|
Bugzilla – Full Text Bug Listing |
| Summary: | AUDIT-WHITELIST: gnome-control-center: polkit-untracked-privilege org.gnome.controlcenter.remote-session-helper | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Tumbleweed | Reporter: | Dominique Leuenberger <dimstar> |
| Component: | Security | Assignee: | Matthias Gerstner <matthias.gerstner> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | ||
| Version: | Current | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Dominique Leuenberger
2024-03-04 11:38:38 UTC
This is used to enable a remote-desktop login service. It existed before
already based on `pkexec` but has been changed:
commit 944f415215deb23d34c3ab06e0044585e741d31c
Author: Brandon Nielsen <nielsenb@jetfuse.net>
Date: Tue Jul 18 10:25:21 2023 -0500
Drop dependency on pkexec
Based on discussion on fedora-devel[0][1] drop the use of pkexec. pkexec
was used only for starting / stopping / enabling / disabling the sshd
service via systemd.
This changes the "org.gnome.controlcenter.remote-login-helper" policy to
request the necessary systemd permissions, and changes to using polkit
to request the permission, then making the dbus calls once the
permission is acquired.
Consequently the newly introduced Polkit policy implicitly adds permissions to
meddle with systemd:
<action id="org.gnome.controlcenter.remote-session-helper">
<description>Enable or disable remote sessions</description>
<message>Authentication is required to enable or disable remote sessions</message>
<defaults>
<allow_any>no</allow_any>
<allow_inactive>no</allow_inactive>
<allow_active>auth_admin_keep</allow_active>
</defaults>
<annotate key="org.freedesktop.policykit.imply">org.freedesktop.systemd1.manage-units org.freedesktop.systemd1.manage-unit-files org.gnome.remotedesktop.configure-system-daemon</annotate>
</action>
These are pretty strong privileges. The code deals properly with systemd
though.
We can whitelist the new action.
whitelisting is in progress This is now in Factory. Closing as fixed. |