polkit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the polkit package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Authorization

<0:0.112-26.el7
  • M
Improper Authentication

<0:0.112-22.el7
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • H
Out-of-bounds Read

<0:0.112-26.el7_9.1
  • H
Out-of-bounds Read

<0:0.112-18.el7_6.3
  • H
Out-of-bounds Read

<0:0.112-18.el7_6.3
  • H
Out-of-bounds Read

<0:0.112-22.el7_7.2
  • H
Out-of-bounds Read

<0:0.112-12.el7_3.1
  • H
Out-of-bounds Read

<0:0.112-22.el7_7.2
  • H
Out-of-bounds Read

<0:0.112-12.el7_4.2
  • H
Out-of-bounds Read

<0:0.112-18.el7_6.3
  • H
Out-of-bounds Read

<0:0.112-26.el7_9.1
  • H
Out-of-bounds Read

<0:0.112-22.el7_7.2
  • H
Insufficient Comparison

<0:0.112-12.el7_4.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-12.el7_4.1
  • H
Insufficient Comparison

<0:0.112-12.el7_4.1
  • H
Insufficient Comparison

<0:0.112-12.el7_4.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-14.el7_5.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • H
Insufficient Comparison

<0:0.112-18.el7_6.1
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Access Restriction Bypass

<0:0.112-6.el7_2
  • M
Improper Authentication

<0:0.112-22.el7
  • M
Improper Authentication

<0:0.112-18.el7_6.2
  • M
Improper Authentication

<0:0.112-18.el7_6.2
  • M
Improper Authentication

<0:0.112-22.el7
  • M
Improper Authentication

<0:0.112-22.el7
  • M
Improper Authentication

<0:0.112-18.el7_6.2
  • M
Improper Authentication

<0:0.112-22.el7
  • M
Improper Authentication

<0:0.112-18.el7_6.2
  • M
Improper Authentication

<0:0.112-22.el7
  • L
Improper Authorization

<0:0.112-26.el7
  • M
Privilege Context Switching Error

*
  • L
Integer Overflow or Wraparound

*
  • M
Access Restriction Bypass

*
  • L
CVE-2015-3218

*