{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"libpolkit0-0.113-3.4 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the libpolkit0-0.113-3.4 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-10436","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10436-1.json"},{"category":"self","summary":"SUSE CVE CVE-2010-0750 page","url":"https://www.suse.com/security/cve/CVE-2010-0750/"},{"category":"self","summary":"SUSE CVE CVE-2011-1485 page","url":"https://www.suse.com/security/cve/CVE-2011-1485/"},{"category":"self","summary":"SUSE CVE CVE-2013-4288 page","url":"https://www.suse.com/security/cve/CVE-2013-4288/"},{"category":"self","summary":"SUSE CVE CVE-2015-3218 page","url":"https://www.suse.com/security/cve/CVE-2015-3218/"},{"category":"self","summary":"SUSE CVE CVE-2015-3255 page","url":"https://www.suse.com/security/cve/CVE-2015-3255/"},{"category":"self","summary":"SUSE CVE CVE-2015-3256 page","url":"https://www.suse.com/security/cve/CVE-2015-3256/"},{"category":"self","summary":"SUSE CVE CVE-2015-4625 page","url":"https://www.suse.com/security/cve/CVE-2015-4625/"}],"title":"libpolkit0-0.113-3.4 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:10436-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libpolkit0-0.113-3.4.aarch64","product":{"name":"libpolkit0-0.113-3.4.aarch64","product_id":"libpolkit0-0.113-3.4.aarch64"}},{"category":"product_version","name":"libpolkit0-32bit-0.113-3.4.aarch64","product":{"name":"libpolkit0-32bit-0.113-3.4.aarch64","product_id":"libpolkit0-32bit-0.113-3.4.aarch64"}},{"category":"product_version","name":"polkit-0.113-3.4.aarch64","product":{"name":"polkit-0.113-3.4.aarch64","product_id":"polkit-0.113-3.4.aarch64"}},{"category":"product_version","name":"polkit-devel-0.113-3.4.aarch64","product":{"name":"polkit-devel-0.113-3.4.aarch64","product_id":"polkit-devel-0.113-3.4.aarch64"}},{"category":"product_version","name":"polkit-doc-0.113-3.4.aarch64","product":{"name":"polkit-doc-0.113-3.4.aarch64","product_id":"polkit-doc-0.113-3.4.aarch64"}},{"category":"product_version","name":"typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","product":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","product_id":"typelib-1_0-Polkit-1_0-0.113-3.4.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"libpolkit0-0.113-3.4.ppc64le","product":{"name":"libpolkit0-0.113-3.4.ppc64le","product_id":"libpolkit0-0.113-3.4.ppc64le"}},{"category":"product_version","name":"libpolkit0-32bit-0.113-3.4.ppc64le","product":{"name":"libpolkit0-32bit-0.113-3.4.ppc64le","product_id":"libpolkit0-32bit-0.113-3.4.ppc64le"}},{"category":"product_version","name":"polkit-0.113-3.4.ppc64le","product":{"name":"polkit-0.113-3.4.ppc64le","product_id":"polkit-0.113-3.4.ppc64le"}},{"category":"product_version","name":"polkit-devel-0.113-3.4.ppc64le","product":{"name":"polkit-devel-0.113-3.4.ppc64le","product_id":"polkit-devel-0.113-3.4.ppc64le"}},{"category":"product_version","name":"polkit-doc-0.113-3.4.ppc64le","product":{"name":"polkit-doc-0.113-3.4.ppc64le","product_id":"polkit-doc-0.113-3.4.ppc64le"}},{"category":"product_version","name":"typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","product":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","product_id":"typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"libpolkit0-0.113-3.4.s390x","product":{"name":"libpolkit0-0.113-3.4.s390x","product_id":"libpolkit0-0.113-3.4.s390x"}},{"category":"product_version","name":"libpolkit0-32bit-0.113-3.4.s390x","product":{"name":"libpolkit0-32bit-0.113-3.4.s390x","product_id":"libpolkit0-32bit-0.113-3.4.s390x"}},{"category":"product_version","name":"polkit-0.113-3.4.s390x","product":{"name":"polkit-0.113-3.4.s390x","product_id":"polkit-0.113-3.4.s390x"}},{"category":"product_version","name":"polkit-devel-0.113-3.4.s390x","product":{"name":"polkit-devel-0.113-3.4.s390x","product_id":"polkit-devel-0.113-3.4.s390x"}},{"category":"product_version","name":"polkit-doc-0.113-3.4.s390x","product":{"name":"polkit-doc-0.113-3.4.s390x","product_id":"polkit-doc-0.113-3.4.s390x"}},{"category":"product_version","name":"typelib-1_0-Polkit-1_0-0.113-3.4.s390x","product":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.s390x","product_id":"typelib-1_0-Polkit-1_0-0.113-3.4.