A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. Upstream patch: https://gitlab.gnome.org/GNOME/glib/commit/3529bb4450a51995 References: https://www.openwall.com/lists/oss-security/2017/06/23/8
Created firefox tracking bugs for this issue: Affects: fedora-all [bug 1938290] Created glib tracking bugs for this issue: Affects: epel-7 [bug 1938288] Affects: fedora-all [bug 1938287] Created glib2 tracking bugs for this issue: Affects: fedora-all [bug 1938285] Created mingw-glib2 tracking bugs for this issue: Affects: fedora-all [bug 1938289]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4385 https://access.redhat.com/errata/RHSA-2021:4385
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3800
pkexec is an application used to authorized one user to execute a program as another user and it's not exposed through network, hence Red Hat considers the Attack Vector as local. To a successful attack be executed the attacker needs to set the right charset and be trick the user execute pkexec and as consequence it may leak partial, uncontrolled, contents from privileged files to the attacker.