First published: Tue Jul 10 2018(Updated: )
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Polkit Project Polkit | <0.115 | |
IBM Data Risk Manager | <=2.0.6 | |
debian/policykit-1 | 0.105-31+deb11u1 122-3 125-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in polkit is CVE-2018-1116.
CVE-2018-1116 has a severity rating of 7.7 (high).
The affected software for CVE-2018-1116 includes policykit-1 versions 0.105-21, 0.105-4ubuntu3.14.04.2, 0.105-14.1ubuntu0.1, 0.105-18ubuntu0.1, 0.105-20ubuntu0.18.04.1, and IBM Data Risk Manager versions up to 2.0.6.
A local attacker can exploit CVE-2018-1116 by sending a specially-crafted request to the polkitd service, causing a denial of service or obtaining sensitive information.
Yes, a fix is available for CVE-2018-1116. Please refer to the provided references for more information.