|
Bugzilla – Full Text Bug Listing |
| Summary: | AUDIT-1: spice-gtk: polkit-unauthorized-privilege | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Dominique Leuenberger <dimstar> |
| Component: | Audits | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | meissner |
| Version: | unspecified | ||
| Target Milestone: | unspecified | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Dominique Leuenberger
2013-02-17 17:03:18 UTC
lowlevel usb access? for what kind of devices? (In reply to comment #1) > lowlevel usb access? > > for what kind of devices? From what I understand, any device (in order to redirect them to the virtual machines) Please see bnc#744251 , I dont think that the complexity and quality is getting better. I changed the policy in spice-gtk to be auth_admin: so it remains the users responsibility to allow execution or not... Package can be found in GNOME:Next / spice-gtk But there was the problem of the package also bringing a new suid binary. Still the case? Dominique, can you help here please? Thanks. (In reply to comment #5) > But there was the problem of the package also bringing a new > suid binary. Still the case? Yes, this is still the case... the .spec file contains: > grep spice-client-glib-usb *spec # FIXME: /usr/bin/spice-client-glib-usb-acl-helper should be installed u+s, see bnc#744251. %set_permissions %{_bindir}/spice-client-glib-usb-acl-helper %verify_permissions -e %{_bindir}/spice-client-glib-usb-acl-helper %attr(755,root,root) %{_bindir}/spice-client-glib-usb-acl-helper The spice-gtk Makefile still has the code to install this file u+s We wont accept a new suid binary. marked for training This package already "slipped" into factory by way of auth_admin only classification. Since we are about to tighten the rpmlint rules it has now been part of the "amnesty whitelisting" and I have opened a new audit bug 1083025. There we will only check whether the admin authorization is correctly implemented. Therefore closing this bug. |