Package: apt-xapian-index Severity: grave Tags: security patch Hi, the following vulnerability was published for apt-xapian-index.
CVE-2013-1064[0]: (from Ubuntu USN) | It was discovered that apt-xapian-index was using polkit in an unsafe | manner. A local attacker could possibly use this issue to bypass intended | polkit authorizations. The patch from Ubuntu is attached. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1064 http://security-tracker.debian.org/tracker/CVE-2013-1064 Please adjust the affected versions in the BTS as needed. -- Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0AAAA
Description: fix possible privilege escalation via policykit UID lookup race. Author: Marc Deslauriers <marc.deslauri...@canonical.com> Index: apt-xapian-index-0.45ubuntu2/update-apt-xapian-index-dbus =================================================================== --- apt-xapian-index-0.45ubuntu2.orig/update-apt-xapian-index-dbus 2012-10-31 09:07:53.000000000 -0400 +++ apt-xapian-index-0.45ubuntu2/update-apt-xapian-index-dbus 2013-09-13 14:41:36.564345788 -0400 @@ -34,15 +34,8 @@ "/org/freedesktop/PolicyKit1/Authority", "org.freedesktop.PolicyKit1.Authority") policykit = dbus.Interface(obj, "org.freedesktop.PolicyKit1.Authority") - info = dbus.Interface(connection.get_object('org.freedesktop.DBus', - '/org/freedesktop/DBus/Bus', - False), - 'org.freedesktop.DBus') - pid = info.GetConnectionUnixProcessID(sender) - subject = ('unix-process', - { 'pid' : dbus.UInt32(pid, variant_level=1), - 'start-time' : dbus.UInt64(0, variant_level=1), - } + subject = ('system-bus-name', + { 'name': dbus.String(sender, variant_level = 1) } ) details = { '' : '' } flags = dbus.UInt32(1) # AllowUserInteraction = 0x00000001
pgps955A0PQx8.pgp
Description: PGP signature