In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1644-1 | policykit-1 security update |
Debian DLA |
DLA-1799-1 | linux security update |
Debian DLA |
DLA-1799-2 | linux security update |
EUVD |
EUVD-2019-15700 | In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. |
Ubuntu USN |
USN-3901-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3901-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3903-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3903-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3908-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3908-2 | Linux kernel (Trusty HWE) vulnerability |
Ubuntu USN |
USN-3910-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3910-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3934-1 | PolicyKit vulnerability |
Ubuntu USN |
USN-3934-2 | PolicyKit vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:16:23.781Z
Reserved: 2019-01-11T00:00:00
Link: CVE-2019-6133
No data.
Status : Modified
Published: 2019-01-11T14:29:00.390
Modified: 2024-11-21T04:46:00.397
Link: CVE-2019-6133
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN