First published: Tue Jan 08 2019(Updated: )
polkit has a vulnerability that allows a local attacker to hijack a PID during an authentication attempt by a non-root user and subsequently execute code as the authenticated process. Upstream patch: <a href="https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81">https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81</a> <a href="https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19">https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7b55851367136b1efd84d98fea81ba57a98304cf">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7b55851367136b1efd84d98fea81ba57a98304cf</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Polkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1664212 is classified as high due to its potential for local privilege escalation.
To fix REDHAT-BUG-1664212, users should update to the latest patched version of polkit provided by their distribution.
Local non-root users on systems running vulnerable versions of polkit are affected by REDHAT-BUG-1664212.
The impact of REDHAT-BUG-1664212 includes the ability for a local attacker to execute arbitrary code as an authenticated process.
REDHAT-BUG-1664212 was disclosed on August 15, 2019, with an alert regarding its potential exploitation.