The Qualys research team has discovered a vulnerability in polkit's pkexec, a program that is installed by default on all major Linux distributions. This vulnerability allows any non-privileged user to gain full root privileges on a host locally with its default settings.
What is Polkit pkexec?
Polkit, formerly known as PolicyKit, is a component for controlling privileges on Unix operating systems.
In short, it provides us with an organized way for unprivileged processes to communicate with privileged processes.
What impact does the PwnKit vulnerability have?
Exploitation of this vulnerability allows any user without privileges to gain root privileges. Qualys researchers have carried out checks on different distributions with the default installation and this has been the result:
Other Linux distributions are probably vulnerable.
This vulnerability has been around for over twelve years and affects all versions of pkexec since it was first published in 2009.
How can it be fixed?
Currently, the best solution is to update all Linux distributions that provide a backport  of the fix (requires a reboot).
As a temporary mitigation measure, you can also run the following command:
chmod 0755 /usr/bin/pkexec
Impact on SW Hosting?
At SW Hosting we have a high priority regarding the security of all our services.
That is why both in the deployment of Clouds and Hostings this vulnerability is not present.
- backport: is the action of carrying out a modification to an old version of software with contributions or patches originating from later versions.