Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-4115

Published: 14 February 2022

There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned

Notes

AuthorNote
mdeslaur
Introduced by backported patch in focal+:
PolkitSystemBusName-Retrieve-both-pid-and-uid.patch

Priority

Medium

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
policykit-1
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal
Released (0.105-26ubuntu1.3)
impish
Released (0.105-31ubuntu0.2)
jammy Not vulnerable
(0.105-32)
trusty Not vulnerable
(code not present)
upstream Needs triage

xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/freedesktop/polkit/commit/41cb093f554da8772362654a128a84dd8a5542a7

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H