4.4
CVSSv2

CVE-2019-6133

Published: 11/01/2019 Updated: 24/08/2020
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

polkit project polkit 0.115

debian debian linux 8.0

redhat enterprise linux server 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux desktop 7.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server aus 6.6

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

canonical ubuntu linux 18.10

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

Vendor Advisories

Debian Bug report logs - #918985 policykit-1: CVE-2019-6133: temporary auth hijacking via PID reuse and non-atomic fork Package: src:policykit-1; Maintainer for src:policykit-1 is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, ...
Synopsis Important: polkit security update Type/Severity Security Advisory: Important Topic An update for polkit is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: polkit security update Type/Severity Security Advisory: Important Topic An update for polkit is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: polkit security update Type/Severity Security Advisory: Important Topic An update for polkit is now available for Red Hat Enterprise Linux 66 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: polkit security update Type/Severity Security Advisory: Important Topic An update for polkit is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Synopsis Important: polkit security update Type/Severity Security Advisory: Important Topic An update for polkit is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
A vulnerability was found in polkit When authentication is performed by a non-root user to perform an administrative task, the authentication is temporarily cached in such a way that a local attacker could impersonate the authorized process, thus gaining access to elevated privileges(CVE-2019-6133) ...
The system could be made to run programs as an administrator ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
PolicyKit could allow unintended access ...
The system could be made to run programs as an administrator ...
PolicyKit could allow unintended access ...
A vulnerability was found in polkit When authentication is performed by a non-root user to perform an administrative task, the authentication is temporarily cached in such a way that a local attacker could impersonate the authorized process, thus gaining access to elevated privileges ...
In PolicyKit (aka polkit) 0115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthorityc ...