CVE-2019-6133

Name
CVE-2019-6133
Description
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19
Patch https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81
Patch https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf
Issue Tracking https://bugs.chromium.org/p/project-zero/issues/detail?id=1692
Third Party Advisory http://www.securityfocus.com/bid/106537
Mailing List https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:0230
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:0420
Third Party Advisory https://usn.ubuntu.com/3901-2/
Third Party Advisory https://usn.ubuntu.com/3901-1/
Third Party Advisory https://usn.ubuntu.com/3903-2/
Third Party Advisory https://usn.ubuntu.com/3903-1/
Third Party Advisory https://usn.ubuntu.com/3908-1/
Third Party Advisory https://usn.ubuntu.com/3908-2/
Third Party Advisory https://usn.ubuntu.com/3910-2/
Third Party Advisory https://usn.ubuntu.com/3910-1/
Third Party Advisory https://support.f5.com/csp/article/K22715344
Third Party Advisory https://usn.ubuntu.com/3934-1/
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:0832
MLIST https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
MLIST https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html
UBUNTU https://usn.ubuntu.com/3934-2/
REDHAT https://access.redhat.com/errata/RHSA-2019:2699
REDHAT https://access.redhat.com/errata/RHSA-2019:2978

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:polkit_project:polkit:0.115:*:*:*:*:*:*:* polkit == None == 0.115

Vulnerable and fixed packages

Source package Branch Version Maintainer Status