There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/cve-2021-4115 | Third Party Advisory |
https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e | Patch Third Party Advisory |
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2022-02-21 14:15
Updated : 2022-08-08 17:37
NVD link : CVE-2021-4115
Mitre link : CVE-2021-4115
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux
oracle
- zfs_storage_appliance_kit
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
polkit_project
- polkit