It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 14 Aug 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-13T16:28:24.142Z
Reserved: 2021-05-20T00:00:00.000Z
Link: CVE-2021-3560

Updated: 2024-08-03T17:01:06.571Z

Status : Modified
Published: 2022-02-16T19:15:08.450
Modified: 2025-01-29T22:15:27.463
Link: CVE-2021-3560
