polkit has a vulnerability that allows a local attacker to hijack a PID during an authentication attempt by a non-root user and subsequently execute code as the authenticated process. Upstream patch: https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81 https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7b55851367136b1efd84d98fea81ba57a98304cf
Acknowledgments: Name: Jan Rybar (freedesktop.org) Upstream: Jann Horn (Google Project Zero)
External References: https://bugs.chromium.org/p/project-zero/issues/detail?id=1692
Upstream bug: https://gitlab.freedesktop.org/polkit/polkit/issues/75
Created polkit tracking bugs for this issue: Affects: fedora-all [bug 1667777]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0230 https://access.redhat.com/errata/RHSA-2019:0230
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:0420 https://access.redhat.com/errata/RHSA-2019:0420
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2019:0832 https://access.redhat.com/errata/RHSA-2019:0832
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:2699 https://access.redhat.com/errata/RHSA-2019:2699
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:2978 https://access.redhat.com/errata/RHSA-2019:2978