LWN.net Logo

policykit-1: privilege escalation

Package(s):policykit-1 CVE #(s):CVE-2013-4288
Created:September 19, 2013 Updated:October 7, 2013
Description: From the Ubuntu advisory:

It was discovered that polkit didn't allow applications to use the pkcheck tool in a way which prevented a race condition in the UID lookup. A local attacker could use this flaw to possibly escalate privileges.

Alerts:
Ubuntu USN-1953-1 2013-09-18
Red Hat RHSA-2013:1270-01 2013-09-19
CentOS CESA-2013:1270 2013-09-20
Oracle ELSA-2013-1270 2013-09-19
Scientific Linux SLSA-2013:1270-1 2013-09-19
Fedora FEDORA-2013-17191 2013-09-20
Fedora FEDORA-2013-17197 2013-09-22
Mandriva MDVSA-2013:243 2013-09-27
Mageia MGASA-2013-0293 2013-10-05
openSUSE openSUSE-SU-2013:1527-1 2013-10-07
openSUSE openSUSE-SU-2013:1528-1 2013-10-07

(Log in to post comments)

policykit-1: privilege escalation

Posted Sep 26, 2013 1:21 UTC (Thu) by mathstuf (subscriber, #69389) [Link]

Was the pile of polkit-related issues in the list related to copy/pasted code? Has documentation been updated for how not to use it?

policykit-1: privilege escalation

Posted Sep 27, 2013 17:59 UTC (Fri) by BenHutchings (subscriber, #37955) [Link]

No, polkit provided a function that scores -10, as explained in the original advisory. The other packages need to be updated to use the new working function.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds