MGASA-2015-0262

Source
https://advisories.mageia.org/MGASA-2015-0262.html
Import Source
https://advisories.mageia.org/MGASA-2015-0262.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0262
Related
Published
2015-07-05T17:22:03Z
Modified
2015-07-09T07:56:53Z
Summary
Updated polkit package fixes security vulnerabilities
Details

Local privilege escalation in polkit before 0.113 due to predictable authentication session cookie values (CVE-2015-4625).

Various memory corruption vulnerabilities in polkit before 0.113 in the use of the JavaScript interpreter, possibly leading to local privilege escalation (CVE-2015-3256).

Memory corruption vulnerability in polkit before 0.113 in handling duplicate action IDs, possibly leading to local privilege escalation (CVE-2015-3255).

Denial of service issue in polkit before 0.113 which allowed any local user to crash polkitd (CVE-2015-3218).

References
Credits

Affected packages

Mageia:5 / polkit

Package

Name
polkit
Purl
pkg:rpm/mageia/polkit?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.113-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / polkit

Package

Name
polkit
Purl
pkg:rpm/mageia/polkit?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.113-1.mga4

Ecosystem specific

{
    "section": "core"
}