CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “polkit_project”

9 vulnerabilities found for “polkit_project”

CVE-2021-4115
MEDIUM5.5

There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned

polkit_project / polkit+7
Local
Published Feb 21, 2022
CVE-2021-3560
HIGH7.8

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

polkit_project / polkit+5
Local
Published Feb 16, 2022
CVE-2021-4034
HIGH7.8

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

polkit_project / polkit+53
Local
Published Jan 28, 2022
CVE-2013-4161
HIGH7.8

gksu-polkit-0.0.3-6.fc18 was reported as fixing the issue in CVE-2012-5617 but the patch was improperly applied and it did not fixed the security issue.

gksu-polkit_project / gksu-polkit+2
Local
Published Dec 31, 2019
CVE-2012-5617
HIGH7.8

gksu-polkit: permissive PolicyKit policy configuration file allows privilege escalation

gksu-polkit_project / gksu-polkit+2
Local
Published Nov 25, 2019
CVE-2011-0703
CRITICAL9.8

In gksu-polkit before 0.0.3, the source file for xauth may contain arbitrary commands that may allow an attacker to overtake an administrator X11 session.

gksu-polkit_project / gksu-polkit+1
Network
Published Nov 15, 2019
CVE-2019-6133
MEDIUM6.7

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

polkit_project / polkit+16
Local
Published Jan 11, 2019
CVE-2018-19788
HIGH8.8

A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.

polkit_project / polkit+7
Network
Published Dec 3, 2018
CVE-2018-1116
MEDIUM4.4

A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.

debian / debian_linux+2
Local
Published Jul 10, 2018