FYI, Debian already did that.
Announcement
Collapse
No announcement yet.
Fedora 37 Looks To Make pkexec Optional For Improved Security
Collapse
X
-
Originally posted by mdedetrich View Post
I think the point is that Linux counterparts exist, but they are terrible in comparison either because they are so convoluted that most developers don't bother using them (which from a security standpoint is failure) or the security is being applied by the wrong party.
Lately Linux seems to be just copying security mechanisms from BSD's basically because the implementation is both simple and also solves the problem.
- Likes 7
Comment
-
Originally posted by mdedetrich View Post
Can you expand more on this topic? What is pledge/unveil?
I used Bob Beck's work in my paper, which unfortunately was just for a class in my Masters in IT program and never got published. I had it hosted on my personal website but couldn't afford to pay for web hosting for a bit so the site is down for now. Hope to get it going again soon and it will host my paper.
If you have any more questions I will try to answer them. I know some C programing but am not an OS programer.
- Likes 4
Comment
-
Originally posted by cl333r View PostI'm just a Linux user, why isn't pkexec fixed instead?
- Likes 1
Comment
-
Originally posted by RahulSundaram View Post
You maybe missing the fact the vulnerability is already fixed but since pkexec is largely unused, splitting off the package makes it possible to not install the pkexec binary as part of polkit by default which reduces the default attack surface.
- Likes 1
Comment
-
Originally posted by cl333r View Post
I'm using pkexec, to me it didn't seem like "largely unused". What should applications relying on the existence of pkexec use instead? Some other executable or some DBus interface?
Comment
-
Originally posted by cl333r View PostWhat should applications relying on the existence of pkexec use instead?
Comment
-
Originally posted by CommunityMember View Post
There is no single right answer, as it depends on the details. Sometimes the applications should be using targeted capabilities rather than running with full root privs in the first place, sometimes various IPC mechanisms, etc. Realistically all the changes to fully drop pkexec will take some time to happen (some parts of the discussion happened over a decade ago, but the (hard) work got deferred), but now that pkexec has resulted in a serious CVE people have been given some reason to go back and revisit how to reduce the need for pkexec (and some of its brethren).
- Likes 2
Comment
-
Comment