It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "20.04"
}
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux"
},
{
"extracted_events": [
{
"last_affected": "11.0"
}
],
"cpes": [
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux"
},
{
"cpes": [
"cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "4.7"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:openshift_container_platform"
},
{
"cpes": [
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:virtualization"
},
{
"cpes": [
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "4.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:virtualization_host"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "0.119"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*"
}