First published: Mon Sep 02 2019(Updated: )
USN-3934-1 fixed a vulnerability in Policykit. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that PolicyKit incorrectly relied on the fork() system call in the Linux kernel being atomic. A local attacker could possibly use this issue to gain access to services that have cached authorizations.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/policykit-1 | <0.104-1ubuntu1.5 | 0.104-1ubuntu1.5 |
Ubuntu OpenSSH Client | =12.04 | |
All of | ||
ubuntu/libpolkit-backend-1-0 | <0.104-1ubuntu1.5 | 0.104-1ubuntu1.5 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is USN-3934-2.
The affected software includes Policykit and libpolkit-backend-1-0.
Please refer to the Ubuntu security notices at the provided links for information about the severity of this vulnerability.
To fix the vulnerability, update the Policykit and libpolkit-backend-1-0 packages to version 0.104-1ubuntu1.5 or later.
Yes, you can find more information about this vulnerability at the following links: - [CVE-2019-6133](https://ubuntu.com/security/CVE-2019-6133) - [USN-3903-2](https://ubuntu.com/security/notices/USN-3903-2) - [USN-3934-1](https://ubuntu.com/security/notices/USN-3934-1)