It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "gir1.2-polkit-1.0": "0.105-26ubuntu1.1", "libpolkit-gobject-1-dev": "0.105-26ubuntu1.1", "libpolkit-agent-1-dev": "0.105-26ubuntu1.1", "libpolkit-gobject-1-0": "0.105-26ubuntu1.1", "libpolkit-gobject-1-0-dbgsym": "0.105-26ubuntu1.1", "libpolkit-agent-1-0-dbgsym": "0.105-26ubuntu1.1", "policykit-1-dbgsym": "0.105-26ubuntu1.1", "policykit-1-doc": "0.105-26ubuntu1.1", "libpolkit-agent-1-0": "0.105-26ubuntu1.1", "policykit-1": "0.105-26ubuntu1.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "gir1.2-polkit-1.0": "0.105-31", "libpolkit-gobject-1-dev": "0.105-31", "libpolkit-agent-1-dev": "0.105-31", "libpolkit-gobject-1-0": "0.105-31", "libpolkit-gobject-1-0-dbgsym": "0.105-31", "libpolkit-agent-1-0-dbgsym": "0.105-31", "policykit-1-dbgsym": "0.105-31", "policykit-1-doc": "0.105-31", "libpolkit-agent-1-0": "0.105-31", "policykit-1": "0.105-31" } ] }