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"libpolkit0-0.113-3.4.x86_64","product":{"name":"libpolkit0-0.113-3.4.x86_64","product_id":"libpolkit0-0.113-3.4.x86_64"}},{"category":"product_version","name":"libpolkit0-32bit-0.113-3.4.x86_64","product":{"name":"libpolkit0-32bit-0.113-3.4.x86_64","product_id":"libpolkit0-32bit-0.113-3.4.x86_64"}},{"category":"product_version","name":"polkit-0.113-3.4.x86_64","product":{"name":"polkit-0.113-3.4.x86_64","product_id":"polkit-0.113-3.4.x86_64"}},{"category":"product_version","name":"polkit-devel-0.113-3.4.x86_64","product":{"name":"polkit-devel-0.113-3.4.x86_64","product_id":"polkit-devel-0.113-3.4.x86_64"}},{"category":"product_version","name":"polkit-doc-0.113-3.4.x86_64","product":{"name":"polkit-doc-0.113-3.4.x86_64","product_id":"polkit-doc-0.113-3.4.x86_64"}},{"category":"product_version","name":"typelib-1_0-Polkit-1_0-0.113-3.4.x86_64","product":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.x86_64","product_id":"typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libpolkit0-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64"},"product_reference":"libpolkit0-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le"},"product_reference":"libpolkit0-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x"},"product_reference":"libpolkit0-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64"},"product_reference":"libpolkit0-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-32bit-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64"},"product_reference":"libpolkit0-32bit-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-32bit-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le"},"product_reference":"libpolkit0-32bit-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-32bit-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x"},"product_reference":"libpolkit0-32bit-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libpolkit0-32bit-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64"},"product_reference":"libpolkit0-32bit-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-0.113-3.4.aarch64"},"product_reference":"polkit-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le"},"product_reference":"polkit-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-0.113-3.4.s390x"},"product_reference":"polkit-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-0.113-3.4.x86_64"},"product_reference":"polkit-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-devel-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64"},"product_reference":"polkit-devel-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-devel-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le"},"product_reference":"polkit-devel-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-devel-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x"},"product_reference":"polkit-devel-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-devel-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64"},"product_reference":"polkit-devel-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-doc-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64"},"product_reference":"polkit-doc-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-doc-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le"},"product_reference":"polkit-doc-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-doc-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x"},"product_reference":"polkit-doc-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"polkit-doc-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64"},"product_reference":"polkit-doc-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64"},"product_reference":"typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le"},"product_reference":"typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x"},"product_reference":"typelib-1_0-Polkit-1_0-0.113-3.4.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"typelib-1_0-Polkit-1_0-0.113-3.4.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"},"product_reference":"typelib-1_0-Polkit-1_0-0.113-3.4.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2010-0750","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2010-0750"}],"notes":[{"category":"general","text":"pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2010-0750","url":"https://www.suse.com/security/cve/CVE-2010-0750"},{"category":"external","summary":"SUSE Bug 593959 for CVE-2010-0750","url":"https://bugzilla.suse.com/593959"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2010-0750"},{"cve":"CVE-2011-1485","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2011-1485"}],"notes":[{"category":"general","text":"Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2011-1485","url":"https://www.suse.com/security/cve/CVE-2011-1485"},{"category":"external","summary":"SUSE Bug 1032717 for CVE-2011-1485","url":"https://bugzilla.suse.com/1032717"},{"category":"external","summary":"SUSE Bug 688788 for