perfsonar-user - Re: [perfsonar-user] CVE-2021-4034
Subject: perfSONAR User Q&A and Other Discussion
List archive
- From: "D'Angelo, Cas" <>
- To: "" <>, Brian Tehan <>
- Subject: Re: [perfsonar-user] CVE-2021-4034
- Date: Wed, 26 Jan 2022 21:53:20 +0000
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zpVzdGml3Izys1p57kPMr6pu5NIC8HXWKTM8eAkkd8g=; b=YvOE0DidCgUiGAut2TDMMj6WDSXJPZmkMePuy45yQe0xEajRg5W5XehtAsgPH/V/EgCxvwOk6+5DkP+73/j6PC5T4H3Bx5nhVIYJ+7mfNtSiq0nwz/X+WtZzRV21S8bzT/y2lMmxf82X30azlPEqeo+M10oGqWd7IMaiJetLuWUSGTFal/4tvg6zLlbAup2/mq3PjQlu1fT7qdf6zZM4J12hRXRz+Ig6PkrKnlqCvQPzHWg0lvne5gcdxZ8XpK5Kr2RSLeAx+sV6BnIM1A584Lp88LxdAW1laCClurCLSpYokVSNso39U1JVPmXHoR6wJyNNQTqcHmI2SdNYgyF66A==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fW56USUcP2bQkoWL//LWJC8nLjMR+vPpDuTf2wCW5UhQVAKcuAQ5pF5IoJ/hSlCi+LuoYoH/oWia8aiA5uDRHx4GK7DCFGHqM48Fb8etDjg7cKbqMA0tXestp7dRDBjHx3PkLLDpok+cRtlnnhdkFUe44Vyv6FpaOIB0LDU6VhZgr0IqqwlERP/Hdm34D8MnOwwQ/0GSbZUMzGIHVUUsGMBL7TGKUHwGAI3i+SXnirIDbSCnjeW+GXTLcfYJIgunkVbvI/mdAiW2MXQZ8cx84VkeFkkRmEXh8EbjufWcA5GtTRPqvVzeB3dbUZFXEJGEQJXwX0KFR7tGj4XJeWqF+A==
- Suggested_attachment_session_id: 09ea2910-7130-10d6-b42c-afcc8e4978d1
It looks like CentOS dropped a patched version of polkit today.
$ rpm -qa | grep polkit
polkit-0.112-26.el7_9.1.x86_64
polkit-0.112-26.el7_9.1.x86_64
If the version reported isn't at least polkit-0.112-26.el7_9.1 then run
$ sudo yum -y upgrade
https://forums.centos.org/viewtopic.php?f=51&p=330616
https://access.redhat.com/errata/RHSA-2022:0274#packages
https://forums.centos.org/viewtopic.php?f=51&p=330616
https://access.redhat.com/errata/RHSA-2022:0274#packages
From: <> on behalf of Brian Tehan <>
Sent: Wednesday, January 26, 2022 4:36 PM
To: <>
Subject: [perfsonar-user] CVE-2021-4034
Sent: Wednesday, January 26, 2022 4:36 PM
To: <>
Subject: [perfsonar-user] CVE-2021-4034
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
$ systemctl list-unit-files | grep polkit
polkit.service static
Perfsonar Team,
I ran across the above article and found the service installed on our perfSONAR Toolkit machines. Are toolkit installations vulnerable to this attack? If so, should we implement the mitigation that Qualys suggests (# chmod 0755 /usr/bin/pkexec)?
Thanks.
Brian Tehan Regional Network Engineer University of Nebraska System EAB009F 6001 Dodge St Omaha, NE 68182-0051 Office: (402) 554-6428
|
|
- [perfsonar-user] CVE-2021-4034, Brian Tehan, 01/26/2022
- Re: [perfsonar-user] CVE-2021-4034, D'Angelo, Cas, 01/26/2022
- RE: [perfsonar-user] CVE-2021-4034, Brian Tehan, 01/26/2022
- Re: [perfsonar-user] CVE-2021-4034, Mark Feit, 01/27/2022
- Re: [perfsonar-user] CVE-2021-4034, D'Angelo, Cas, 01/26/2022
Archive powered by MHonArc 2.6.24.