" RPM) that does this for you. It removes the SUID-flag from 
/usr/bin/pkexec unless a fixed "polkit" RPM is eventually released. Be 
sure to fully "yum update" your BlueOnyx and Aventurin{e} servers!

Below is a list of available hotfixes and updates listed by platforms:

Aventurin{e} 6109R
===================

Mitigation provided via "swatch" RPM. Available via "yum update"

BlueOnyx 5210R
==============

Mitigation provided via "swatch" RPM. Available via "yum update"

BlueOnyx 5209R
==============

Mitigation provided via "swatch" RPM. Available via "yum update"

BlueOnyx 5207R/5208R (EOL!)
============================

Despite CentOS 6 and SL6 being EOL for quite a while now, there are 
still substantial numbers of BlueOnyx 5207R/5208R servers around. As 
"yum update" on them is broken since the upstream repositories went 
away, a YUM update could not be provided in a sensible fashion.

Therefore we released an updated "polkit" RPM (built from the Red Hat 
Enterprise Linux Server 6 - Extended Life Cycle Support Errata page 
SRPM) as PKG file. You can download and install this in the GUI via 
NewLinQ. The PKG is named "Polkit". The "Polkit" PKG is available to you 
on BlueOnyx 5207R and BlueOnyx 5208R even if you do not have any ongoing 
NewLinQ subscription.

As noted above: Release of this fix as a PKG was *only* needed for 
BlueOnyx 5207R/5208R. Installation of this PKG also unties your BlueOnyx 
5207R/5208R from the CentOS 6 and/or Scientific Linix 67 YUM 
repositories and ties it into vault.centos.org, which will at least 
restore YUM to basic working order for future emergency YUM updates 
against the BlueOnyx YUM repositories.

To ensure safe operation of your BlueOnyx and Aventurin{e} servers 
please make sure to have all updates installed.

-- 
With best regards

Michael Stauber



More information about the Blueonyx mailing list