|Max CVSS||9.0||Min CVSS||3.6||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new A
|16-11-2020 - 20:11||03-10-2013 - 21:55|
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendin
|24-08-2020 - 17:37||11-01-2019 - 14:29|
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other
|05-05-2020 - 16:05||10-07-2018 - 19:29|
A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
|06-08-2019 - 17:15||03-12-2018 - 06:29|
|30-10-2018 - 16:27||26-10-2015 - 19:59|
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
|19-12-2012 - 04:39||31-05-2011 - 20:55|