Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • CVE-2021-4034 – Ariadne's Space

    Before we get into this, I have seen a lot of people on Twitter blaming systemd for this vulnerability. It should be clarified that systemd has basically nothing to do with polkit, and has nothing at all to do with this vulnerability, systemd and polkit are separate projects largely maintained by different people.

    We should try to be empathetic toward software maintainers, including those from systemd and polkit, so writing inflammatory posts blaming systemd or its maintainers for polkit does not really help to fix the problems that made this a useful security vulnerability.

  • Windows ransomware LockBit makes the jump to Linux [Ed: Pro-Windows site. Misses the point that over 90% of ransomware is a Windows problem.]

    First, they came for Windows. Then, for Tux. As cool as Linux is, it's increasingly becoming a target for ransomware-friendly cyber criminals intent on ruining people's days.

  • These critical security bugs put Linux servers at risk of attack [Ed: Attack from the inside maybe; you need to actually have an account on such machines to begin with... compare to Windows with remotely-exploitable full compromise bugs/back doors]
  • Patch Now: A newly discovered critical Linux vulnerability probably affects your systems
  • IoT security certification group gains steam [Ed: Another fake security consortium? Their shoddy products might be best off avoided altogether, as there's rarely a practical need for such gimmicks.]

    The ioXT Alliance, which offers a certification program for IoT security, announced it has certified 195 products and grown to 580 members. Meanwhile, Timesys is seeking participants for a survey on IoT security.

DARKReading

Original

  • PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)

    Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged processes. It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission).

This Week In Security

  • This Week In Security: Geopolitical Hacktivism, Antivirus Mining, And Linux Malware | Hackaday

    So what’s the story with pkexec? NULL argv. OK, Linux programming 101 time. When a program is launched on Linux, it’s passed two parameters, normally named argc and argv. These are an integer, and an array of char pointers respectively. If you’re not a programmer, then think of this as the number of arguments, and the list of arguments. This information is used to parse and handle command line options inside the program. argc is always at least one, and argv[0] will always contain the name of the binary as executed. Except, that isn’t always the case. There’s another way to launch binaries, using the execve() function. That function allows the programmer to specify the list of arguments directly, including argument 0.

    So what happens if that list is just NULL? If a program was written to account for this possibility, like sudo, then all is well. pkexec, however, doesn’t include a check for an empty argv or an argc of 0. It acts as if there is an argument to read, and the way the program initialization happens in memory, it actually accesses the first environment variable instead, and treats it like an argument. It checks the system PATH for a matching binary, and rewrites what it thinks is it’s argument list, but is actually the environment variable. This means that uncontrolled text can be injected as an environment variable in pkexec, the setuid program.

A couple more on polkit

  • PwnKit: detect privilege escalation with CrowdSec - The open-source & collaborative IPS

    Qualys just published CVE-2021-4034 which is trivial to exploit and impacts a large variety of distributions and versions. In a nutshell, the vulnerability, also called PwnKit, allows for a local escalation of privilege (LPE), due to out-of-band writing, in Polkit’s Pkexec, an alternate solution to the “sudo” privilege management tool. Pkexec is installed by default on most popular Linux distributions. A successful exploit can lead to handing admin/root privileges to unauthorized users.

    While everybody loves a fine LPE, it’s mostly an excuse for us to take a look at another aspect of CrowdSec: pure alerting capabilities along with remediation.

  • What Is the PwnKit Vulnerability Affecting Linux Distributions?

    Linux systems are known for being solid when it comes to security. Since most Linux programs come from trusted sources and are usually reviewed by the community, it's pretty unusual to encounter very high-impact bugs. However, this doesn't mean Linux is free from such problems altogether. The recent discovery of the PwnKit system service bug is one such example.

    The PwnKit vulnerability is a serious bug that gives root privileges to any local user. This bug is especially dangerous because it affects almost all major Linux distributions.

BankInfoSecurity

Qualys

Linux distros haunted by Polkit-geist for 12+ years

  • Linux distros haunted by Polkit-geist for 12+ years: Bug grants root access to any user

    Linux vendors on Tuesday issued patches for a memory corruption vulnerability in a component called polkit that allows an unprivileged logged-in user to gain full root access on a system in its default configuration.

