| Summary: | gvfs new polkit authorization security issue (CVE-2019-3827) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, guillomovitch, herman.viaene, marja11, olav, sysadmin-bugs |
| Version: | 6 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA6-32-OK | ||
| Source RPM: | gvfs-1.38.1-1.mga7.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2019-01-21 12:02:56 CET
David Walser
2019-01-21 12:03:04 CET
Whiteboard:
(none) =>
MGA6TOO Assigning to the Gnome maintainers, because this package has: URL : http://www.gnome.org/ CC:
(none) =>
guillomovitch, marja11, olav Advisory: ======================== Updated gvfs packages fix security vulnerability: The backend currently allows to access and modify files without prompting for password if any polkit authentication agent isn't available. This affects only users which belong to wheel group (i.e. those who are already allowed to use sudo). It doesn't allow privilege escalation for users, who don't belong to that group. References: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Y43CRGATQPYWH2UXO6ZS7PYPCSZGTGED/ ======================== Updated packages in core/updates_testing: ======================== gvfs-1.32.1-1.1.mga6 gvfs-devel-1.32.1-1.1.mga6 gvfs-fuse-1.32.1-1.1.mga6 gvfs-smb-1.32.1-1.1.mga6 gvfs-archive-1.32.1-1.1.mga6 gvfs-gphoto2-1.32.1-1.1.mga6 gvfs-iphone-1.32.1-1.1.mga6 gvfs-mtp-1.32.1-1.1.mga6 gvfs-goa-1.32.1-1.1.mga6 from gvfs-1.32.1-1.1.mga6.src.rpm Version:
Cauldron =>
6 MGA6-32 MATE on IBM Thinkpad R50e No installation issues. Ref bug 16916 Comment 1 and 2 , following the smart boys there, I am OK'ing on clean install. Whiteboard:
(none) =>
MGA6-32-OK Ubuntu has issued an advisory for this on February 12: https://usn.ubuntu.com/3888-1/ Advisory: ======================== Updated gvfs packages fix security vulnerability: The backend currently allows to access and modify files without prompting for password if any polkit authentication agent isn't available. This affects only users which belong to wheel group (i.e. those who are already allowed to use sudo). It doesn't allow privilege escalation for users, who don't belong to that group (CVE-2019-3827). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3827 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/Y43CRGATQPYWH2UXO6ZS7PYPCSZGTGED/ https://usn.ubuntu.com/3888-1/ Summary:
gvfs new polkit authorization security issue =>
gvfs new polkit authorization security issue (CVE-2019-3827) Advisory committed to svn. Validating based on comment 3. Keywords:
(none) =>
advisory, validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0080.html Resolution:
(none) =>
FIXED |