------------------------------------------------------------------------- Debian LTS Advisory DLA-4553-1 [email protected] https://www.debian.org/lts/security/ Andreas Henriksson April 29, 2026 https://wiki.debian.org/LTS -------------------------------------------------------------------------
Package : policykit-1 Version : 0.105-31+deb11u2 CVE ID : CVE-2021-4115 CVE-2026-4897 Debian Bug : 1005784 1132234 Multiple vulnerabilities where identified in polkit, a toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes. CVE-2021-4115 Kevin Backhouse of GitHub Security Lab (GHSL) found that there is a file descriptor leak in polkit, which can enable an unprivileged user to cause polkit to crash, due to file descriptor exhaustion. This could lead to currently ongoing authentication attempts to fail to authenticate resulting in a Denial of Service (DoS). CVE-2026-4897 Pavel Kohout, Aisle Research found that a local user provide a specially crafted, excessively long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input can lead to an out-of-memory (OOM) condition, resulting in a Denial of Service (DoS) for the system. For Debian 11 bullseye, these problems have been fixed in version 0.105-31+deb11u2. We recommend that you upgrade your policykit-1 packages. For the detailed security status of policykit-1 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/policykit-1 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
signature.asc
Description: PGP signature
