First published: Wed Jul 22 2015(Updated: )
It was reported that if polkit, while reading action descriptions from /usr/share/polkit-1/actions, encounters a duplicate action ID, it corrupts the heap. The effects of corruption are e.g. visible on stderr as frequent use of unrelated strings when running polkit without --no-debug. Presumably a local attacker might be able to manipulate polkit’s heap enough to achieve privilege escalation through this. Upstream bug: <a href="https://bugs.freedesktop.org/show_bug.cgi?id=83590">https://bugs.freedesktop.org/show_bug.cgi?id=83590</a> Upstream patch is attached.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Polkit Project Polkit | <=0.112 | |
debian/policykit-1 | 0.105-31+deb11u1 122-3 125-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3255 is a vulnerability in PolicyKit that might allow local users to gain privileges via duplicate action IDs in action descriptions.
CVE-2015-3255 has a severity level of medium with a CVSS score of 4.6.
Red Hat Polkit versions up to and including 0.112 are affected by CVE-2015-3255.
To fix the CVE-2015-3255 vulnerability in Ubuntu's policykit-1 package, update to version 0.105-11ubuntu1 or a higher version.
You can find more information about CVE-2015-3255 at the following references: [SecurityTracker](http://www.securitytracker.com/id/1035023), [Gentoo GLSA](https://security.gentoo.org/glsa/201611-07), [Ubuntu USN](https://usn.ubuntu.com/3717-2/).