Important security patch for Polkit Privilege Escalation Vulnerability (PwnKit) in Linux

Important security patch for Polkit Privilege Escalation Vulnerability (PwnKit) in Linux

The Polkit Privilege Escalation Vulnerability, PwnKit, has been hidden in plain view for more than a decade — 12 years to be precise — in Linux. The vulnerability was identified by Qualys’ researchers in November, 2021. Privilege Escalation Vulnerabilities, such as PwnKit (CVE-2021-4034), allow unprivileged local users to get root privileges.

The PwnKit vulnerability was disclosed on January 25th, 2022. At the end of the article, there is a list of the patches major Linux distributions have already published to fix this security issue.

PwnKit (CVE-2021-4034)

PwnKit (CVE-2021-4034) is a privilege escalation vulnerability that allows unprivileged local users to get full root privileges on any vulnerable Linux distribution. Unprivileged local users can do so by exploiting the vulnerability in its default configuration.

The privilege escalation vulnerability is inside of a tool called “Polkit”. According to Qualys’ research team, who identified the vulnerability in November 2021, it originates from a memory corruption vulnerability in Polkit’s pkexec. The vulnerability affects all versions of pkexec since its creation in May 2009.

Polkit and pkexec

Polkit is the software responsible for controlling system privileges on Unix-like operating systems. It was formerly known as “PolicyKit”. This tool has been included by default in basically all new  Linux distributions since 2009.

Polkit allows unprivileged processes to communicate with privileged processes and it can also be used to execute commands with elevated privileges using the command “pkexec”.

Pkexec is a SUID-root program installed by default on all major Linux distributions.

Available PwnKit patches for Debian, Ubuntu and Red Hat Enterprise Linux

Although Qualys’ research team only tested and exploited the PwnKit vulnerability on Ubuntu, Debian, Fedora, CentOS Linux and Red Hat Enterprise Linux (RHEL), it has been assumed that minor distributions are also affected.

Here is a list of the patches made available by major Linux distributions:

In case there is no patch available for the Linux distribution you use, you can temporarily or alternatively mitigate the exploitation by removing the SUID-bit from pkexec. To do so, you can use the following command:

# chmod 0755 /usr/bin/pkexec

Share it on Social Media!

Cookies customization
Stackscale, Grupo Aire logo

By allowing cookies, you voluntarily agree to the processing of your data. This also includes, for a limited period of time, your consent in accordance with the Article 49 (1) (a) GDPR in regard to the processing of data outside the EEA, for instead, in the USA. In these countries, despite the careful selection and obligation of service providers, the European high level of data protection cannot be guaranteed.

In case of the data being transferred to the USA, there is, for instance, the risk of USA authorities processing that data for control and supervision purposes without having effective legal resources available or without being able to enforce all the rights of the interested party. You can revoke your consent at any moment.

Necessary Cookies

Necessary cookies help make a web page usable by activating basic functions such as the page navigation and the access to secure areas in the web page. The web page will not be able to work properly without these cookies. We inform you about the possibility to set up your browser in order to block or alert about these cookies, however, it is possible that certain areas of the web page do not work. These cookies do not store any personal data.

- moove_gdpr_popup

 

Analytical cookies

Analytical cookies allow its Editor to track and analyze the websites’ users behavior. The information collected through this type of cookie is used for measuring the activity on websites, applications or platforms, as well as for building user navigation profiles for said websites, application or platform, in order to implement improvements based on the analysis of data on the usage of the service by users.

Google Analytics: It registers a single identification used to generate statistical data about how the visitor uses the website. The data generated by the cookie about the usage of this website is generally transferred to a Google server in the USA and stored there by Google LLC, 1600 Amphitheatre Parkway Mountain View, CA 94043, USA.

- _dc_gtm_UA-XXXXXXXX-X

- _gat_gtag_UA_XXXXXXXX_X

- _ga

- _gcl_au

- _gid