<html><body><div style="font-family: times new roman, new york, times, serif; font-size: 12pt; color: #000000"><div>Hello,<br></div><div>polkit-0.113 is now available at<br></div><div><a href="http://www.freedesktop.org/software/polkit/releases/polkit-0.113.tar.gz">http://www.freedesktop.org/software/polkit/releases/polkit-0.113.tar.gz</a></div><div><a href="http://www.freedesktop.org/software/polkit/releases/polkit-0.113.tar.gz.sign">http://www.freedesktop.org/software/polkit/releases/polkit-0.113.tar.gz.sign</a></div><div><br></div><div>--------------<br>polkit 0.113<br>--------------<br><br>NOTE: This release is an important security update, see below.<br><br>WARNING WARNING WARNING: This is a prerelease on the road to polkit<br>1.0. Public API might change and certain parts of the code still needs<br>some security review. Use at your own risk.<br><br>This is polkit 0.113.<br><br>Highlights:<br> Fixes CVE-2015-4625, a local privilege escalation due to predictable<br> authentication session cookie values. Thanks to Tavis Ormandy, Google Project<br> Zero for reporting this issue. For the future, authentication agents are<br> encouraged to use PolkitAgentSession instead of using the D-Bus agent response<br> API directly.<br><br> Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the<br> JavaScript interpreter, possibly leading to local privilege escalation.<br><br> Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate<br> action IDs, possibly leading to local privilege escalation. Thanks to<br> Laurent Bigonville for reporting this issue.<br><br> Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to<br> Tavis Ormandy, Google Project Zero, for reporting this issue.<br><br> On systemd-213 and later, the “active” state is shared across all sessions of<br> an user, instead of being tracked separately.<br><br> (pkexec), when not given a program to execute, runs the users’ shell by<br> default.<br><br>Build requirements<br><br> glib, gobject, gio >= 2.30<br> mozjs185 or mozjs-17.0<br> gobject-introspection >= 0.6.2 (optional)<br> pam (optional)<br> ConsoleKit OR systemd<br><br>Changes since polkit 0.112:<br><br>Colin Walters (17):<br> PolkitSystemBusName: Add public API to retrieve Unix user<br> examples/cancel: Fix to securely lookup subject<br> sessionmonitor-systemd: Deduplicate code paths<br> PolkitSystemBusName: Retrieve both pid and uid<br> Port internals non-deprecated PolkitProcess API where possible<br> Use G_GNUC_BEGIN_IGNORE_DEPRECATIONS to avoid warning spam<br> pkexec: Work around systemd injecting broken XDG_RUNTIME_DIR<br> pkexec: Support just plain "pkexec" to run shell<br> .dir-locals: Style for Emacs - we don't use tabs<br> authority: Avoid cookie wrapping by using u64 counter<br> CVE-2015-3218: backend: Handle invalid object paths in RegisterAuthenticationAgent<br> build: Start using git.mk<br> Revert "authority: Avoid cookie wrapping by using u64 counter"<br> authority: Add a helper method for checking whether an identity is root<br> CVE-2015-4625: Use unpredictable cookie values, keep them secret<br> CVE-2015-4625: Bind use of cookies to specific uids<br> README: Note to send security reports via DBus's mechanism<br><br>Kay Sievers (1):<br> sessionmonitor-systemd: prepare for D-Bus "user bus" model<br><br>Lukasz Skalski (1):<br> polkitd: Fix problem with removing non-existent source<br><br>Max A. Dednev (1):<br> authority: Fix memory leak in EnumerateActions call results handler<br><br>Miloslav Trmač (24):<br> Post-release version bump to 0.113<br> Don't discard error data returned by polkit_system_bus_name_get_user_sync<br> Fix a memory leak<br> Refuse duplicate --user arguments to pkexec<br> Fix a possible NULL dereference.<br> Remove a redundant assignment.<br> Simplify forced error domain registration<br> Fix a typo, s/Evaluting/Evaluating/g<br> s/INCLUDES/AM_CPPFLAGS/g<br> Fix duplicate GError use when "uid" is missing<br> Fix a crash when two authentication requests are in flight.<br> docs: Update for changes to uid binding/AuthenticationAgentResponse2<br> Don't pass an uninitialized JS parameter<br> Don't add extra NULL group to subject.groups<br> Don't store unrooted jsvals on heap<br> Fix a per-authorization memory leak<br> Fix a memory leak when registering an authentication agent<br> Wrap all JS usage within “requests”<br> Register heap-based JSObject pointers to GC<br> Prevent builds against SpiderMonkey with exact stack rooting<br> Clear the JS operation callback before invoking JS in the callback<br> Fix spurious timeout exceptions on GC<br> Fix GHashTable usage.<br> Fix use-after-free in polkitagentsession.c<br><br>Philip Withnall (1):<br> sessionmonitor-systemd: Use sd_uid_get_state() to check session activity<br><br>Rui Matos (1):<br> PolkitAgentSession: fix race between child and io watches<br><br>Simon McVittie (1):<br> Use libsystemd instead of older libsystemd-login if possible<br><br>Ting-Wei Lan (1):<br> build: Fix several issues on FreeBSD<br><br>Xabier Rodriguez Calvar (1):<br> Fixed compilation problem in the backend<br><br>Thanks to our contributors.<br><br>Colin Walters and Miloslav Trmač,<br>July 2, 2015<br><br></div></div></body></html>