Lucene search

K
archlinuxArchLinuxASA-202204-2
HistoryApr 04, 2022 - 12:00 a.m.

[ASA-202204-2] polkit: multiple issues

2022-04-0400:00:00
security.archlinux.org
24

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.5%

Arch Linux Security Advisory ASA-202204-2

Severity: High
Date : 2022-04-04
CVE-ID : CVE-2021-4034 CVE-2021-4115
Package : polkit
Type : multiple issues
Remote : No
Link : https://security.archlinux.org/AVG-2654

Summary

The package polkit before version 0.120-5 is vulnerable to multiple
issues including privilege escalation and denial of service.

Resolution

Upgrade to 0.120-5.

pacman -Syu “polkit>=0.120-5”

The problems have been fixed upstream but no release is available yet.

Workaround

None.

Description

  • CVE-2021-4034 (privilege escalation)

A local privilege escalation vulnerability was found on polkit’s pkexec
utility. The pkexec application is a setuid tool designed to allow
unprivileged users to run commands as privileged users according
predefined policies. The current version of pkexec doesn’t handle the
calling parameters count correctly and ends trying to execute
environment variables as commands. An attacker can leverage this by
crafting environment variables in such a way it’ll induce pkexec to
execute arbitrary code. When successfully executed the attack can cause
a local privilege escalation given unprivileged users administrative
rights on the target machine.

  • CVE-2021-4115 (denial of service)

There is a file descriptor leak in polkit, which can enable an
unprivileged user to cause polkit to crash, due to file descriptor
exhaustion.

Impact

A local attacker is able to crash the process or elevate privileges on
the affected host.

References

https://access.redhat.com/security/cve/CVE-2021-4034
https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
https://www.openwall.com/lists/oss-security/2022/02/18/5
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
https://gitlab.freedesktop.org/polkit/polkit/-/commit/41cb093f554da8772362654a128a84dd8a5542a7
https://security.archlinux.org/CVE-2021-4034
https://security.archlinux.org/CVE-2021-4115

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanypolkit< 0.120-5UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.5%