SUSE update for polkit



Published: 2022-01-25 | Updated: 2023-04-27
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-4034
CWE-ID CWE-20
Exploitation vector Local
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
Subscribe
SUSE Enterprise Storage
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE MicroOS
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Basesystem
Operating systems & Components / Operating system

typelib-1_0-Polkit-1_0
Operating systems & Components / Operating system package or component

polkit-devel-debuginfo
Operating systems & Components / Operating system package or component

polkit-devel
Operating systems & Components / Operating system package or component

polkit-debugsource
Operating systems & Components / Operating system package or component

polkit-debuginfo
Operating systems & Components / Operating system package or component

polkit
Operating systems & Components / Operating system package or component

libpolkit0-debuginfo
Operating systems & Components / Operating system package or component

libpolkit0
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU60007

Risk: Medium

CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-4034

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper handling of the calling parameters count in the pkexec setuid binary, which causes the binary to execute environment variables as commands. A local user can craft environment variables in a way that they will be processed and executed by pkexec and execute arbitrary commands on the system as root.

Mitigation

Update the affected package polkit to the latest version.

Vulnerable software versions

SUSE Enterprise Storage: 7.1

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

SUSE Linux Enterprise Server for SAP: 15-SP2

SUSE Linux Enterprise Server: 15-SP2-BCL - 15-SP2-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP2-ESPOS - 15-SP2-LTSS

SUSE MicroOS: 5.0 - 5.1

SUSE Linux Enterprise Module for Basesystem: 15-SP3

typelib-1_0-Polkit-1_0: before 0.116-3.6.1

polkit-devel-debuginfo: before 0.116-3.6.1

polkit-devel: before 0.116-3.6.1

polkit-debugsource: before 0.116-3.6.1

polkit-debuginfo: before 0.116-3.6.1

polkit: before 0.116-3.6.1

libpolkit0-debuginfo: before 0.116-3.6.1

libpolkit0: before 0.116-3.6.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220190-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###