On 2025-05-09 08:20, Boyuan Yang wrote:

Just a reminder: if you are trying to report a sensitive security
issue: DO NOT post on debian-devel or other public mailing lists
to avoid disclosing it to the public in an unwanted way.
Please contact Debian Security Team via secur...@debian.org .

If it is about some generic technical discussion, using debian-devel
is suitable.

So, my mail is definitely being blocked based on the content.  I wont
name the specific package, but it involves running code as root that
does not need to be, because a systemd user unit is being started for
the root user.  I really don't think hiding the details (in this
specific case) protects anybody, and honestly I think it reduces
everyone's safety.

The reason I want to post this to debian-devel is because I'd like to
discuss a generic approach to ensuring that systemd user units that
are inappropriate for privileged users to start.

In particular, I'm advocating for some systemd target that would
Conflicts= with units that would have ConditionUser=!root so that
administrators could easily prevent things like drkonqi from starting
in sensitive user sessions.

I'd also like to confirm there is a policy (or at least agreement)
that running code as root unnecessarily is a problem.  I bring that
up because I'm concerned that the bug I filed may go ignored.

Best,
Antonio

Reply via email to