There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/cve-2021-4115 | third party advisory |
https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 | issue tracking patch exploit third party advisory |
https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGKWCBS6IDZYYDYM2WIWJM5BL7QQTWPF/ | vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html |