It was found that creating a user of group above INT32_MAX would wrap around the numeric uid or gid. Polkit is not able to handle this properly, resulting in an authentication bypass.
Created polkit tracking bugs for this issue:
Affects: fedora-all [bug 1655926]
Do not allow negative UIDs or UIDs greater than 2147483646.
Bump. Any update on getting this patched?
Currently this bug allows non-privileged users to escalate to root.
This issue affects the versions of polkit as shipped with Red Hat Enterprise Linux 6 and 7.
Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This issue affects the versions of polkit as shipped with Red Hat Virtualization 4. System users beyond those created at installation time are typically not used in Red Hat Virtualization Hypervisor or Management Appliance hosts, nor is there any opportunity to accidentally or maliciously create a user with a dangerous uid/gid on these systems under normal operation. For Red Hat Virtualization, this vulnerability has been rated as having a security impact of Low. Future updates may address this issue.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2019:2046 https://access.redhat.com/errata/RHSA-2019:2046
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):