If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

PwnKit: Local Privilege Vulnerability in polkit’s pkexec

Started by Mazaykina, Jun 23, 2022, 03:27 AM

Previous topic - Next topic

MazaykinaTopic starter

The recently discovered CVE-2021-4034 vulnerability in Polkit's pkexec requires immediate action for patching or mitigating. It's a critical issue that shouldn't be taken lightly.
  •  


Ekatherina

Cloudlinux has released patches for the Polkit vulnerability.
 To update, run the following command for CL8: "yum clean all && yum -y update polkit*". After updating, verify the version by running "rpm -qa | grep polkit" - for CL8, it should show "polkit-0.115-13.el8_5.1.x86_64". For CL7, it should show "polkit-0.112-26.el7_9.1.x86_64".

Additionally, it seems that Almalinux 8 has also received these patches.
  •  

TDSko

By the way, the "yum-cron-hourly" and "dnf-automatic" packages were updated to include automatic security upgrades.
But, the user still manually verified that the update went through all servers.
  •  

jckdear

Here is some additional information about the CVE-2021-4034 vulnerability:

CVE-2021-4034 is a security vulnerability that affects Polkit, a system service commonly used in Linux distributions for handling privilege elevation. Specifically, this vulnerability affects the pkexec utility, which allows authorized users to execute programs with elevated privileges.

The vulnerability allows an attacker to bypass authentication checks and gain unauthorized access to elevated privileges without providing valid credentials. This could potentially lead to various malicious activities, such as executing arbitrary commands or accessing sensitive data.

Due to the severity of this vulnerability, it is highly recommended to apply patches or mitigations as soon as possible. Distributors of Linux distributions are likely to release updates that address this issue. Users should ensure that their systems are updated with the latest available patches.

In addition to patching, it's important to follow security best practices, such as using strong passwords, limiting user privileges, and conducting regular security assessments to identify and address any potential vulnerabilities.

It's always a good practice to stay informed about security vulnerabilities and keep track of any updates or alerts issued by the relevant software or security vendors.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...