PID reuse race with Policykit check

Bug #1753772 reported by Chris Coulson
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
screen-resolution-extra (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

PolicyKitService._check_permission in /usr/share/screen-resolution-extra/screenresolution-mechanism requests the calling process's PID from dbus using the org.freedesktop.DBus.GetConnectionUnixProcessID API, and then uses this PID to verify whether the calling process is permitted to perform the requested action via Policykit. Policykit maps this to a uid by looking in /proc/$pid.

This is subject to a PID reuse race, If an attacker were to hit this race condition, they could replace /etc/X11/xorg.conf with an arbitrary file, or back up /etc/X11/xorg.conf to any file on the system.

Revision history for this message
Chris Coulson (chrisccoulson) wrote :

This is what I've uploaded to the security PPA for artful. Alberto, does this look ok to you?

Changed in screen-resolution-extra (Ubuntu):
status: New → Fix Released
information type: Private Security → Public Security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.