    Security vendor Qualys found the flaw and published details in a coordinated disclosure.

    Polkit, previously known as PolicyKit, is a tool for setting up policies governing how unprivileged processes interact with privileged ones. The vulnerability resides within polkit's pkexec, a SUID-root program that's installed by default on all major Linux distributions. Designated CVE-2021-4034, the vulnerability has been given a CVSS score of 7.8.

    Bharat Jogi, director of vulnerability and threat research at Qualys, explained in a blog post that the pkexec flaw opens the door to root privileges for an attacker. Qualys researchers, he said, have demonstrated exploitation on default installations of Ubuntu, Debian, Fedora, and CentOS, and other Linux distributions are presumed to be vulnerable as well.

  • 12-year-old Linux root privilege flaw has been "hiding in plain sight"

    An 'easily exploitable' root privilege security vulnerability has been discovered in popular default Linux distributions and "has been hiding in plain sight" for more than 12 years, according to security researchers.

Pwnkit is an easy-to-exploit vulnerability affecting all Linux

  • Pwnkit is an easy-to-exploit vulnerability affecting all Linux distros

    Linux has been known for being way more secure than Windows PCs. However, this may be changing soon as the platform is growing in popularity. According to a new report from Cybersecurity researchers from Qualys (via TechRadar), there is an “extremely severe” vulnerability in Linux. It’s very easy to exploit bugs and is affecting every major distro for the open-source Operating System.

    According to the researchers, this vulnerability has been “hiding in plain sight” for more than 12 years, and it’s memory corruption in polkit’s pkexec. According to the researchers, it’s a SUID-root program, installed by default. The malicious actors can exploit the bug to gain full root privileges on the target machine, and then do as they please. They can use the exploit to install malware or even ransomware.

Linux Vulnerability Discovered Impacting All Major Distros

  • Linux Vulnerability Discovered Impacting All Major Distros

    A major Linux vulnerability, impacting virtual all major distributions (distros), has been discovered, allowing a bad actor to obtain root privileges.

    On Linux, Unix, macOS, and other Unix-style operating systems, the root account has ultimate access to the system. As a result, when a user account is set up, it doesn’t have root access as a way of protecting the system from accidental damage.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Linux 5.18-rc7

	
From	Linus Torvalds 
Date	Sun, 15 May 2022 18:15:42 -0700
Subject	Linux 5.18-rc7
share 0
So things continue to be fairly calm, and as such this is likely the
last rc before 5.18 unless something bad happens next week.

All the stats here look normal, with the bulk of it being random
driver updates (network drivers, gpu, usb, etc).

There's a few filesystem fixes, some core networking, and some code
kernel stuff. And some selftest updates.

Sortlog appended, nothing really stands out (the most exciting thing
last week was literally that Andrew has started using git, which will
make my life easier, but that doesn't affect the *code*)

Please give it one last week of testing, so that we'll have a nice
solid 5.18 release.

                 Linus

Read more

today's howtos

  1. Finding files in Ubuntu 22.04

    In computing, file placement is an important activity to perform as you may forget the file location. Ubuntu 22.04 supports various built-in commands to trace down your files. However, the graphical user interface may also be used to find files.

  2. How to Convert SVG or PDF File to Base64?

    Apart from simple text, the image files or documents can also be converted to the Base64 format. These entities can then be stored securely anywhere you want. In this article, we would like to share the methods of converting the SVG files and PDF files to Base64 using the Python programming language in Ubuntu 20.04. First, we will introduce you briefly to these file formats, followed by the procedure of converting them to Base64.

  3. How to install DataGrip 2022 on a Chromebook

    Today we are looking at how to install DataGrip 2022 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  4. GDISK Command-Line Options

    The GDISK command in Linux is used to partition the drives of your system. Moreover, it can also be used to list down the existing partitions and display relevant information about them. In this guide, we will be talking about the different command-line options that are available with the GDISK command on a Linux Mint 20.3 system.

