File _patchinfo of Package patchinfo.4074

<patchinfo incident="4074">
  <packager>AndreasStieger</packager>
  <issue tracker="cve" id="CVE-2015-4625"></issue>
  <issue tracker="cve" id="CVE-2015-3256"></issue>
  <issue tracker="cve" id="CVE-2015-3255"></issue>
  <issue tracker="cve" id="CVE-2015-3218"></issue>
  <issue tracker="bnc" id="935119">VUL-1: CVE-2015-4625: polkit: cookie generation wrapping with 32bit counter</issue>
  <issue tracker="bnc" id="943816">VUL-0: CVE-2015-3256: polkit: Memory corruption via javascript rule evaluation</issue>
  <issue tracker="bnc" id="939246">VUL-0: CVE-2015-3255: polkit: Heap-corruption on duplicate ids</issue>
  <issue tracker="bnc" id="933922">VUL-1: CVE-2015-3218: polkit: crash authentication_agent_new with invalid object path in RegisterAuthenticationAgent</issue>
  <category>security</category>
  <rating>important</rating>
  <summary>Security update for polkit</summary>
  <description>Polkit was updated to 0.113 to fix four security issues.

The following vulnerabilities were fixed:

* CVE-2015-4625: a local privilege escalation due to predictable authentication session cookie values. (boo#935119)
* CVE-2015-3256: various memory corruption vulnerabilities in use of the JavaScript interpreter, possibly leading to local privilege escalation. (boo#943816)
* CVE-2015-3255: a memory corruption vulnerability in handling duplicate action IDs, possibly leading to local privilege escalation. (boo#939246)
* CVE-2015-3218: Allowed any local user to crash polkitd. (boo#933922)</description>
</patchinfo>
openSUSE Build Service is sponsored by