← Volver a CVEs
CVE-2019-6133
N/ADescripcion
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado1/11/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxpolkit_project:polkitredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Debilidades (CWE)
CWE-362
Referencias
http://www.securityfocus.com/bid/106537(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0230(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0420(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0832(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:2699(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:2978(cve@mitre.org)
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81(cve@mitre.org)
https://support.f5.com/csp/article/K22715344(cve@mitre.org)
https://usn.ubuntu.com/3901-1/(cve@mitre.org)
https://usn.ubuntu.com/3901-2/(cve@mitre.org)
https://usn.ubuntu.com/3903-1/(cve@mitre.org)
https://usn.ubuntu.com/3903-2/(cve@mitre.org)
https://usn.ubuntu.com/3908-1/(cve@mitre.org)
https://usn.ubuntu.com/3908-2/(cve@mitre.org)
https://usn.ubuntu.com/3910-1/(cve@mitre.org)
https://usn.ubuntu.com/3910-2/(cve@mitre.org)
https://usn.ubuntu.com/3934-1/(cve@mitre.org)
https://usn.ubuntu.com/3934-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106537(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0230(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0420(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0832(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2699(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2978(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1692(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K22715344(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3901-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3901-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3903-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3903-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3908-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3908-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3910-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3910-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3934-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3934-2/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.