Polkit Project Polkit 0.112.1

CPE Details

Polkit Project Polkit 0.112.1
0.112.1
2020-11-09
17h34 +00:00
2020-11-09
17h34 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:polkit_project:polkit:0.112.1:*:*:*:*:*:*:*

Informations

Vendor

polkit_project

Product

polkit

Version

0.112.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-3560 2022-02-16 00h00 +00:00 It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
7.8
High
CVE-2021-4034 2022-01-28 00h00 +00:00 A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
7.8
High
CVE-2018-1116 2018-07-10 17h00 +00:00 A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
4.4
Medium