It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
| Software | From | Fixed in |
|---|---|---|
| polkit_project / polkit | - | 0.119 |
| debian / debian_linux | 11.0 | 11.0.x |
| canonical / ubuntu_linux | 20.04 | 20.04.x |
| redhat / virtualization | 4.0 | 4.0.x |
| redhat / virtualization_host | 4.0 | 4.0.x |
| redhat / openshift_container_platform | 4.7 | 4.7.x |