A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "12.2.1.3.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "12.2.1.4.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.8"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.7"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "3.3.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "1.0-update3_build5871"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "v8-build14338"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*",
"extracted_events": [
{
"last_affected": "15.0-sp2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"extracted_events": [
{
"last_affected": "14.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"extracted_events": [
{
"last_affected": "16.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "18.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "20.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "21.10"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.3"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.7"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.7"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "2.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15-sp2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*",
"extracted_events": [
{
"last_affected": "15-sp2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*",
"extracted_events": [
{
"last_affected": "15-sp2"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "12-sp5"
}
]
}
]
}{
"source": [
"CPE_FIELD",
"REFERENCES"
],
"cpe": "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "121"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4034.json"
"2026-04-12T01:58:47Z"
[
{
"source": "https://gitlab.freedesktop.org/polkit/polkit@a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
"digest": {
"length": 9742.0,
"function_hash": "32570418561053402702943127759871466400"
},
"signature_type": "Function",
"signature_version": "v1",
"target": {
"function": "main",
"file": "src/programs/pkexec.c"
},
"deprecated": false,
"id": "CVE-2021-4034-314cbecc"
},
{
"source": "https://gitlab.freedesktop.org/polkit/polkit@a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
"digest": {
"line_hashes": [
"213998750295636857179079909536485960320",
"278734282904971204434169771972003805228",
"19650700869071089274018684711323071243",
"168828756042991529351455686026289160629",
"40690998152194075775332422815916804684",
"13939387846029825278873453783023749278",
"252652119165071349920865803595180110656",
"70320173189091660192941128994028468583",
"107583928421380347849317833122769418756",
"306196123157583984374424451218656751827",
"144736080548638912673426995235414810295",
"98087446916703697762879769665415488591",
"218819539977279485871861530533275995832",
"32024447173852229240787042447495035321"
],
"threshold": 0.9
},
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/programs/pkexec.c"
},
"id": "CVE-2021-4034-925219d0",
"signature_type": "Line"
},
{
"source": "https://gitlab.freedesktop.org/polkit/polkit@a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
"digest": {
"length": 5706.0,
"function_hash": "48916128638231852043721993153747674346"
},
"id": "CVE-2021-4034-bd0a4981",
"signature_version": "v1",
"target": {
"function": "main",
"file": "src/programs/pkcheck.c"
},
"signature_type": "Function",
"deprecated": false
},
{
"source": "https://gitlab.freedesktop.org/polkit/polkit@a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
"digest": {
"line_hashes": [
"273856761981597668010333138287779505402",
"173734811988144302255653828186019334929",
"215501817520057129252303208780659306627"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/programs/pkcheck.c"
},
"deprecated": false,
"id": "CVE-2021-4034-e0984eb7"
}
]