{
  "threat_severity" : "Important",
  "public_date" : "2021-06-03T06:55:00Z",
  "bugzilla" : {
    "description" : "polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync()",
    "id" : "1961710",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1961710"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-754",
  "details" : [ "It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." ],
  "acknowledgement" : "Red Hat would like to thank Kevin Backhouse (GitHub Security Lab) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-06-03T00:00:00Z",
    "advisory" : "RHSA-2021:2238",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "polkit-0:0.115-11.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Extended Update Support",
    "release_date" : "2021-06-03T00:00:00Z",
    "advisory" : "RHSA-2021:2236",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.1",
    "package" : "polkit-0:0.115-9.el8_1.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2021-06-03T00:00:00Z",
    "advisory" : "RHSA-2021:2237",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "polkit-0:0.115-11.el8_2.1"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-07-06T00:00:00Z",
    "advisory" : "RHSA-2021:2555",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el7",
    "package" : "cri-o-0:1.20.3-6.rhaos4.7.git0d0f863.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-07-06T00:00:00Z",
    "advisory" : "RHSA-2021:2555",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el7",
    "package" : "dhcp-12:4.3.6-41.el8_3.1"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-07-06T00:00:00Z",
    "advisory" : "RHSA-2021:2555",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el7",
    "package" : "openshift-clients-0:4.7.0-202106252127.p0.git.8b4b094.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-07-06T00:00:00Z",
    "advisory" : "RHSA-2021:2555",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el7",
    "package" : "openshift-kuryr-0:4.7.0-202106232224.p0.git.c7654fb.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.7",
    "release_date" : "2021-07-06T00:00:00Z",
    "advisory" : "RHSA-2021:2555",
    "cpe" : "cpe:/a:redhat:openshift:4.7::el7",
    "package" : "polkit-0:0.115-11.el8_3.2"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8",
    "release_date" : "2021-06-22T00:00:00Z",
    "advisory" : "RHSA-2021:2522",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
    "package" : "redhat-virtualization-host-0:4.4.6-20210615.0.el8_4"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "polkit",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "polkit",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "polkit",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-3560\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-3560\nhttps://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog" ],
  "name" : "CVE-2021-3560",
  "mitigation" : {
    "value" : "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
    "lang" : "en:us"
  },
  "csaw" : false
}