CVE-2018-1116

A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

Configuration 3 (hide)

cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1116 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1116 - Issue Tracking, Patch
References () https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 - Patch, Third Party Advisory () https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00042.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00042.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201908-14 - Third Party Advisory () https://security.gentoo.org/glsa/201908-14 - Third Party Advisory
References () https://usn.ubuntu.com/3717-2/ - Third Party Advisory () https://usn.ubuntu.com/3717-2/ - Third Party Advisory

Information

Published : 2018-07-10 19:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1116

Mitre link : CVE-2018-1116

CVE.ORG link : CVE-2018-1116


JSON object : View

Products Affected

canonical

  • ubuntu_linux

polkit_project

  • polkit

debian

  • debian_linux
CWE
CWE-285

Improper Authorization

CWE-862

Missing Authorization