CVE-2025-7519

A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

11 Aug 2025, 19:20

Type Values Removed Values Added
First Time Redhat enterprise Linux
Redhat
Redhat openshift Container Platform
References () https://access.redhat.com/security/cve/CVE-2025-7519 - () https://access.redhat.com/security/cve/CVE-2025-7519 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2379675 - () https://bugzilla.redhat.com/show_bug.cgi?id=2379675 - Issue Tracking
References () https://github.com/polkit-org/polkit/commit/107d3801361b9f9084f78710178e683391f1d245 - () https://github.com/polkit-org/polkit/commit/107d3801361b9f9084f78710178e683391f1d245 - Patch
References () https://github.com/polkit-org/polkit/pull/570 - () https://github.com/polkit-org/polkit/pull/570 - Patch
CPE cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

25 Jul 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) Se detectó una falla en polkit. Al procesar una política XML con 32 o más elementos anidados en profundidad, se puede activar una escritura fuera de los límites. Este problema puede provocar un bloqueo u otro comportamiento inesperado, y la ejecución de código arbitrario no se descarta. Para explotar esta falla, se requiere una cuenta con privilegios elevados, ya que es necesaria para colocar correctamente el archivo de política maliciosa.
References
  • () https://github.com/polkit-org/polkit/commit/107d3801361b9f9084f78710178e683391f1d245 -
  • () https://github.com/polkit-org/polkit/pull/570 -

14 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-14 14:15

Updated : 2025-08-11 19:20


NVD link : CVE-2025-7519

Mitre link : CVE-2025-7519

CVE.ORG link : CVE-2025-7519


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • enterprise_linux
CWE
CWE-787

Out-of-bounds Write