First published: Tue Nov 23 2021(Updated: )
The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege escalation with administrative rights.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/polkit | <0:0.96-11.el6_10.2 | 0:0.96-11.el6_10.2 |
redhat/polkit | <0:0.112-26.el7_9.1 | 0:0.112-26.el7_9.1 |
redhat/polkit | <0:0.112-12.el7_3.1 | 0:0.112-12.el7_3.1 |
redhat/polkit | <0:0.112-12.el7_4.2 | 0:0.112-12.el7_4.2 |
redhat/polkit | <0:0.112-18.el7_6.3 | 0:0.112-18.el7_6.3 |
redhat/polkit | <0:0.112-22.el7_7.2 | 0:0.112-22.el7_7.2 |
redhat/polkit | <0:0.115-13.el8_5.1 | 0:0.115-13.el8_5.1 |
redhat/polkit | <0:0.115-9.el8_1.2 | 0:0.115-9.el8_1.2 |
redhat/polkit | <0:0.115-11.el8_2.2 | 0:0.115-11.el8_2.2 |
redhat/polkit | <0:0.115-11.el8_4.2 | 0:0.115-11.el8_4.2 |
redhat/redhat-virtualization-host | <0:4.3.21-20220126.0.el7_9 | 0:4.3.21-20220126.0.el7_9 |
Polkit Project Polkit | <121 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.6 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.7 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux For Ibm Z Systems | =7.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.2 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.4 | |
Redhat Enterprise Linux For Power Big Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.1 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.2 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux For Scientific Computing | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Eus | =8.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.1 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.10 | |
SUSE Enterprise Storage | =7.0 | |
SUSE Linux Enterprise High Performance Computing | =15.0-sp2 | |
Suse Manager Proxy | =4.1 | |
SUSE Manager Server | =4.1 | |
SUSE Linux Enterprise Desktop | =15-sp2 | |
SUSE Linux Enterprise Server | =15-sp2 | |
Suse Linux Enterprise Server Sap | =15-sp2 | |
Suse Linux Enterprise Workstation Extension | =12-sp5 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Siemens Sinumerik Edge | <3.3.0 | |
Siemens Scalance Lpe9403 Firmware | <2.0 | |
Siemens Scalance Lpe9403 | ||
Starwindsoftware Command Center | =1.0-update3_build5871 | |
Starwindsoftware Starwind Hyperconverged Appliance | ||
Starwindsoftware Starwind Virtual San | =v8-build14338 | |
All of | ||
Siemens Scalance Lpe9403 Firmware | <2.0 | |
Siemens Scalance Lpe9403 | ||
Red Hat Polkit | ||
<121 | ||
=7.6 | ||
=7.7 | ||
=8.0 | ||
=7.0 | ||
=8.2 | ||
=7.0 | ||
=8.0 | ||
=8.2 | ||
=8.4 | ||
=7.0 | ||
=7.0 | ||
=8.0 | ||
=8.1 | ||
=8.2 | ||
=8.4 | ||
=7.0 | ||
=6.0 | ||
=7.0 | ||
=7.3 | ||
=7.4 | ||
=7.6 | ||
=7.7 | ||
=8.2 | ||
=8.4 | ||
=8.4 | ||
=7.6 | ||
=7.7 | ||
=8.2 | ||
=8.4 | ||
=8.1 | ||
=8.2 | ||
=8.4 | ||
=7.0 | ||
=14.04 | ||
=16.04 | ||
=18.04 | ||
=20.04 | ||
=21.10 | ||
=7.0 | ||
=15.0-sp2 | ||
=4.1 | ||
=4.1 | ||
=15-sp2 | ||
=15-sp2 | ||
=15-sp2 | ||
=12-sp5 | ||
=12.2.1.3.0 | ||
=12.2.1.4.0 | ||
=8.8 | ||
<3.3.0 | ||
All of | ||
<2.0 | ||
=1.0-update3_build5871 | ||
=v8-build14338 |
For customers who cannot update immediately and doesn't have Secure Boot feature enabled, the issue can be mitigated by executing the following steps: 1) Install required systemtap packages and dependencies as per - pointed by https://access.redhat.com/solutions/5441 2) Install polkit debug info: ~~~ debuginfo-install polkit ~~~ 3) Create the following systemtap script, and name it pkexec-block.stp: ~~~ probe process("/usr/bin/pkexec").function("main") { if (cmdline_arg(1) == "") raise(9); } ~~~ 4) Load the systemtap module into the running kernel: ~~~ stap -g -F -m stap_pkexec_block pkexec_block.stp ~~~ 5) Ensure the module is loaded: ~~~ lsmod | grep -i stap_pkexec_block stap_pkexec_block 434176 0 ~~~ 6) Once polkit package was updated to the version containing the fix, the systemtap generated kernel module can be removed by running: ~~~ rmmod stap_pkexec_block ~~~ This mitigation doesn't work for Secure Boot enabled system as SystemTap would require an external compiling server to be able to sign the generated kernel module with a key enrolled into the Kernel's keyring.
https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)