HomePolkit ProjectCVE-2019-6133

CVE-2019-6133

MEDIUM
6.7CVSS
Published: 2019-01-11
Updated: 2024-11-21
AI Analysis

Description

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS Metrics

Vector
CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
high
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-362

Metadata

Primary Vendor
POLKIT_PROJECT
Published
1/11/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

polkit_project : polkitdebian : debian_linuxredhat : enterprise_linux_desktopredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_eusredhat : enterprise_linux_server_tusredhat : enterprise_linux_workstationredhat : enterprise_linux_desktopredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_workstationcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-6133 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com