Learn about Centmin Mod LEMP Stack today
Register Now

Sysadmin A bug lurking for 12 years gives attackers root on every major Linux distro

Discussion in 'System Administration' started by yunos, Jan 26, 2022.

  1. yunos

    yunos Member

    130
    3
    18
    Aug 8, 2015
    Ratings:
    +17
    Local Time:
    5:13 PM
    1.8.0
  2. rdan

    rdan Well-Known Member

    5,446
    1,408
    113
    May 25, 2014
    Ratings:
    +2,201
    Local Time:
    12:13 AM
    Mainline
    10.2
    My ubuntu servers has this update:
    libpolkit-agent-1-0 libpolkit-backend-1-0 libpolkit-gobject-1-0 policykit-1

    But nothing on CentOS servers :|
     
  3. buik

    buik “The best traveler is one without a camera.”

    2,026
    524
    113
    Apr 29, 2016
    Flanders
    Ratings:
    +1,674
    Local Time:
    5:13 PM
    @rdan Red Hat Enterprise Linux (EL) updated packages are released (below),
    same goes for EL clones like Oracle Linux.
    So this is a CentOS thingy: CentOS 8 is end of life, for that reason no updates anymore for CentOS 8. About CentOS 7:

    CentOS priority is currently given to CentOS Stream all-inclusive.
    Expect a delayed release of a few days for non Stream updates like EL version 7.

    Since Johnny Hughes from Red Hat/CentOS has repeatedly stated that only a few people "work" on their release team.

    Nevertheless. Kinda clickbait from Arstechnica: 'gives attackers root on every major Linux distro'. The severity is important and not critical at all on CVE-2021-4034
     
    Last edited: Jan 26, 2022
  4. yunos

    yunos Member

    130
    3
    18
    Aug 8, 2015
    Ratings:
    +17
    Local Time:
    5:13 PM
    1.8.0
    its not quite clickbaity as this can affect shared hosting companies or servrs that let users have shell access. This is a serious concern that affect these people to.
     
  5. buik

    buik “The best traveler is one without a camera.”

    2,026
    524
    113
    Apr 29, 2016
    Flanders
    Ratings:
    +1,674
    Local Time:
    5:13 PM
    I don't agree with that: 'gives attackers root on every major Linux distro' is completely off the mark, and thus does attract potential visitors to the article who wouldn't otherwise come by. After all, you have to have shell access as a starting point.

    'Gives attackers root on every major Linux distro' means a critical CVE where you gain root access, without access (no shell or whatsoever), only with an exploit.

    Or specifically at a shared server you cite.
    Typically, a shared server hosts websites like grandma's photo album or your niece's travel site. Your grandmother or niece can hardly go through these CVE-2021-4034 exploit steps.

    Mostly: Your grandmother and niece don't even know what a shell is, don't want to know what a shell is, or uberhastily don't know how to start a shell. Even if they already had a shell. Apart from the fact that no major shared host providers deliver shell access.

    I agree with the Mitre Corporation. That classifies CVEs by importance.
    This CVE-2021-4034 is classified as important but nothing more.
     
    Last edited: Jan 27, 2022
  6. rdan

    rdan Well-Known Member

    5,446
    1,408
    113
    May 25, 2014
    Ratings:
    +2,201
    Local Time:
    12:13 AM
    Mainline
    10.2
    Released:
    polkit.x86_64 0.112-26.el7_9.1 updates
     
  7. eva2000

    eva2000 Administrator Staff Member

    54,645
    12,227
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,796
    Local Time:
    2:13 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    Most of my servers when I logged in for CentOS 7 already had that polkit update installed due to YUM auto updates :)