CVE-2011-1485","url":"https://bugzilla.suse.com/688788"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2011-1485"},{"cve":"CVE-2013-4288","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-4288"}],"notes":[{"category":"general","text":"Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2013-4288","url":"https://www.suse.com/security/cve/CVE-2013-4288"},{"category":"external","summary":"SUSE Bug 1070943 for CVE-2013-4288","url":"https://bugzilla.suse.com/1070943"},{"category":"external","summary":"SUSE Bug 1099031 for CVE-2013-4288","url":"https://bugzilla.suse.com/1099031"},{"category":"external","summary":"SUSE Bug 835827 for CVE-2013-4288","url":"https://bugzilla.suse.com/835827"},{"category":"external","summary":"SUSE Bug 836931 for CVE-2013-4288","url":"https://bugzilla.suse.com/836931"},{"category":"external","summary":"SUSE Bug 836932 for CVE-2013-4288","url":"https://bugzilla.suse.com/836932"},{"category":"external","summary":"SUSE Bug 836937 for CVE-2013-4288","url":"https://bugzilla.suse.com/836937"},{"category":"external","summary":"SUSE Bug 836939 for CVE-2013-4288","url":"https://bugzilla.suse.com/836939"},{"category":"external","summary":"SUSE Bug 844967 for CVE-2013-4288","url":"https://bugzilla.suse.com/844967"},{"category":"external","summary":"SUSE Bug 852368 for CVE-2013-4288","url":"https://bugzilla.suse.com/852368"},{"category":"external","summary":"SUSE Bug 854144 for CVE-2013-4288","url":"https://bugzilla.suse.com/854144"},{"category":"external","summary":"SUSE Bug 864716 for CVE-2013-4288","url":"https://bugzilla.suse.com/864716"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2013-4288"},{"cve":"CVE-2015-3218","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3218"}],"notes":[{"category":"general","text":"The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-3218","url":"https://www.suse.com/security/cve/CVE-2015-3218"},{"category":"external","summary":"SUSE Bug 933922 for CVE-2015-3218","url":"https://bugzilla.suse.com/933922"},{"category":"external","summary":"SUSE Bug 943816 for CVE-2015-3218","url":"https://bugzilla.suse.com/943816"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-3218"},{"cve":"CVE-2015-3255","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3255"}],"notes":[{"category":"general","text":"The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-3255","url":"https://www.suse.com/security/cve/CVE-2015-3255"},{"category":"external","summary":"SUSE Bug 939246 for CVE-2015-3255","url":"https://bugzilla.suse.com/939246"},{"category":"external","summary":"SUSE Bug 943816 for CVE-2015-3255","url":"https://bugzilla.suse.com/943816"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-3255"},{"cve":"CVE-2015-3256","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3256"}],"notes":[{"category":"general","text":"PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to \"javascript rule evaluation.\"","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-3256","url":"https://www.suse.com/security/cve/CVE-2015-3256"},{"category":"external","summary":"SUSE Bug 943816 for CVE-2015-3256","url":"https://bugzilla.suse.com/943816"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-3256"},{"cve":"CVE-2015-4625","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-4625"}],"notes":[{"category":"general","text":"Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-4625","url":"https://www.suse.com/security/cve/CVE-2015-4625"},{"category":"external","summary":"SUSE Bug 935119 for CVE-2015-4625","url":"https://bugzilla.suse.com/935119"},{"category":"external","summary":"SUSE Bug 943816 for CVE-2015-4625","url":"https://bugzilla.suse.com/943816"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libpolkit0-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-0.113-3.4.x86_64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.aarch64","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.ppc64le","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.s390x","openSUSE Tumbleweed:libpolkit0-32bit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-devel-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-devel-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-devel-0.113-3.4.x86_64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.aarch64","openSUSE Tumbleweed:polkit-doc-0.113-3.4.ppc64le","openSUSE Tumbleweed:polkit-doc-0.113-3.4.s390x","openSUSE Tumbleweed:polkit-doc-0.113-3.4.x86_64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.aarch64","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.ppc64le","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.s390x","openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.113-3.4.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-4625"}]}