Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
References
Configurations
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058752.html - Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059859.html - Patch | |
References | () http://secunia.com/advisories/48817 - | |
References | () http://security.gentoo.org/glsa/glsa-201204-06.xml - | |
References | () http://securityreason.com/securityalert/8424 - | |
References | () http://www.debian.org/security/2011/dsa-2319 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:086 - | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0455.html - | |
References | () http://www.ubuntu.com/usn/USN-1117-1 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=692922 - Patch |
Information
Published : 2011-05-31 20:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1485
Mitre link : CVE-2011-1485
CVE.ORG link : CVE-2011-1485
JSON object : View
Products Affected
redhat
- policykit
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')