CVE-2019-6133 (GCVE-0-2019-6133)
Vulnerability from cvelistv5
Published
2019-01-11 14:00
Modified
2024-08-04 20:16
Severity ?
CWE
  • n/a
Summary
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
References
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81 x_refsource_MISC
https://usn.ubuntu.com/3903-2/ vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:0230 vendor-advisory, x_refsource_REDHAT
https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf x_refsource_MISC
https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html mailing-list, x_refsource_MLIST
https://usn.ubuntu.com/3910-1/ vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3901-2/ vendor-advisory, x_refsource_UBUNTU
https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19 x_refsource_MISC
https://bugs.chromium.org/p/project-zero/issues/detail?id=1692 x_refsource_MISC
https://usn.ubuntu.com/3910-2/ vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:0420 vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3908-2/ vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3901-1/ vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3903-1/ vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/106537 vdb-entry, x_refsource_BID
https://usn.ubuntu.com/3908-1/ vendor-advisory, x_refsource_UBUNTU
https://support.f5.com/csp/article/K22715344 x_refsource_CONFIRM
https://usn.ubuntu.com/3934-1/ vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:0832 vendor-advisory, x_refsource_REDHAT
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html mailing-list, x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html mailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html vendor-advisory, x_refsource_SUSE
https://usn.ubuntu.com/3934-2/ vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2699 vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:2978 vendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:16:23.781Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81"
          },
          {
            "name": "USN-3903-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3903-2/"
          },
          {
            "name": "RHSA-2019:0230",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:0230"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf"
          },
          {
            "name": "[debian-lts-announce] 20190128 [SECURITY] [DLA 1644-1] policykit-1 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html"
          },
          {
            "name": "USN-3910-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3910-1/"
          },
          {
            "name": "USN-3901-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3901-2/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692"
          },
          {
            "name": "USN-3910-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3910-2/"
          },
          {
            "name": "RHSA-2019:0420",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:0420"
          },
          {
            "name": "USN-3908-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3908-2/"
          },
          {
            "name": "USN-3901-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3901-1/"
          },
          {
            "name": "USN-3903-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3903-1/"
          },
          {
            "name": "106537",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106537"
          },
          {
            "name": "USN-3908-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3908-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K22715344"
          },
          {
            "name": "USN-3934-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3934-1/"
          },
          {
            "name": "RHSA-2019:0832",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:0832"
          },
          {
            "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"
          },
          {
            "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"
          },
          {
            "name": "openSUSE-SU-2019:1914",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html"
          },
          {
            "name": "USN-3934-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3934-2/"
          },
          {
            "name": "RHSA-2019:2699",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2699"
          },
          {
            "name": "RHSA-2019:2978",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2978"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-01-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "In PolicyKit (aka polkit) 0.115, the \"start time\" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-08T12:06:21.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81"
        },
        {
          "name": "USN-3903-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3903-2/"
        },
        {
          "name": "RHSA-2019:0230",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:0230"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf"
        },
        {
          "name": "[debian-lts-announce] 20190128 [SECURITY] [DLA 1644-1] policykit-1 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html"
        },
        {
          "name": "USN-3910-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3910-1/"
        },
        {
          "name": "USN-3901-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3901-2/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692"
        },
        {
          "name": "USN-3910-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3910-2/"
        },
        {
          "name": "RHSA-2019:0420",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:0420"
        },
        {
          "name": "USN-3908-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3908-2/"
        },
        {
          "name": "USN-3901-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3901-1/"
        },
        {
          "name": "USN-3903-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3903-1/"
        },
        {
          "name": "106537",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106537"
        },
        {
          "name": "USN-3908-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3908-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K22715344"
        },
        {
          "name": "USN-3934-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3934-1/"
        },
        {
          "name": "RHSA-2019:0832",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:0832"
        },
        {
          "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"
        },
        {
          "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"
        },
        {
          "name": "openSUSE-SU-2019:1914",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html"
        },
        {
          "name": "USN-3934-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3934-2/"
        },
        {
          "name": "RHSA-2019:2699",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2699"
        },
        {
          "name": "RHSA-2019:2978",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2978"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-6133",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In PolicyKit (aka polkit) 0.115, the \"start time\" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81",
              "refsource": "MISC",
              "url": "https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81"
            },
            {
              "name": "USN-3903-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3903-2/"
            },
            {
              "name": "RHSA-2019:0230",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:0230"
            },
            {
              "name": "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf",
              "refsource": "MISC",
              "url": "https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf"
            },
            {
              "name": "[debian-lts-announce] 20190128 [SECURITY] [DLA 1644-1] policykit-1 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html"
            },
            {
              "name": "USN-3910-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3910-1/"
            },
            {
              "name": "USN-3901-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3901-2/"
            },
            {
              "name": "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19",
              "refsource": "MISC",
              "url": "https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19"
            },
            {
              "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692",
              "refsource": "MISC",
              "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1692"
            },
            {
              "name": "USN-3910-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3910-2/"
            },
            {
              "name": "RHSA-2019:0420",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:0420"
            },
            {
              "name": "USN-3908-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3908-2/"
            },
            {
              "name": "USN-3901-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3901-1/"
            },
            {
              "name": "USN-3903-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3903-1/"
            },
            {
              "name": "106537",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106537"
            },
            {
              "name": "USN-3908-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3908-1/"
            },
            {
              "name": "https://support.f5.com/csp/article/K22715344",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K22715344"
            },
            {
              "name": "USN-3934-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3934-1/"
            },
            {
              "name": "RHSA-2019:0832",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:0832"
            },
            {
              "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html"
            },
            {
              "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html"
            },
            {
              "name": "openSUSE-SU-2019:1914",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html"
            },
            {
              "name": "USN-3934-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3934-2/"
            },
            {
              "name": "RHSA-2019:2699",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2699"
            },
            {
              "name": "RHSA-2019:2978",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2978"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-6133",
    "datePublished": "2019-01-11T14:00:00.000Z",
    "dateReserved": "2019-01-11T00:00:00.000Z",
    "dateUpdated": "2024-08-04T20:16:23.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…