Firewalld: Improper authentication methods — GLSA 201701-70

A vulnerability in Firewalld allows firewall configurations to be modified by unauthenticated users.

Affected packages

net-firewall/firewalld on all architectures
Affected versions < 0.4.3.3
Unaffected versions >= 0.4.3.3

Background

Firewalld provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces.

Description

A flaw in Firewalld allows any locally logged in user to tamper with or change firewall settings. This is due to how Firewalld handles authentication via polkit which is not properly applied to 5 particular functions to include: addPassthrough, removePassthrough, addEntry, removeEntry, and setEntries.

Impact

A local attacker could tamper or change firewall settings leading to the additional exposure of systems to include unauthorized remote access.

Workaround

There is no known workaround at this time.

Resolution

All Firewalld users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-firewall/firewalld-0.4.3.3"
 

References

Release date
January 29, 2017

Latest revision
January 29, 2017: 1

Severity
normal

Exploitable
local

Bugzilla entries