CVE-2019-6133
moderate-risk
Published 2019-01-11
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (17)
Affected Vendors
References (50)
Third Party Advisory
http://www.securityfocus.com/bid/106537
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0230
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0420
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0832
Third Party Advisory
https://support.f5.com/csp/article/K22715344
Third Party Advisory
https://usn.ubuntu.com/3901-1/
Third Party Advisory
https://usn.ubuntu.com/3901-2/
Third Party Advisory
https://usn.ubuntu.com/3903-1/
Third Party Advisory
https://usn.ubuntu.com/3903-2/
Third Party Advisory
https://usn.ubuntu.com/3908-1/
and 30 more references
36
/ 100
moderate-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
19/34 · Moderate