Описание
Security update for polkit
This update for polkit fixes the following issues:
Security issue fixed:
- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass uid checking in the interactive backend (bsc#1121826).
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.0
libpolkit0-0.114-lp151.5.3.1
libpolkit0-32bit-0.114-lp151.5.3.1
polkit-0.114-lp151.5.3.1
polkit-devel-0.114-lp151.5.3.1
polkit-doc-0.114-lp151.5.3.1
typelib-1_0-Polkit-1_0-0.114-lp151.5.3.1
openSUSE Leap 15.1
libpolkit0-0.114-lp151.5.3.1
libpolkit0-32bit-0.114-lp151.5.3.1
polkit-0.114-lp151.5.3.1
polkit-devel-0.114-lp151.5.3.1
polkit-doc-0.114-lp151.5.3.1
typelib-1_0-Polkit-1_0-0.114-lp151.5.3.1
Ссылки
- E-Mail link for openSUSE-SU-2019:1914-1
- SUSE Security Ratings
- SUSE Bug 1121826
- SUSE CVE CVE-2019-6133 page
Описание
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Затронутые продукты
openSUSE Leap 15.0:libpolkit0-0.114-lp151.5.3.1
openSUSE Leap 15.0:libpolkit0-32bit-0.114-lp151.5.3.1
openSUSE Leap 15.0:polkit-0.114-lp151.5.3.1
openSUSE Leap 15.0:polkit-devel-0.114-lp151.5.3.1
Ссылки
- CVE-2019-6133
- SUSE Bug 1070943
- SUSE Bug 1121826
- SUSE Bug 1121872