vulnerability
Red Hat: CVE-2021-3560: local privilege escalation using polkit_system_bus_name_get_creds_sync() (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2021-06-03 | 2021-06-04 | 2023-12-15 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2021-06-03
Added
2021-06-04
Modified
2023-12-15
Description
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Solution(s)
redhat-upgrade-polkitredhat-upgrade-polkit-debuginforedhat-upgrade-polkit-debugsourceredhat-upgrade-polkit-develredhat-upgrade-polkit-docsredhat-upgrade-polkit-libsredhat-upgrade-polkit-libs-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.