The function polkit_system_bus_name_get_creds_sync
is used to get the
uid and pid of the process requesting the action. It does this by
sending the unique bus name of the requesting process, which is
typically something like ":1.96", to dbus-daemon
. These unique names
are assigned and managed by dbus-daemon
and cannot be forged, so this
is a good way to check the privileges of the requesting process.
The vulnerability happens when the requesting process disconnects from
dbus-daemon
just before the call to
polkit_system_bus_name_get_creds_sync
starts. In this scenario, the
unique bus name is no longer valid, so dbus-daemon
sends back an error
reply. This error case is handled in
polkit_system_bus_name_get_creds_sync
by setting the value of the
error
parameter, but it still returns TRUE
, rather than FALSE
.
This behavior means that all callers of
polkit_system_bus_name_get_creds_sync
need to carefully check whether
an error was set. If the calling function forgets to check for errors
then it will think that the uid of the requesting process is 0 (because
the AsyncGetBusNameCredsData
struct is zero initialized). In other
words, it will think that the action was requested by a root process,
and will therefore allow it.