It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1961710 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2022-02-16 11:15
Updated : 2022-07-11 11:05
NVD link : CVE-2021-3560
Mitre link : CVE-2021-3560
JSON object : View
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions
Products Affected
redhat
- enterprise_linux
- virtualization
- openshift_container_platform
- virtualization_host
canonical
- ubuntu_linux
debian
- debian_linux
polkit_project
- polkit