Описание
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Меры по смягчению последствий
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | polkit | Not affected | ||
Red Hat Enterprise Linux 7 | polkit | Not affected | ||
Red Hat Enterprise Linux 9 | polkit | Not affected | ||
Red Hat Enterprise Linux 8 | polkit | Fixed | RHSA-2021:2238 | 03.06.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | polkit | Fixed | RHSA-2021:2236 | 03.06.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | polkit | Fixed | RHSA-2021:2237 | 03.06.2021 |
Red Hat OpenShift Container Platform 4.7 | cri-o | Fixed | RHSA-2021:2555 | 06.07.2021 |
Red Hat OpenShift Container Platform 4.7 | dhcp | Fixed | RHSA-2021:2555 | 06.07.2021 |
Red Hat OpenShift Container Platform 4.7 | openshift-clients | Fixed | RHSA-2021:2555 | 06.07.2021 |
Red Hat OpenShift Container Platform 4.7 | openshift-kuryr | Fixed | RHSA-2021:2555 | 06.07.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
It was found that polkit could be tricked into bypassing the credentia ...
EPSS
7.8 High
CVSS3