Описание
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | code not present |
devel | released | 0.105-31 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | 0.105-26ubuntu1.1 |
esm-infra/xenial | not-affected | code not present |
focal | released | 0.105-26ubuntu1.1 |
groovy | released | 0.105-29ubuntu0.1 |
hirsute | released | 0.105-30ubuntu0.1 |
impish | released | 0.105-31 |
Показывать по
EPSS
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
It was found that polkit could be tricked into bypassing the credentia ...
EPSS
7.2 High
CVSS2
7.8 High
CVSS3