Bug 2007534 (CVE-2021-4115) - CVE-2021-4115 polkit: file descriptor leak allows an unprivileged user to cause a crash
Summary: CVE-2021-4115 polkit: file descriptor leak allows an unprivileged user to cau...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-4115
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2054222 2009088 2009089 2050263 2054127 2054220 2054221 2062644
Blocks: 2007535 2032416
TreeView+ depends on / blocked
 
Reported: 2021-09-24 07:58 UTC by Marian Rehak
Modified: 2022-09-26 18:50 UTC (History)
11 users (show)

Fixed In Version: polkit 0.1179
Doc Type: If docs needed, set a value
Doc Text:
There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned.
Clone Of:
Environment:
Last Closed: 2022-04-27 04:46:06 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:1546 0 None None None 2022-04-26 21:48:43 UTC

Description Marian Rehak 2021-09-24 07:58:37 UTC
There is a file descriptor leak in polkit, which can enable an unprivileged user to cause polkit to crash, due to file descriptor exhaustion.

Comment 9 devthomp 2022-02-14 13:08:25 UTC
Created polkit tracking bugs for this issue:

Affects: fedora-all [bug 2054220]


Created polkit-qt tracking bugs for this issue:

Affects: epel-8 [bug 2054222]
Affects: fedora-all [bug 2054221]

Comment 10 errata-xmlrpc 2022-04-26 21:48:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1546 https://access.redhat.com/errata/RHSA-2022:1546

Comment 11 Product Security DevOps Team 2022-04-27 04:46:03 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-4115


Note You need to log in before you can comment on or make changes to this bug.