Skip to Content.
Sympa Menu

perfsonar-user - Re: [perfsonar-user] CVE-2021-4034

Subject: perfSONAR User Q&A and Other Discussion

List archive

Re: [perfsonar-user] CVE-2021-4034


Chronological Thread 
  • From: "D'Angelo, Cas" <>
  • To: "" <>, Brian Tehan <>
  • Subject: Re: [perfsonar-user] CVE-2021-4034
  • Date: Wed, 26 Jan 2022 21:53:20 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zpVzdGml3Izys1p57kPMr6pu5NIC8HXWKTM8eAkkd8g=; b=YvOE0DidCgUiGAut2TDMMj6WDSXJPZmkMePuy45yQe0xEajRg5W5XehtAsgPH/V/EgCxvwOk6+5DkP+73/j6PC5T4H3Bx5nhVIYJ+7mfNtSiq0nwz/X+WtZzRV21S8bzT/y2lMmxf82X30azlPEqeo+M10oGqWd7IMaiJetLuWUSGTFal/4tvg6zLlbAup2/mq3PjQlu1fT7qdf6zZM4J12hRXRz+Ig6PkrKnlqCvQPzHWg0lvne5gcdxZ8XpK5Kr2RSLeAx+sV6BnIM1A584Lp88LxdAW1laCClurCLSpYokVSNso39U1JVPmXHoR6wJyNNQTqcHmI2SdNYgyF66A==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fW56USUcP2bQkoWL//LWJC8nLjMR+vPpDuTf2wCW5UhQVAKcuAQ5pF5IoJ/hSlCi+LuoYoH/oWia8aiA5uDRHx4GK7DCFGHqM48Fb8etDjg7cKbqMA0tXestp7dRDBjHx3PkLLDpok+cRtlnnhdkFUe44Vyv6FpaOIB0LDU6VhZgr0IqqwlERP/Hdm34D8MnOwwQ/0GSbZUMzGIHVUUsGMBL7TGKUHwGAI3i+SXnirIDbSCnjeW+GXTLcfYJIgunkVbvI/mdAiW2MXQZ8cx84VkeFkkRmEXh8EbjufWcA5GtTRPqvVzeB3dbUZFXEJGEQJXwX0KFR7tGj4XJeWqF+A==
  • Suggested_attachment_session_id: 09ea2910-7130-10d6-b42c-afcc8e4978d1

It looks like CentOS dropped a patched version of polkit today.

$ rpm -qa | grep polkit
polkit-0.112-26.el7_9.1.x86_64

If the version reported isn't at least polkit-0.112-26.el7_9.1 then run
$ sudo yum -y upgrade

https://forums.centos.org/viewtopic.php?f=51&p=330616
https://access.redhat.com/errata/RHSA-2022:0274#packages



photo-logo
Cas D'Angelo
AVP & Chief Operating Officer OIT
Georgia Tech
 
p: 404-894-1356
 
 




From: <> on behalf of Brian Tehan <>
Sent: Wednesday, January 26, 2022 4:36 PM
To: <>
Subject: [perfsonar-user] CVE-2021-4034
 

https://arstechnica.com/information-technology/2022/01/a-bug-lurking-for-12-years-gives-attackers-root-on-every-major-linux-distro/

https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt

 

$ systemctl list-unit-files | grep polkit

polkit.service                                 static 

 

 

 

Perfsonar Team,

 

I ran across the above article and found the service installed on our perfSONAR Toolkit machines.  Are toolkit installations vulnerable to this attack?  If so, should we implement the mitigation that Qualys suggests (# chmod 0755 /usr/bin/pkexec)?

 

Thanks.

 

 

Brian Tehan

Regional Network Engineer

University of Nebraska System

EAB009F 6001 Dodge St

Omaha, NE 68182-0051

Office: (402) 554-6428

university of nebraska logo lockup with campuses

 

 




Archive powered by MHonArc 2.6.24.

Top of Page