<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpolkit0-0.118-7.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11180-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpolkit0-0.118-7.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpolkit0-0.118-7.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11180</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1116/</URL>
      <Description>SUSE CVE CVE-2018-1116 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19788/</URL>
      <Description>SUSE CVE CVE-2018-19788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6133/</URL>
      <Description>SUSE CVE CVE-2019-6133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3560/</URL>
      <Description>SUSE CVE CVE-2021-3560 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpolkit0-0.118-7.2">
      <FullProductName ProductID="libpolkit0-0.118-7.2">libpolkit0-0.118-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpolkit0-32bit-0.118-7.2">
      <FullProductName ProductID="libpolkit0-32bit-0.118-7.2">libpolkit0-32bit-0.118-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="polkit-0.118-7.2">
      <FullProductName ProductID="polkit-0.118-7.2">polkit-0.118-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="polkit-devel-0.118-7.2">
      <FullProductName ProductID="polkit-devel-0.118-7.2">polkit-devel-0.118-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="polkit-doc-0.118-7.2">
      <FullProductName ProductID="polkit-doc-0.118-7.2">polkit-doc-0.118-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-Polkit-1_0-0.118-7.2">
      <FullProductName ProductID="typelib-1_0-Polkit-1_0-0.118-7.2">typelib-1_0-Polkit-1_0-0.118-7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libpolkit0-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpolkit0-0.118-7.2">libpolkit0-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpolkit0-32bit-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpolkit0-32bit-0.118-7.2">libpolkit0-32bit-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="polkit-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:polkit-0.118-7.2">polkit-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="polkit-devel-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:polkit-devel-0.118-7.2">polkit-devel-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="polkit-doc-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:polkit-doc-0.118-7.2">polkit-doc-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-Polkit-1_0-0.118-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.118-7.2">typelib-1_0-Polkit-1_0-0.118-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.</Note>
    </Notes>
    <CVE>CVE-2018-1116</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpolkit0-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpolkit0-32bit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-devel-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-doc-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.118-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1116.html</URL>
        <Description>CVE-2018-1116</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099031</URL>
        <Description>SUSE Bug 1099031</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.</Note>
    </Notes>
    <CVE>CVE-2018-19788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpolkit0-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpolkit0-32bit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-devel-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-doc-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.118-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19788.html</URL>
        <Description>CVE-2018-19788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118274</URL>
        <Description>SUSE Bug 1118274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118277</URL>
        <Description>SUSE Bug 1118277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119056</URL>
        <Description>SUSE Bug 1119056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.</Note>
    </Notes>
    <CVE>CVE-2019-6133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpolkit0-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpolkit0-32bit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-devel-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-doc-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.118-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6133.html</URL>
        <Description>CVE-2019-6133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070943</URL>
        <Description>SUSE Bug 1070943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121826</URL>
        <Description>SUSE Bug 1121826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121872</URL>
        <Description>SUSE Bug 1121872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpolkit0-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpolkit0-32bit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-devel-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:polkit-doc-0.118-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:typelib-1_0-Polkit-1_0-0.118-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3560.html</URL>
        <Description>CVE-2021-3560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186497</URL>
        <Description>SUSE Bug 1186497</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
