CVE-2019-6133

Source
Severity High
Remote No
Type Authentication bypass
Description
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Group Package Affected Fixed Severity Status Ticket
AVG-897 polkit 0.115+24+g5230646-1 High Vulnerable FS#61751
References
https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81#0cf68d1183ea5299db7cd71b8377fa3d29e1a63e