ArchLinux: 201901-2: polkit: privilege escalation

    Date08 Jan 2019
    CategoryArchLinux
    542
    Posted ByLinuxSecurity Advisories
    The package polkit before version 0.115+24+g5230646-1 is vulnerable to privilege escalation.
    Arch Linux Security Advisory ASA-201901-2
    =========================================
    
    Severity: High
    Date    : 2019-01-08
    CVE-ID  : CVE-2018-19788
    Package : polkit
    Type    : privilege escalation
    Remote  : No
    Link    : https://security.archlinux.org/AVG-828
    
    Summary
    =======
    
    The package polkit before version 0.115+24+g5230646-1 is vulnerable to
    privilege escalation.
    
    Resolution
    ==========
    
    Upgrade to 0.115+24+g5230646-1.
    
    # pacman -Syu "polkit>=0.115+24+g5230646-1"
    
    The problem has been fixed upstream but no release is available yet.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    A security issue has been found in polkit <= 0.115, where an
    unprivileged user with a UID > INT_MAX can successfully execute any
    systemctl command.
    
    Impact
    ======
    
    A local, unprivileged user whose UID is larger than INT_MAX can
    escalate privileges.
    
    References
    ==========
    
    https://seclists.org/oss-sec/2018/q4/198
    https://gitlab.freedesktop.org/polkit/polkit/issues/74
    https://gitlab.freedesktop.org/polkit/polkit/commit/2cb40c4d5feeaa09325522bd7d97910f1b59e379
    https://security.archlinux.org/CVE-2018-19788
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"6","type":"x","order":"1","pct":54.55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":27.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":18.18,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.