Security vulnerabilities must not be ignored!
Robert,
Cant LightDM use AppArmor or PolicyKit?
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in Ubuntu.
https://bugs.launchpad.net/bugs/401107
Title:
Software runs as root
To ma
** No longer affects: consolekit (Ubuntu)
** No longer affects: modemmanager (Ubuntu)
** No longer affects: udev (Ubuntu)
** No longer affects: upower (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in Ubuntu.
https://b
LightDM must run as root to do authentication correctly and be able to
create user session.
** Changed in: lightdm (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in Ubuntu.
https://bugs.laun
Sigh, please stop doing this. You've been asked not to on more than one
occasion already.
** No longer affects: accountsservice (Ubuntu)
** No longer affects: udisks (Ubuntu)
** No longer affects: ubuntu-system-service (Ubuntu)
** No longer affects: util-linux (Ubuntu)
--
You received this bu
** Also affects: udev (Ubuntu)
Importance: Undecided
Status: New
** Also affects: udisks (Ubuntu)
Importance: Undecided
Status: New
** Also affects: upower (Ubuntu)
Importance: Undecided
Status: New
** Also affects: accountsservice (Ubuntu)
Importance: Undecided
Upstream video drivers require running as root in order to set the video
modes.
Some video drivers upstreams (-intel, -ati, -nouveau) are working on
moving mode setting to the kernel, which in theory would enable X to run
as non-root some day, but consider that Ubuntu works with a range of
other v
Feel free to open bugs with upstream software if you think they need
fixing. If they need to be replaced, feel free to open bugs here and
suggest adequate replacements.
Of course we want to reduce the quantity of software running as root. As
such, as soon as it is feasible to run X.org without the
If that is the only way, then the software is bad, and needs to be fixed
or replaced.
I do not want an insecure system and potentially exploitable system
because of a setup with badly isolated processes and crappy software
that requires superuser privileges.
X.org can be fixed so it wont need to
Thanks for opening this bug report.
Most of the daemons you've listed run as superuser as that is the only
way to have the necessary privileges for them to operate correctly. In
some cases, the daemons are protected by AppArmor profiles. This is the
case with cups and dhcp3.
If you have discovere
** Visibility changed to: Public
--
Software runs as root
https://bugs.launchpad.net/bugs/401107
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in ubuntu.
--
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubu
10 matches
Mail list logo