Debian Policykit-1 vulnerabilities

18 known vulnerabilities affecting debian/policykit-1.

Total CVEs
18
CISA KEV
2
actively exploited
Public exploits
3
Exploited in wild
2
Severity breakdown
HIGH3MEDIUM8LOW7

Vulnerabilities

Page 1 of 1
CVE-2026-4897MEDIUMCVSS 5.52026
CVE-2026-4897 [MEDIUM] CVE-2026-4897: policykit-1 - A flaw was found in polkit. A local user can exploit this by providing a special... A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input can lead to an out-of-memory (OOM) condition, resulting in a Denial of Service (DoS) for the system. Scope: local bookworm: open bullseye: open forky: open
debian
CVE-2025-7519LOWCVSS 6.7fixed in policykit-1 127-1 (forky)2025
CVE-2025-7519 [MEDIUM] CVE-2025-7519: policykit-1 - A flaw was found in polkit. When processing an XML policy with 32 or more nested... A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file proper
debian
CVE-2021-3560HIGHCVSS 7.8KEVPoCfixed in policykit-1 0.105-31 (bookworm)2021
CVE-2021-3560 [HIGH] CVE-2021-3560: policykit-1 - It was found that polkit could be tricked into bypassing the credential checks f... It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as sys
debian
CVE-2021-4034HIGHCVSS 7.8KEVPoCfixed in policykit-1 0.105-31.1 (bookworm)2021
CVE-2021-4034 [HIGH] CVE-2021-4034: policykit-1 - A local privilege escalation vulnerability was found on polkit's pkexec utility.... A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as comma
debian
CVE-2021-4115MEDIUMCVSS 5.5fixed in policykit-1 0.105-32 (bookworm)2021
CVE-2021-4115 [MEDIUM] CVE-2021-4115: policykit-1 - There is a flaw in polkit which can allow an unprivileged user to cause polkit t... There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned Scope: local bookworm: resolved (fixed in 0.105-32) bullseye
debian
CVE-2019-6133MEDIUMCVSS 6.7fixed in linux 4.19.16-1 (bookworm)2019
CVE-2019-6133 [MEDIUM] CVE-2019-6133: linux - In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be by... In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. Scope: local bookworm: resolved (fixed in 4.19.16-1) bullseye: resolved (fixed in 4.19.16-1) forky
debian
CVE-2018-19788HIGHCVSS 8.8fixed in policykit-1 0.105-23 (bookworm)2018
CVE-2018-19788 [HIGH] CVE-2018-19788: policykit-1 - A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid g... A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command. Scope: local bookworm: resolved (fixed in 0.105-23) bullseye: resolved (fixed in 0.105-23) forky: resolved (fixed in 0.105-23) sid: resolved (fixed in 0.105-23) trixie: resolved (fixed in 0.105-23)
debian
CVE-2018-1116MEDIUMCVSS 4.4fixed in policykit-1 0.105-21 (bookworm)2018
CVE-2018-1116 [MEDIUM] CVE-2018-1116: policykit-1 - A flaw was found in polkit before version 0.116. The implementation of the polki... A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. Scope: local bookworm: resolved (fixed in 0.105
debian
CVE-2016-2568LOWCVSS 7.8fixed in policykit-1 123-1 (forky)2016
CVE-2016-2568 [HIGH] CVE-2016-2568: policykit-1 - pkexec, when used with --user nonpriv, allows local users to escape to the paren... pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 123-1) sid: resolved (fixed in 123-1) trixie: resolved (fixed in 123-1)
debian
CVE-2015-3255MEDIUMCVSS 4.6fixed in policykit-1 0.105-12 (bookworm)2015
CVE-2015-3255 [MEDIUM] CVE-2015-3255: policykit-1 - The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactio... The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions. Scope: local bookworm: resolved (fixed in 0.105-12) bullseye: resolved (fixed in 0.105-12) forky: resolved (fixed in 0.105-12) sid: resolved (fix
debian
CVE-2015-3256LOWCVSS 4.62015
CVE-2015-3256 [MEDIUM] CVE-2015-3256: policykit-1 - PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of serv... PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation." Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2015-3218LOWCVSS 2.1fixed in policykit-1 0.105-11 (bookworm)2015
CVE-2015-3218 [LOW] CVE-2015-3218: policykit-1 - The authentication_agent_new function in polkitbackend/polkitbackendinteractivea... The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path. Scope: local bookworm: resolved (fixed in 0.105-11) bullseye: resolve
debian
CVE-2015-4625LOWCVSS 4.6fixed in policykit-1 0.105-12 (bookworm)2015
CVE-2015-4625 [MEDIUM] CVE-2015-4625: policykit-1 - Integer overflow in the authentication_agent_new_cookie function in PolicyKit (a... Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value. Scope: local bookworm: resolved (fixed in 0.105-12) bullseye: resolved (fixed in 0.105-12) forky: resolved (fixed in 0.105
debian
CVE-2013-4288LOWCVSS 7.2fixed in policykit-1 0.105-3+nmu1 (bookworm)2013
CVE-2013-4288 [HIGH] CVE-2013-4288: policykit-1 - Race condition in PolicyKit (aka polkit) allows local users to bypass intended P... Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck. Scope: local
debian
CVE-2011-1485MEDIUMCVSS 6.9PoCfixed in policykit-1 0.101-4 (bookworm)2011
CVE-2011-1485 [MEDIUM] CVE-2011-1485: policykit-1 - Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit... Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID. Scope: local bookworm: resolved (fixed in 0.101-4) bullseye: resolved (fixed in 0.101-4) forky: resolved (fixed in 0.101-4)
debian
CVE-2011-4945MEDIUMCVSS 6.9fixed in policykit-1 0.103-1 (bookworm)2011
CVE-2011-4945 [MEDIUM] CVE-2011-4945: policykit-1 - PolicyKit 0.103 sets the AdminIdentities to "wheel" by default, which allows loc... PolicyKit 0.103 sets the AdminIdentities to "wheel" by default, which allows local users in the wheel group to gain root privileges without authentication. Scope: local bookworm: resolved (fixed in 0.103-1) bullseye: resolved (fixed in 0.103-1) forky: resolved (fixed in 0.103-1) sid: resolved (fixed in 0.103-1) trixie: resolved (fixed in 0.103-1)
debian
CVE-2010-0750LOWCVSS 2.12010
CVE-2010-0750 [LOW] CVE-2010-0750: policykit-1 - pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determin... pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2008-1658MEDIUMCVSS 4.6fixed in policykit-1 0.8-1 (bookworm)2008
CVE-2008-1658 [MEDIUM] CVE-2008-1658: policykit-1 - Format string vulnerability in the grant helper (polkit-grant-helper.c) in Polic... Format string vulnerability in the grant helper (polkit-grant-helper.c) in PolicyKit 0.7 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in a password. Scope: local bookworm: resolved (fixed in 0.8-1) bullseye: resolved (fixed in 0.8-1) forky: resolved (fixed in 0.8-1) sid: resolved (fixed
debian