A race condition flaw was found in the PolicyKit pkexec utility and polkitd daemon. A local user could use this flaw to appear as a privileged user to pkexec, allowing them to execute arbitrary commands as root by running those commands with pkexec. Those vulnerable include RHEL6 prior to polkit-0.96-2.el6_0.1 and Ubuntu libpolkit-backend-1 prior to 0.96-2ubuntu1.1 (10.10) 0.96-2ubuntu0.1 (10.04 LTS) and 0.94-1ubuntu1.1 (9.10).
44c67bccd61b94ba8480766e3dc865358c7d2a64baf47923660508bc28f920c4
Gentoo Linux Security Advisory 201204-6 - Multiple vulnerabilities have been found in PolicyKit, the worst of which may allow a local attacker to gain root privileges. Versions less than 0.104-r1 are affected.
93ec59cdcfdba7ed45654ae2b831916e2ac8a536165e68aeba2de09b35d935c7
Debian Linux Security Advisory 2319-1 - Neel Mehta discovered that a race condition in Policykit, a framework for managing administrative policies and privileges, allowed local users to elevate privileges by executing a setuid program from pkexec.
fd9a38d6c26c6af336b66aff12b64ff3d28387145ad04a80f05937983c95217a
pkexec race condition privilege escalation exploit.
055dfe828e2174149cd6a6f47e2e9872df8b0c0a1d7903ed1d201259fe0bf81c
Linux pkexec and polkitd 0.96 race condition privilege escalation exploit.
65e120e540ab20fac7e8b0111a9b4dad151dd6197d642faf241f59ca37a33f28
PolicyKit versions 0.101 and below local privilege escalation exploit.
8e1577823139cfa501ce0535ad03ba8172e54feaed9443aab35fb42423be384b
Mandriva Linux Security Advisory 2011-086 - A race condition flaw was found in the PolicyKit pkexec utility and polkitd daemon. A local user could use this flaw to appear as a privileged user to pkexec, allowing them to execute arbitrary commands as root by running those commands with pkexec. The updated packages have been patched to correct this issue.
4d1378d24d238c4a412b7901ca0ad28b94cd0c13aeb47449cf04e14e9c9fa2d1
Ubuntu Security Notice 1117-1 - Neel Mehta discovered that PolicyKit did not correctly verify the user making authorization requests. A local attacker could exploit this to trick pkexec into running applications with root privileges.
4c6944cfa8da3fb2362a0b9f983fa2667e828c17e438aa809577c054cc336f17