ELSA-2019-0420

ELSA-2019-0420 - polkit security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2019-02-26

Description


[0.96-11.el6_10.1]
- Fix of CVE-2019-6133, PID reuse via slow fork
- Resolves: rhbz#1667310


Related CVEs


CVE-2019-6133

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) polkit-0.96-11.el6_10.1.src.rpm65b3c73fdbf900b52227705d7acc28b9695c5e8c4359858b1d7e5a27e9985f89ELSA-2022-9073ol6_i386_latest
polkit-0.96-11.el6_10.1.src.rpm65b3c73fdbf900b52227705d7acc28b9695c5e8c4359858b1d7e5a27e9985f89ELSA-2022-9073ol6_u10_i386_patch
polkit-0.96-11.el6_10.1.i686.rpm88d8a07363b54ad26b1d7fe9301d2a39804b1fe7c711ee75dbd146b04fb38a94ELSA-2022-9073ol6_i386_latest
polkit-0.96-11.el6_10.1.i686.rpm88d8a07363b54ad26b1d7fe9301d2a39804b1fe7c711ee75dbd146b04fb38a94ELSA-2022-9073ol6_u10_i386_patch
polkit-desktop-policy-0.96-11.el6_10.1.noarch.rpmfec9248305834e5479e917523893c20065fcb4a8ffd91c94570d0a0ab75a33e1ELSA-2022-9073ol6_i386_latest
polkit-desktop-policy-0.96-11.el6_10.1.noarch.rpmfec9248305834e5479e917523893c20065fcb4a8ffd91c94570d0a0ab75a33e1ELSA-2022-9073ol6_u10_i386_patch
polkit-devel-0.96-11.el6_10.1.i686.rpmd66934fe46555a2573e6dc1cb44872fe723296c768b61a0f28bf271b44f4bbd2ELSA-2022-9073ol6_i386_latest
polkit-devel-0.96-11.el6_10.1.i686.rpmd66934fe46555a2573e6dc1cb44872fe723296c768b61a0f28bf271b44f4bbd2ELSA-2022-9073ol6_u10_i386_patch
polkit-docs-0.96-11.el6_10.1.i686.rpme403dbe2a4933f3b59a5c95f3c6520dd436ed77c95d7ec4894ba683c06a8ce82ELSA-2022-9073ol6_i386_latest
polkit-docs-0.96-11.el6_10.1.i686.rpme403dbe2a4933f3b59a5c95f3c6520dd436ed77c95d7ec4894ba683c06a8ce82ELSA-2022-9073ol6_u10_i386_patch
Oracle Linux 6 (x86_64) polkit-0.96-11.el6_10.1.src.rpm65b3c73fdbf900b52227705d7acc28b9695c5e8c4359858b1d7e5a27e9985f89ELSA-2022-9073ol6_u10_x86_64_patch
polkit-0.96-11.el6_10.1.src.rpm65b3c73fdbf900b52227705d7acc28b9695c5e8c4359858b1d7e5a27e9985f89ELSA-2022-9073ol6_x86_64_latest
polkit-0.96-11.el6_10.1.i686.rpm88d8a07363b54ad26b1d7fe9301d2a39804b1fe7c711ee75dbd146b04fb38a94ELSA-2022-9073ol6_u10_x86_64_patch
polkit-0.96-11.el6_10.1.i686.rpm88d8a07363b54ad26b1d7fe9301d2a39804b1fe7c711ee75dbd146b04fb38a94ELSA-2022-9073ol6_x86_64_latest
polkit-0.96-11.el6_10.1.x86_64.rpm105d92e52f1244530fc87e6eec8c98f57e04b4fe63bcee575c5938f7fb995747ELSA-2022-9073ol6_u10_x86_64_patch
polkit-0.96-11.el6_10.1.x86_64.rpm105d92e52f1244530fc87e6eec8c98f57e04b4fe63bcee575c5938f7fb995747ELSA-2022-9073ol6_x86_64_latest
polkit-desktop-policy-0.96-11.el6_10.1.noarch.rpmfec9248305834e5479e917523893c20065fcb4a8ffd91c94570d0a0ab75a33e1ELSA-2022-9073ol6_u10_x86_64_patch
polkit-desktop-policy-0.96-11.el6_10.1.noarch.rpmfec9248305834e5479e917523893c20065fcb4a8ffd91c94570d0a0ab75a33e1ELSA-2022-9073ol6_x86_64_latest
polkit-devel-0.96-11.el6_10.1.i686.rpmd66934fe46555a2573e6dc1cb44872fe723296c768b61a0f28bf271b44f4bbd2ELSA-2022-9073ol6_u10_x86_64_patch
polkit-devel-0.96-11.el6_10.1.i686.rpmd66934fe46555a2573e6dc1cb44872fe723296c768b61a0f28bf271b44f4bbd2ELSA-2022-9073ol6_x86_64_latest
polkit-devel-0.96-11.el6_10.1.x86_64.rpm04b27b839efe0ab38e752272fd70c6e7e549109bc9ad9afafb186fe20ac776f1ELSA-2022-9073ol6_u10_x86_64_patch
polkit-devel-0.96-11.el6_10.1.x86_64.rpm04b27b839efe0ab38e752272fd70c6e7e549109bc9ad9afafb186fe20ac776f1ELSA-2022-9073ol6_x86_64_latest
polkit-docs-0.96-11.el6_10.1.x86_64.rpme6893022a2bf9d4022ea721f6e3ff32c4214fbe0b0aa96f245dfaab03f9e239eELSA-2022-9073ol6_u10_x86_64_patch
polkit-docs-0.96-11.el6_10.1.x86_64.rpme6893022a2bf9d4022ea721f6e3ff32c4214fbe0b0aa96f245dfaab03f9e239eELSA-2022-9073ol6_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete