CVE-2025-7519
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-14

Last updated on: 2025-08-11

Assigner: Red Hat, Inc.

Description
A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-14
Last Modified
2025-08-11
Generated
2026-05-07
AI Q&A
2025-07-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 8.0
redhat openshift_container_platform 4.0
redhat enterprise_linux 6.0
redhat enterprise_linux 7.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in polkit occurs when it processes an XML policy file containing 32 or more nested elements. This can trigger an out-of-bounds write, potentially causing the polkit service to crash or behave unexpectedly. There is also a possibility that arbitrary code execution could occur. Exploiting this flaw requires a high-privilege account to place the malicious policy file. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can cause the polkit service to crash or behave unpredictably, which may disrupt system operations. Additionally, there is a risk of arbitrary code execution, which could allow an attacker with high privileges to execute malicious code on the system, potentially compromising system integrity and security. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that only trusted high-privilege users have the ability to place or modify polkit XML policy files. Review and restrict permissions on policy files to prevent unauthorized modifications. Additionally, monitor for updates or patches from your Linux distribution and apply them promptly once available. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart