summaryrefslogtreecommitdiffstats
path: root/tags/d/dbus-policy-excessively-broad.tag
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-14 13:42:30 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-14 13:42:30 +0000
commit75808db17caf8b960b351e3408e74142f4c85aac (patch)
tree7989e9c09a4240248bf4658a22208a0a52d991c4 /tags/d/dbus-policy-excessively-broad.tag
parentInitial commit. (diff)
downloadlintian-75808db17caf8b960b351e3408e74142f4c85aac.tar.xz
lintian-75808db17caf8b960b351e3408e74142f4c85aac.zip
Adding upstream version 2.117.0.upstream/2.117.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'tags/d/dbus-policy-excessively-broad.tag')
-rw-r--r--tags/d/dbus-policy-excessively-broad.tag30
1 files changed, 30 insertions, 0 deletions
diff --git a/tags/d/dbus-policy-excessively-broad.tag b/tags/d/dbus-policy-excessively-broad.tag
new file mode 100644
index 0000000..264a14f
--- /dev/null
+++ b/tags/d/dbus-policy-excessively-broad.tag
@@ -0,0 +1,30 @@
+Tag: dbus-policy-excessively-broad
+Severity: error
+Check: desktop/dbus
+Explanation: The package contains D-Bus policy configuration that
+ matches broad classes of messages. This will cause strange side-effects,
+ is almost certainly unintended, and is a probable security flaw.
+ .
+ For instance,
+ .
+ &lt;policy user="daemon"&gt;
+ &lt;allow send&lowbar;type="method&lowbar;call"/&gt;
+ &lt;allow send&lowbar;destination="com.example.Bees"/&gt;
+ &lt;/policy&gt;
+ .
+ in any system bus policy file would allow the <code>daemon</code> user to send
+ any method call to any service, including method calls which are meant to
+ be restricted to root-only for security, such as
+ <code>org.freedesktop.systemd1.Manager.StartTransientUnit</code>. (In addition,
+ it allows that user to send any message to the <code>com.example.Bees</code>
+ service.)
+ .
+ The intended policy for that particular example was probably more like
+ .
+ &lt;policy user="daemon"&gt;
+ &lt;allow send&lowbar;type="method&lowbar;call" send&lowbar;destination="com.example.Bees"/&gt;
+ &lt;/policy&gt;
+ .
+ which correctly allows method calls to that particular service only.
+See-Also:
+ http://www.openwall.com/lists/oss-security/2015/01/27/25