Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 717712 (CVE-2019-6133) - <sys-auth/polkit-0.116: Start time bypass (CVE-2019-6133)
Summary: <sys-auth/polkit-0.116: Start time bypass (CVE-2019-6133)
Alias: CVE-2019-6133
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B3 [noglsa stable cve]
Depends on:
Reported: 2020-04-16 13:28 UTC by GLSAMaker/CVETool Bot
Modified: 2020-07-26 05:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---
nattka: sanity-check+


Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-16 13:28:01 UTC
CVE-2019-6133 (
  In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can
  be bypassed because fork() is not atomic, and therefore authorization
  decisions are improperly cached. This is related to lack of uid checking in
Comment 1 Sam James gentoo-dev Security 2020-04-16 13:33:07 UTC
@maintainer(s), please advise if ready for stabilisation or call yourself
Comment 2 Andreas Sturmlechner gentoo-dev 2020-04-16 22:44:29 UTC
I guess it will be fine.
Comment 3 Agostino Sarubbo gentoo-dev 2020-04-17 06:42:52 UTC
sparc stable
Comment 4 Agostino Sarubbo gentoo-dev 2020-04-17 06:49:18 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2020-04-17 06:50:40 UTC
arm stable
Comment 6 Agostino Sarubbo gentoo-dev 2020-04-17 06:51:55 UTC
ppc stable
Comment 7 Agostino Sarubbo gentoo-dev 2020-04-17 06:53:31 UTC
ppc64 stable
Comment 8 Agostino Sarubbo gentoo-dev 2020-04-17 06:54:43 UTC
x86 stable
Comment 9 Sam James gentoo-dev Security 2020-04-19 20:28:41 UTC
arm64 stable
Comment 10 Sam James gentoo-dev Security 2020-06-04 17:13:22 UTC
@s390: ping
Comment 11 Sam James gentoo-dev Security 2020-07-26 05:23:50 UTC
GLSA vote: no!