Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Opensuse Subscribe
Opensuse Subscribe
Polkit Project Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2013-4184 Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
Ubuntu USN Ubuntu USN USN-1953-1 polkit vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00033}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T16:38:01.939Z

Reserved: 2013-06-12T00:00:00

Link: CVE-2013-4288

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-10-03T21:55:04.257

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-4288

cve-icon Redhat

Severity : Important

Publid Date: 2013-09-18T00:00:00Z

Links: CVE-2013-4288 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses