Public Date:
1664212: CVE-2019-6133 polkit: Temporary auth hijacking via PID reuse and non-atomic fork
A vulnerability was found in polkit. When authentication is performed by a non-root user to perform an administrative task, the authentication is temporarily cached in such a way that a local attacker could impersonate the authorized process, thus gaining access to elevated privileges.

Find out more about CVE-2019-6133 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (polkit) RHSA-2019:0420 2019-02-26
Red Hat Enterprise Linux Advanced Update Support 6.6 (polkit) RHSA-2019:0832 2019-04-23
Red Hat Enterprise Linux 7 (polkit) RHSA-2019:0230 2019-01-31

Affected Packages State

Platform Package State
Red Hat Virtualization 4 rhvm-appliance Fix deferred
Red Hat Enterprise Linux 8 polkit Not affected


Red Hat would like to thank Jan Rybar ( for reporting this issue. Upstream acknowledges Jann Horn (Google Project Zero) as the original reporter.

External References

Last Modified