https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)
Executive summary
Red Hat is aware of a vulnerability found in pkexec that allows an authenticated user to perform a privilege escalation attack.
The polkit package is designed to define and handle policies that allow unprivileged processes to communicate with privileged processes on a Linux system. Pkexec, part of polkit, is a tool that allows the user to execute commands as another user according to the polkit policy definitions using the setuid feature. The vulnerability found in pkexec allows an unprivileged local attacker to escalate privileges, bypassing any authentication and policies due to incorrect handling of the process’s argument vector.
The primary risk for customers is the possibility of an unprivileged user gaining administrative privileges on the affected systems. The attacker must have login access to the target system to carry out the attack.
This issue is assigned CVE-2021-4034 rated with a severity impact of Important.
The following Red Hat product versions are affected. “Affected” means that the vulnerability is present in the product’s code, irrespective of the usage or mitigations, which may address if the product is vulnerable.
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
ScopServ is aware a pkexec vulnerability in polkit.
We have released new packages for CentOS Version 6 that correct this vulnerability.
With this fix it is not necessary to purchase a support agreement from RedHat to patch this vulnerability.
Version:
CentOS has officially released a corrected polkit version available by updating ScopTEL packages.
Version polkit.x86_64 0:0.112-26.el7_9.1
To protect your systems from this vulnerability ScopServ recommends you immediately update your server.