Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j6c-jrh9-mvqm

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

EPSS

Процентиль: 5%
0.00023
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 7.3
redhat
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
nvd
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
debian
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...

suse-cvrf
почти 6 лет назад

Security update for polkit

EPSS

Процентиль: 5%
0.00023
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-362