<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Ubuntu Patch for CVE-2021-4034 in Expedition Articles</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-articles/ubuntu-patch-for-cve-2021-4034/ta-p/461834</link>
    <description>&lt;P class="p1"&gt;Your Expedition VM might be vulnerable to the CVE-2021-4034, here is the Info regarding the vulnerability:&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission).&lt;BR /&gt;&lt;BR /&gt;Please refer to the website for detail info : &lt;A href="https://ubuntu.com/security/cve-2021-4034" target="_blank" rel="noopener"&gt;https://ubuntu.com/security/cve-2021-4034&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;To Patch your Ubuntu system, please follow below steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;1. Adding below line to the&amp;nbsp;&lt;STRONG&gt;/etc/apt/sources.list&lt;/STRONG&gt;&amp;nbsp;:&lt;/P&gt;
&lt;PRE&gt;deb http://security.ubuntu.com/ubuntu focal-security main &lt;/PRE&gt;
&lt;P&gt;2. Run below commands to update the policy-1 package:&lt;/P&gt;
&lt;PRE&gt;$sudo apt-get update&lt;BR /&gt;$sudo apt-get install policykit-1&lt;/PRE&gt;
&lt;P class="p1"&gt;3. Verify the policykit-1 package has been updated to v.&amp;nbsp;&lt;SPAN&gt;0.105-26ubuntu1.2 as shown in below screen:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-01-28 at 9.55.32 AM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38892i89833EEDE5CE233B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-01-28 at 9.55.32 AM.png" alt="Screen Shot 2022-01-28 at 9.55.32 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Those who can’t patch immediately should use below command&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to remove the SUID-bit from pkexec:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;$chmod 0755 /usr/bin/pkexec&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jan 2022 18:06:41 GMT</pubDate>
    <dc:creator>lychiang</dc:creator>
    <dc:date>2022-01-28T18:06:41Z</dc:date>
    <item>
      <title>Ubuntu Patch for CVE-2021-4034</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/ubuntu-patch-for-cve-2021-4034/ta-p/461834</link>
      <description>&lt;P class="p1"&gt;Your Expedition VM might be vulnerable to the CVE-2021-4034, here is the Info regarding the vulnerability:&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission).&lt;BR /&gt;&lt;BR /&gt;Please refer to the website for detail info : &lt;A href="https://ubuntu.com/security/cve-2021-4034" target="_blank" rel="noopener"&gt;https://ubuntu.com/security/cve-2021-4034&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;To Patch your Ubuntu system, please follow below steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;1. Adding below line to the&amp;nbsp;&lt;STRONG&gt;/etc/apt/sources.list&lt;/STRONG&gt;&amp;nbsp;:&lt;/P&gt;
&lt;PRE&gt;deb http://security.ubuntu.com/ubuntu focal-security main &lt;/PRE&gt;
&lt;P&gt;2. Run below commands to update the policy-1 package:&lt;/P&gt;
&lt;PRE&gt;$sudo apt-get update&lt;BR /&gt;$sudo apt-get install policykit-1&lt;/PRE&gt;
&lt;P class="p1"&gt;3. Verify the policykit-1 package has been updated to v.&amp;nbsp;&lt;SPAN&gt;0.105-26ubuntu1.2 as shown in below screen:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-01-28 at 9.55.32 AM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38892i89833EEDE5CE233B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-01-28 at 9.55.32 AM.png" alt="Screen Shot 2022-01-28 at 9.55.32 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Those who can’t patch immediately should use below command&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to remove the SUID-bit from pkexec:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;$chmod 0755 /usr/bin/pkexec&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 18:06:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/ubuntu-patch-for-cve-2021-4034/ta-p/461834</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-01-28T18:06:41Z</dc:date>
    </item>
  </channel>
</rss>

