Lennart Poettering wrote:
> The IPC message is the *full* vulnerable surface, and that's as minimal as
> it can get. And that's great.

But that message can actually open a whole new vulnerability, compared to a 
monolithic program running completely as root. E.g., I have seen several 
D-Bus-activated PolicyKit helpers that basically allow running an arbitrary 
command as root. Grant the PolicyKit permission for any of those to an 
unprivileged user and you have given them instant root. The monolithic 
version would make that a function, method, or class in a monolithic 
executable that is only ever called with some specific commands as an 
argument. The "more secure" PolicyKit-based design introduces the extra 
entry point that needs to be protected against unauthorized access.

        Kevin Kofler
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to