polkit_project CVE Vulnerabilities & Metrics

Focus on polkit_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About polkit_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with polkit_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total polkit_project CVEs: 10
Earliest CVE date: 03 Oct 2013, 21:55 UTC
Latest CVE date: 21 Feb 2022, 22:15 UTC

Latest CVE reference: CVE-2021-4115

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical polkit_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.15

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 4
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS polkit_project CVEs

These are the five CVEs with the highest CVSS scores for polkit_project, sorted by severity first and recency.

All CVEs for polkit_project

CVE-2021-4115 polkit_project vulnerability CVSS: 2.1 21 Feb 2022, 22:15 UTC

There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned

CVE-2021-3560 polkit_project vulnerability CVSS: 7.2 16 Feb 2022, 19:15 UTC

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2021-4034 polkit_project vulnerability CVSS: 7.2 28 Jan 2022, 20:15 UTC

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

CVE-2019-6133 polkit_project vulnerability CVSS: 4.4 11 Jan 2019, 14:29 UTC

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVE-2018-19788 polkit_project vulnerability CVSS: 9.0 03 Dec 2018, 06:29 UTC

A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.

CVE-2018-1116 polkit_project vulnerability CVSS: 3.6 10 Jul 2018, 19:29 UTC

A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.

CVE-2015-4625 polkit_project vulnerability CVSS: 4.6 26 Oct 2015, 19:59 UTC

Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.

CVE-2015-3256 polkit_project vulnerability CVSS: 4.6 26 Oct 2015, 19:59 UTC

PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."

CVE-2015-3255 polkit_project vulnerability CVSS: 4.6 26 Oct 2015, 19:59 UTC

The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.

CVE-2015-3218 polkit_project vulnerability CVSS: 2.1 26 Oct 2015, 19:59 UTC

The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.

CVE-2013-4288 polkit_project vulnerability CVSS: 7.2 03 Oct 2013, 21:55 UTC

Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.