In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2019-01-11 14:29
Updated : 2020-08-24 17:37
NVD link : CVE-2019-6133
Mitre link : CVE-2019-6133
CVE.ORG link : CVE-2019-6133
JSON object : View
Products Affected
                redhat
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_workstation
- enterprise_linux_server_tus
canonical
- ubuntu_linux
polkit_project
- polkit
debian
- debian_linux
CWE
                
                    
                        
                        CWE-362
                        
            Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
