First published: Tue Dec 04 2018(Updated: )
It was found that creating a user of group above INT32_MAX would wrap around the numeric uid or gid. Polkit is not able to handle this properly, resulting in an authentication bypass. References: <a href="https://seclists.org/oss-sec/2018/q4/198">https://seclists.org/oss-sec/2018/q4/198</a> Upstream issue: <a href="https://gitlab.freedesktop.org/polkit/polkit/issues/74">https://gitlab.freedesktop.org/polkit/polkit/issues/74</a> Proposed patch: <a href="https://gitlab.freedesktop.org/zbyszek/polkit/commit/fbaab32cb4ed9ed5f1e3eea6cd317d443aa427dc">https://gitlab.freedesktop.org/zbyszek/polkit/commit/fbaab32cb4ed9ed5f1e3eea6cd317d443aa427dc</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Polkit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1655925 is considered high due to the potential for an authentication bypass.
REDHAT-BUG-1655925 affects Polkit by allowing user creation with group IDs above INT32_MAX, leading to numeric wraparound and improper handling.
REDHAT-BUG-1655925 impacts systems using Polkit for user authentication management.
To fix REDHAT-BUG-1655925, update Polkit to the latest patched version that resolves the user and group ID handling issue.
If affected by REDHAT-BUG-1655925, it's essential to apply the relevant security updates and monitor for any unusual authentication behavior.