[Pkg-utopia-maintainers] Bug#869922: Bug#869922: policykit-1: members of group sudo become root with pkexec while ignoring /etc/sudoers

Michael Biebl biebl at debian.org
Thu Jul 27 16:00:27 UTC 2017


Control: severity -1 normal
Control: close -1
Am 27.07.2017 um 17:53 schrieb mviereck:
> Package: policykit-1
> Version: 0.105-18
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Dear Maintainer,
> 
> If an unprivileged user is member of group sudo, he can achieve unrestricted root privileges with pkexec 
> and his user password (instead of root password). This happens regardless if or if not package sudo is installed, 
> and regardless of existing or non-existing entries in /etc/sudoers.
> 
> Command sudo and group sudo were designed to allow single privileged commands for unprivileged users.

This is not correct. The default sudo config ships

%sudo	ALL=(ALL:ALL) ALL

I.e., a user in group sudo can run every command with root privileges.

> Instead, pkexec allows full root access for members of group sudo.
> 
> I expect: 
>  - pkexec does not regard group sudo. (clean way, unlinking polkit from sudo)
> or
>  - pkexec regards entries in /etc/sudoers. (dirty way, pkexec should not be mixed with sudo)
> 
> (Not regarding group sudo would also avoid prompting non-sudo-group users for passwords of sudo-group users)

Granting root-like access via group sudo is intended and not a security
hole and the policykit policy is in line with the sudo policy here.

Regards,
Michael


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-utopia-maintainers/attachments/20170727/c98cfa33/attachment.sig>


More information about the Pkg-utopia-maintainers mailing list