Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2019-0420

Опубликовано: 26 фев. 2019
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2019-0420: polkit security update (IMPORTANT)

[0.96-11.el6_10.1]

  • Fix of CVE-2019-6133, PID reuse via slow fork
  • Resolves: rhbz#1667310

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

polkit

0.96-11.el6_10.1

polkit-desktop-policy

0.96-11.el6_10.1

polkit-devel

0.96-11.el6_10.1

polkit-docs

0.96-11.el6_10.1

Oracle Linux i686

polkit

0.96-11.el6_10.1

polkit-desktop-policy

0.96-11.el6_10.1

polkit-devel

0.96-11.el6_10.1

polkit-docs

0.96-11.el6_10.1

Связанные CVE

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 7.3
redhat
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
nvd
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

CVSS3: 6.7
debian
больше 6 лет назад

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...

suse-cvrf
почти 6 лет назад

Security update for polkit