linuxdeepin / developer-center

Deepin developer center, provide developer wiki and community forum.
451 stars 73 forks source link

Do you have any schedule for security issues on file manager? #3506

Open hillwoodroc opened 2 years ago

hillwoodroc commented 2 years ago

SUMMARY | 问题概要

Forward from https://bugzilla.opensuse.org/show_bug.cgi?id=1134132 and https://bugzilla.opensuse.org/show_bug.cgi?id=1134131

Basically we can merge this bug here with the other bug 1134131. It is about the same basic software and mechanisms.

So the D-Bus interface in this package changed quite a bit. There is also some authentication in there for some D-Bus methods now. However the authentication is buggy:

1) PolicyKitHelper::checkAuthorization uses the UnixProcessSubject which is racy. PIDs can change at any time. The SytemBusName polkit subject needs to be used to make this proper.

2) Similarly in AccessControlManager the methods SetAccessPolicy and SetVaultAccessPolicy uses the callers PID to check against a whitelist of process names. This is also racy, the caller can replace its own process by a different one that matches the expectations of this check.

RevocationManager: it is unclear what this is used for, but anybody can call pushEvent, popEvent without authentication. This can DoS memory but also cause something else, whatever popEvent() means for the deepin environment.

TagManagerDaemon::disposeClientData: this method changes a sqlite database and is unauthenticated. Doesn't look trustworthy.

VaultManager interface:

VaultManager2 interface:

UserShareManager interface:

So all in all things have not really improved a lot here. This still cannot be accepted.

STEPS TO REPRODUCE | 复现步骤

None

OBSERVED RESULT | 观察到的结果

No response

EXPECTED RESULT | 期望的结果

No response

SOFTWARE/OS VERSIONS | 软件/系统版本信息

All

ADDITIONAL INFORMATION | 额外补充

No response

BLumia commented 1 year ago

I've forwarded this report to the security team weeks ago (also CC-ed you while sending the email). Due to the COVID thing the related team have some delay in responding. For schedule, the security team plans to address this issue before 22nd, Dec. I'll let you know if there is any update related to this issue.