  5. Mapfile Bash Linux Command

    The bash shell Mapfile command is often known as a reading array. The primary purpose is to read standard input lines and store them in an indexed array variable. Mapfile must also read from substitution (<<) rather than a pipe. In addition, as compared to a read loop, bash Mapfile is a much faster and more convenient solution. It returns 1 if the execution of the command gets successful and 0 in case it is not successful. If we don’t specify an array name, the bash Mapfile variable will be targeting the array variable by default. Thus, we have decided to cover some examples using the mapfile instruction on the bash.

  6. Resolve Issue: Bash Bad Substitution

    You may have received the Bad substitution syntax problem while developing Bash scripts. After browsing through forums, you may discover that you are not alone; other individuals are encountering the same mistake. It’s a typographical fault that happens when you run your Shell script, and it can happen for a variety of reasons. The wrong use of instruction substitution and erroneous characters appended to the program are two major reasons for this. Let’s see how we can make our shell script cause this error and how to resolve it. Get started with the new bash file created with Ubuntu’s “touch” query and open it within the “GNU Nano” editor.

  7. Resolve Issue: Bash Unary Operator Expected

    Errors have a diverse number of types and reasons when it comes to bash programming. One of those errors is the “unary operator expected” error in bash programming. When evaluating expressions in conditional declarations, you may run into the “unary operator expected” issue. The reasons for this error “bash unary operator expected” might be diverse. We’ll start by talking about what’s creating the problem. Following that, we’ll go over a couple of options for resolving this problem. Let’s get started with today’s article by creating a new bash file in Ubuntu 20.04 system. For this, we need to utilize the “touch” instruction within the shell terminal and name the file “unary.sh”.

today's leftovers

  • Linux Weekly Roundup #182

    Welcome to this week's Linux weekly roundup. We had another full week in the world of Linux releases with Fedora 36, Bluestar Linux 5.17.7, ALT Linux 10.0, and LXLE Focal beta. I hope you have a wonderful week and enjoy every moment!

  • libiconv - News: libiconv 1.17 released [Savannah]

    GNU libiconv 1.17 is released.

  • PS4 9.60 and PS5 5.10 Firmware updates released, do not update if possible - Wololo.net

    So as always, we (and several prominent members of the hacking scene) recommend you do not update your console, if you can, and if you’re expecting to Jailbreak it eventually.

  • Best PlayStation 2 (PS2) Emulators for Android in 2022

    The Google Play Store is packed with interesting games, but most of them pale in comparison with the best PlayStation 2 titles, such as Silent Hill 2, Ico, Shadow of the Colossus, the Ratchet and Clank series, Final Fantasy X, Kingdom Hearts 1 & 2, Wild Arms, or Persona 4, just to give some examples. These and many other games are still fun to play, even though it’s been more than two decades since Sony released the PlayStation 2 console to great success. You can play them even if you don’t own the console or any of its successors’ thanks to PlayStation 2 emulators for Android.

  • Best Roblox Anime Games

    Roblox is a unique gaming platform with a library that has millions of games created by a community of millions of developers, allowing endless hours of gameplay. If you are a fan of anime and looking for games that resemble them then we have mentioned some of the top anime games in this article.

  • Did you know Twitter has an open-source arm? This is what it's been up to [Ed: Openwashing of a truly sinister and manipulative entity]
  • KlipperScreen: All You Need to Know [Ed: Not about KDE per se. This could be a trademark problem because of KDE. Klipper started in the 1990s.]

    KlipperScreen is a program that runs on Klipper firmware and provides a GUI to control your printer. Read on to learn more about it!

OpenVMS 9.2 hits production status for x86-64

VMS Software Inc. has announced the release of OpenVMS 9.2, the first production-supported release for commercial off-the-shelf x86 hardware. The expectation is that customers will deploy the new OS [PDF] into VMs. Most recent hypervisors are supported, including VMware (Workstation 15+, Fusion 11+ and ESXi 6.7+), KVM (tested on CentOS 7.9, openSUSE Leap 15.3, and Ubuntu 18.04), and Oracle VirtualBox 6.1. Read more