CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
5.1%
A race condition was found in the way the PolicyKit pkcheck utility checked process authorization when the process was specified by its process ID via the --process option. A local user could use this flaw to bypass intended PolicyKit authorizations and escalate their privileges (CVE-2013-4288). Note: Applications that invoke pkcheck with the --process option need to be modified to use the pid,pid-start-time,uid argument for that option, to allow pkcheck to check process authorization correctly. Because of the change in the PolicyKit API, the spice-gtk (CVE-2013-4324), hplip (CVE-2013-4325), rtkit (CVE-2013-4326), and systemd (CVE-2013-4327) packages have been updated to use a different API that is not affected by this PolicyKit vulnerability. The libvirt package will also be updated for the same reason, but this update will come in a separate advisory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 2 | noarch | polkit | < 0.104-4.2 | polkit-0.104-4.2.mga2 |
Mageia | 2 | noarch | spice-gtk | < 0.9-1.2 | spice-gtk-0.9-1.2.mga2 |
Mageia | 2 | noarch | hplip | < 3.12.4-1.3 | hplip-3.12.4-1.3.mga2 |
Mageia | 2 | noarch | rtkit | < 0.10-3.1 | rtkit-0.10-3.1.mga2 |
Mageia | 2 | noarch | systemd | < 44-13.1 | systemd-44-13.1.mga2 |
Mageia | 3 | noarch | polkit | < 0.107-6.1 | polkit-0.107-6.1.mga3 |
Mageia | 3 | noarch | spice-gtk | < 0.15-3.1 | spice-gtk-0.15-3.1.mga3 |
Mageia | 3 | noarch | hplip | < 3.12.9-6.1 | hplip-3.12.9-6.1.mga3 |
Mageia | 3 | noarch | rtkit | < 0.11-3.1 | rtkit-0.11-3.1.mga3 |
Mageia | 3 | noarch | systemd | < 195-22.1 | systemd-195-22.1.mga3 |