|
Bugzilla – Full Text Bug Listing |
| Summary: | AUDIT-0: fwupd: whitelisting of new polkit files for fwupd 1.9.7 | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Dominique Leuenberger <dimstar> |
| Component: | Audits | Assignee: | Matthias Gerstner <matthias.gerstner> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | meissner |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Dominique Leuenberger
2023-11-02 15:46:59 UTC
The new actions deal with a host security framework that is now part of fwupd. It seems they try to measure a hosts security level (regarding hardware bugs, firmware bugs etc.) and also to work around some shortcomings found there. The Polkit authorization is sane. The actual logic invoked by these two actions is hard to follow, since it can also be plugins that are invoked here. The couple of concrete implementations I've found deal with setting data on sysfs (to change BIOS settings for example) or change the kernel command line parameters. Since this requires auth_admin it is okay and there should not be any interactions with lower privilege users that are problematic. Whitelisting is on the way The whitelisting has reached Factory. Closing as fixed. |