← Voltar para CVEs
CVE-2019-6133
N/ADescricao
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado1/11/2019
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxpolkit_project:polkitredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation
Fraquezas (CWE)
CWE-362
Referencias
http://www.securityfocus.com/bid/106537(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0230(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0420(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:0832(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:2699(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2019:2978(cve@mitre.org)
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81(cve@mitre.org)
https://support.f5.com/csp/article/K22715344(cve@mitre.org)
https://usn.ubuntu.com/3901-1/(cve@mitre.org)
https://usn.ubuntu.com/3901-2/(cve@mitre.org)
https://usn.ubuntu.com/3903-1/(cve@mitre.org)
https://usn.ubuntu.com/3903-2/(cve@mitre.org)
https://usn.ubuntu.com/3908-1/(cve@mitre.org)
https://usn.ubuntu.com/3908-2/(cve@mitre.org)
https://usn.ubuntu.com/3910-1/(cve@mitre.org)
https://usn.ubuntu.com/3910-2/(cve@mitre.org)
https://usn.ubuntu.com/3934-1/(cve@mitre.org)
https://usn.ubuntu.com/3934-2/(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106537(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0230(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0420(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0832(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2699(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2978(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1692(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K22715344(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3901-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3901-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3903-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3903-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3908-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3908-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3910-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3910-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3934-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3934-2/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.