It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
2022-02-16T19:15:08.450
2025-04-03T16:08:28.520
Analyzed
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | polkit_project | polkit | < 0.119 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |
Operating System | canonical | ubuntu_linux | 20.04 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Application | redhat | virtualization_host | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | No |
Application | redhat | openshift_container_platform | 4.7 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Operating System | redhat | enterprise_linux | 8.0 | No |