It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.7"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "20.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "11.0"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "0.119"
}
]
}