Bug 1441584 (CVE-2017-7572)

Summary: CVE-2017-7572 backintime: Race condition in the checkPolkitPrivilege function
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED RAWHIDE QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: i, johannes.lips, projects.rg
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: backintime 1.1.20 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-05-06 07:23:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1441585    
Bug Blocks:    

Description Andrej Nemec 2017-04-12 09:17:43 UTC
The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester. 

Upstream patch:

https://github.com/bit-team/backintime/commit/7f208dc547f569b689c888103e3b593a48cd1869

References:

https://github.com/bit-team/backintime/releases/tag/v1.1.20

Comment 1 Andrej Nemec 2017-04-12 09:18:14 UTC
Created backintime tracking bugs for this issue:

Affects: fedora-all [bug 1441585]

Comment 2 Raphael Groner 2018-04-06 19:55:45 UTC
Bug 1441585 is closed, so can we close here as well?