[USN-3717-1] PolicyKit vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============7581718912788621076==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”Tz3XBuyT2qWHhEMu8z1INmzVN2puoRZVY”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–Tz3XBuyT2qWHhEMu8z1INmzVN2puoRZVY
Content-Type: multipart/mixed; boundary=”aRUzwk9Z7IVeRLFDXO9BQqbuBbl1JtSur”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3717-1] PolicyKit vulnerabilities

–aRUzwk9Z7IVeRLFDXO9BQqbuBbl1JtSur
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3717-1
July 16, 2018

policykit-1 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in PolicyKit.

Software Description:
– policykit-1: framework for managing administrative policies and privile=
ges

Details:

Tavis Ormandy discovered that PolicyKit incorrectly handled certain inval=
id
object paths. A local attacker could possibly use this issue to cause
PolicyKit to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2015-3218)

It was discovered that PolicyKit incorrectly handled certain duplicate
action IDs. A local attacker could use this issue to cause PolicyKit to
crash, resulting in a denial of service, or possibly escalate privileges.=

This issue only affected Ubuntu 14.04 LTS. (CVE-2015-3255)

Tavis Ormandy discovered that PolicyKit incorrectly handled duplicate
cookie values. A local attacker could use this issue to cause PolicyKit t=
o
crash, resulting in a denial of service, or possibly escalate privileges.=

This issue only affected Ubuntu 14.04 LTS. (CVE-2015-4625)

Matthias Gerstner discovered that PolicyKit incorrectly checked users. A
local attacker could possibly use this issue to cause authentication
dialogs to show up for other users, leading to a denial of service or an
information leak. (CVE-2018-1116)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libpolkit-backend-1-0 0.105-20ubuntu0.18.04.1

Ubuntu 17.10:
libpolkit-backend-1-0 0.105-18ubuntu0.1

Ubuntu 16.04 LTS:
libpolkit-backend-1-0 0.105-14.1ubuntu0.1

Ubuntu 14.04 LTS:
libpolkit-backend-1-0 0.105-4ubuntu3.14.04.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3717-1
CVE-2015-3218, CVE-2015-3255, CVE-2015-4625, CVE-2018-1116

Package Information:
https://launchpad.net/ubuntu/+source/policykit-1/0.105-20ubuntu0.18.04.=
1
https://launchpad.net/ubuntu/+source/policykit-1/0.105-18ubuntu0.1
https://launchpad.net/ubuntu/+source/policykit-1/0.105-14.1ubuntu0.1
https://launchpad.net/ubuntu/+source/policykit-1/0.105-4ubuntu3.14.04.2=

–aRUzwk9Z7IVeRLFDXO9BQqbuBbl1JtSur–

–Tz3XBuyT2qWHhEMu8z1INmzVN2puoRZVY
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=Vu5B
—–END PGP SIGNATURE—–

–Tz3XBuyT2qWHhEMu8z1INmzVN2puoRZVY–

–===============7581718912788621076==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============7581718912788621076==–