ALPINE-CVE-2019-6133

Source
https://security.alpinelinux.org/vuln/CVE-2019-6133
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2019-6133.json
JSON Data
https://api.test.osv.dev/v1/vulns/ALPINE-CVE-2019-6133
Upstream
Published
2019-01-11T14:29:00Z
Modified
2025-09-26T00:13:22.672275Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.

References

Affected packages

Alpine:v3.7 / polkit

Package

Name
polkit
Purl
pkg:apk/alpine/polkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.105-r10

Affected versions

0.*

0.96-r0
0.96-r2
0.98-r0
0.99-r0
0.100-r0
0.101-r0
0.101-r1
0.101-r2
0.102-r0
0.103-r0
0.103-r1
0.105-r0
0.105-r1
0.105-r2
0.105-r3
0.105-r4
0.105-r5
0.105-r6
0.105-r7
0.105-r8
0.105-r9

Alpine:v3.8 / polkit

Package

Name
polkit
Purl
pkg:apk/alpine/polkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.105-r11

Affected versions

0.*

0.96-r0
0.96-r2
0.98-r0
0.99-r0
0.100-r0
0.101-r0
0.101-r1
0.101-r2
0.102-r0
0.103-r0
0.103-r1
0.105-r0
0.105-r1
0.105-r2
0.105-r3
0.105-r4
0.105-r5
0.105-r6
0.105-r7
0.105-r8
0.105-r9
0.105-r10

Alpine:v3.9 / polkit

Package

Name
polkit
Purl
pkg:apk/alpine/polkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.105-r11

Affected versions

0.*

0.96-r0
0.96-r2
0.98-r0
0.99-r0
0.100-r0
0.101-r0
0.101-r1
0.101-r2
0.102-r0
0.103-r0
0.103-r1
0.105-r0
0.105-r1
0.105-r2
0.105-r3
0.105-r4
0.105-r5
0.105-r6
0.105-r7
0.105-r8
0.105-r9
0.105-r10