Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.Referenceshttp://lists.freedesktop.org/archives/polkit-devel/2015-June/000427.htmlhttp://www.securityfocus.com/bid/75267http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161721.htmlhttp://lists.opensuse.org/opensuse-updates/2015-11/msg00042.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-July/162294.htmlhttp://lists.freedesktop.org/archives/polkit-devel/2015-July/000432.htmlhttp://www.openwall.com/lists/oss-security/2015/06/09/1http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.htmlhttp://www.openwall.com/lists/oss-security/2015/06/08/3http://lists.freedesktop.org/archives/polkit-devel/2015-May/000419.htmlhttp://www.openwall.com/lists/oss-security/2015/06/16/21http://www.securitytracker.com/id/1035023