|Max CVSS||7.2||Min CVSS||4.4||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendin
|28-05-2019 - 19:29||11-01-2019 - 14:29|
Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new A
|22-04-2019 - 17:48||03-10-2013 - 21:55|
Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
|19-12-2012 - 04:39||31-05-2011 - 20:55|