CVE-2019-6133 (https://nvd.nist.gov/vuln/detail/CVE-2019-6133): In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
@maintainer(s), please advise if ready for stabilisation or call yourself
I guess it will be fine.
sparc stable
amd64 stable
arm stable
ppc stable
ppc64 stable
x86 stable
arm64 stable
@s390: ping
GLSA vote: no!
s390: ping
Please cleanup. Dropping s390.
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1bed18530dc535caec4a9fbfe2f9c4de9ac3d730 commit 1bed18530dc535caec4a9fbfe2f9c4de9ac3d730 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2020-10-04 15:58:22 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2020-10-04 15:58:22 +0000 sys-auth/polkit: Cleanup vulnerable 0.115-r4 Bug: https://bugs.gentoo.org/717712 Package-Manager: Portage-3.0.8, Repoman-3.0.1 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> sys-auth/polkit/Manifest | 1 - sys-auth/polkit/files/CVE-2018-19788.patch | 339 --------------------- .../files/polkit-0.115-spidermonkey-60.patch | 180 ----------- sys-auth/polkit/polkit-0.115-r4.ebuild | 144 --------- 4 files changed, 664 deletions(-)
Thank you!