- 17 Jun, 2015 2 commits
-
-
Miloslav Trmač authored
- Refer to PolkitAgentSession in general instead of to _response only - Revert to the original description of authentication cancellation, the agent really needs to return an error to the caller (in addition to dealing with the session if any). - Explicitly document the UID assumption; in the process fixing bug #69980. - Keep documenting that we need a sufficiently privileged caller. - Refer to the ...Response2 API in more places. - Also update docbook documentation. - Drop a paragraph suggesting non-PolkitAgentSession implementations are expected and commonplace. Bug: https://bugs.freedesktop.org/show_bug.cgi?id=90837Reviewed-by:
Colin Walters <walters@redhat.com>
-
Colin Walters authored
http://lists.freedesktop.org/archives/polkit-devel/2015-June/000425.html The "cookie" value that Polkit hands out is global to all polkit users. And when `AuthenticationAgentResponse` is invoked, we previously only received the cookie and *target* identity, and attempted to find an agent from that. The problem is that the current cookie is just an integer counter, and if it overflowed, it would be possible for an successful authorization in one session to trigger a response in another session. The overflow and ability to guess the cookie were fixed by the previous patch. This patch is conceptually further hardening on top of that. Polkit currently treats uids as equivalent from a security domain perspective; there is no support for SELinux/AppArmor/etc. differentiation. We can retrieve the uid from `getuid()` in the setuid helper, which allows us to ensure the uid invoking `AuthenticationAgentResponse2` matches that of the agent. Then the authority only looks at authentication sessions matching the cookie that were created by a matching uid, thus removing the ability for different uids to interfere with each other entirely. Several fixes to this patch were contributed by: Miloslav Trmač <mitr@redhat.com> Bug: https://bugs.freedesktop.org/show_bug.cgi?id=90837 CVE: CVE-2015-4625 Reported-by:
Tavis Ormandy <taviso@google.com> Reviewed-by:
Miloslav Trmač <mitr@redhat.com> Signed-off-by:
Colin Walters <walters@redhat.com>
-
- 11 Nov, 2009 1 commit
-
-
David Zeuthen authored
Now to implement this in the interactive authority...
-
- 29 Sep, 2009 1 commit
-
-
David Zeuthen authored
See https://bugzilla.redhat.com/show_bug.cgi?id=526053 for more details.
-
- 16 Sep, 2009 1 commit
-
-
David Zeuthen authored
Also bump requirement on EggDBus to 0.6 (to be released later) for a bug-fix with flag properties.
-
- 12 Sep, 2009 1 commit
-
-
David Zeuthen authored
-
- 28 Jul, 2009 1 commit
-
-
David Zeuthen authored
Also make this and other details available via methods on the PolkitAuthorizationResult object. See this and surrounding messages http://lists.freedesktop.org/archives/polkit-devel/2009-July/000189.html for more information.
-
- 27 Jul, 2009 1 commit
-
-
David Zeuthen authored
But only allow this if - the caller and the subject being checked is the same user - no details are passed (otherwise dialogs can be spoofed) Also add a RevokeTemporaryAuthorizationById() method.
-
- 20 Jul, 2009 1 commit
-
-
David Zeuthen authored
Also change how authentication agents are registered (take a Subject instead of the session-id) and add convenience functions to asynchronously construct a PolkitUnixSession object given a process id (by querying ConsoleKit).
-
- 08 Jun, 2009 1 commit
-
-
David Zeuthen authored
-
- 29 May, 2009 1 commit
-
-
David Zeuthen authored
-
- 15 May, 2009 1 commit
-
-
David Zeuthen authored
-
- 13 May, 2009 2 commits
-
-
David Zeuthen authored
-
David Zeuthen authored
Also remove the ObtainAuthorization() call and allow apps to pass details to CheckAuthorization.
-
- 09 Feb, 2009 1 commit
-
-
David Zeuthen authored
Also add an example for this.
-
- 08 Feb, 2009 2 commits
-
-
David Zeuthen authored
Also add a short example to test this.
-
David Zeuthen authored
The session_id has got to be empty for now. The thinking is that in the future we might want to register an authentication agent that runs in secure desktop, e.g. a separate session from the user session.
-
- 07 Feb, 2009 1 commit
-
-
David Zeuthen authored
-
- 05 Feb, 2009 1 commit
-
-
David Zeuthen authored
-
- 04 Feb, 2009 1 commit
-
-
David Zeuthen authored
-
- 03 Feb, 2009 1 commit
-
-
David Zeuthen authored
-
- 01 Feb, 2009 1 commit
-
-
David Zeuthen authored
This will allow us, in the near future, to declare org.fd.PK1.Authority and PolkitAuthority as stable while allowing changes to how we manage the (local) authority even after 1.0.
-
- 27 Jan, 2009 1 commit
-
-
David Zeuthen authored
-
- 21 Jan, 2009 1 commit
-
-
David Zeuthen authored
Yay, it works!
-
- 20 Jan, 2009 2 commits
-
-
David Zeuthen authored
Now to actually use them...
-
David Zeuthen authored
-
- 19 Jan, 2009 2 commits
-
-
David Zeuthen authored
... also remove EnumerateSessions
-
David Zeuthen authored
Now to finish implementing the local files backend....
-
- 18 Jan, 2009 2 commits
-
-
David Zeuthen authored
Also get rid of AuthorizationClaim type and add D-Bus prototypes for a couple of other methods.
-
David Zeuthen authored
-
- 16 Jan, 2009 2 commits
-
-
David Zeuthen authored
-
David Zeuthen authored
-
- 11 Jan, 2009 1 commit
-
-
David Zeuthen authored
-
- 07 Jan, 2009 2 commits
-
-
David Zeuthen authored
-
David Zeuthen authored
-
- 06 Jan, 2009 1 commit
-
-
David Zeuthen authored
-
- 07 Dec, 2008 4 commits
-
-
David Zeuthen authored
-
David Zeuthen authored
Now to port the XML parser and land it in polkitbackend so backends can easily implement EnumerateActions().
-
David Zeuthen authored
-
David Zeuthen authored
Also port to use non-reffing structs in EggDBus HEAD.
-