rpm package
suse/polkit&distro=SUSE Linux Enterprise Desktop 12 SP4
pkg:rpm/suse/polkit&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-6133 | — | < 0.113-5.18.1 | 0.113-5.18.1 | Jan 11, 2019 | In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c. | ||
| CVE-2018-19788 | — | < 0.113-5.15.1 | 0.113-5.15.1 | Dec 3, 2018 | A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command. |
- CVE-2019-6133Jan 11, 2019affected < 0.113-5.18.1fixed 0.113-5.18.1
In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
- CVE-2018-19788Dec 3, 2018affected < 0.113-5.15.1fixed 0.113-5.15.1
A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.