Bug 1216832 - AUDIT-0: fwupd: whitelisting of new polkit files for fwupd 1.9.7
Summary: AUDIT-0: fwupd: whitelisting of new polkit files for fwupd 1.9.7
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Audits (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Matthias Gerstner
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-02 15:46 UTC by Dominique Leuenberger
Modified: 2024-03-13 09:22 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dominique Leuenberger 2023-11-02 15:46:59 UTC
Package can be found in home:dimstar:Factory/fwupd


[  114s] fwupd.x86_64: E: polkit-untracked-privilege (Badness: 10000) org.freedesktop.fwupd.fix-host-security-attr (auth_admin:no:auth_admin)
[  114s] fwupd.x86_64: E: polkit-untracked-privilege (Badness: 10000) org.freedesktop.fwupd.undo-host-security-attr (auth_admin:no:auth_admin)
[  114s] The polkit action is not listed in the polkit-default-privs profiles which
[  114s] makes it harder for admins to find. Furthermore improper polkit authorization
[  114s] checks can easily introduce security issues. If the package is intended for
[  114s] inclusion in any SUSE product please open a bug report to request review of
[  114s] the package by the security team. Please refer to
[  114s] https://en.opensuse.org/openSUSE:Package_security_guidelines#audit_bugs for
[  114s] more information.
Comment 1 Matthias Gerstner 2023-11-03 14:15:17 UTC
The new actions deal with a host security framework that is now part of fwupd.
It seems they try to measure a hosts security level (regarding hardware bugs,
firmware bugs etc.) and also to work around some shortcomings found there.

The Polkit authorization is sane.

The actual logic invoked by these two actions is hard to follow, since it can
also be plugins that are invoked here. The couple of concrete implementations
I've found deal with setting data on sysfs (to change BIOS settings for
example) or change the kernel command line parameters.

Since this requires auth_admin it is okay and there should not be any
interactions with lower privilege users that are problematic.
Comment 2 Matthias Gerstner 2023-11-03 14:39:19 UTC
Whitelisting is on the way
Comment 3 Matthias Gerstner 2023-11-15 10:00:38 UTC
The whitelisting has reached Factory. Closing as fixed.