Bug 1245684 (CVE-2015-3256)
Summary: | CVE-2015-3256 polkit: Memory corruption via javascript rule evaluation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | carnil, mitr, security-response-team, sisharma, slawomir, slong |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A denial of service flaw was found in how polkit handled authorization requests. A local, unprivileged user could send malicious requests to polkit, which could then cause the polkit daemon to corrupt its memory and crash.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-02-16 13:40:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1271789, 1271790 | ||
Bug Blocks: | 1233809 | ||
Attachments: |
Description
Vasyl Kaigorodov
2015-07-22 14:16:24 UTC
Created attachment 1054871 [details]
0001-Don-t-pass-an-uninitialized-JS-parameter.patch
Created attachment 1054872 [details]
0002-Don-t-add-extra-NULL-group-to-subject.groups.patch
Created attachment 1054873 [details]
0003-Don-t-store-unrooted-jsvals-on-heap.patch
Created attachment 1054874 [details]
0004-Fix-a-per-authorization-memory-leak.patch
Created attachment 1054875 [details]
0005-Fix-a-memory-leak-when-registering-an-authentication.patch
Created attachment 1054876 [details]
0006-Wrap-all-JS-usage-within-requests.patch
Created attachment 1054877 [details]
0007-Register-heap-based-JSObject-pointers-to-GC.patch
Created attachment 1054878 [details]
0008-Prevent-builds-against-SpiderMonkey-with-exact-stack.patch
Created attachment 1054879 [details]
0009-Clear-the-JS-operation-callback-before-invoking-JS-i.patch
Created attachment 1054880 [details]
0010-Fix-spurious-timeout-exceptions-on-GC.patch
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0189 https://rhn.redhat.com/errata/RHSA-2016-0189.html |