For your reassurance, the previous design of Checkbox using dbus was not
quite as much a security vulnerability as that. In fact, the backend
running as root could only run commands known to be tests. So, you could
not connect to the backend and request to run a command like: rm -fr /.
However, where this became a potential security vulnerability is when
integrating third party test suites.

In Checkbox, tests are called jobs because they actually represent
composites, ie jobs can generate new jobs and so forth. So, when
integrating a third party suite like autotest, the integration job
branches the project and extracts the tests within, which produce other
jobs. If the repository was compromised or if the location where they
got branched got compromised, then the produced jobs could essentially
run arbitrary commands and still be considered legit by the backend.

The current solution of using sudo/gksu/kdesudo might seem overkill but
seems to be the safest way to guarantee that a normal user will not
compromise his system by accident. If an equally secure solution could
be implemented with PolicyKit, this would be awesome. Perhaps this could
be a topic of discussion for the next UDS where we should invite the
security team.

-- 
Candidate revision checkbox_0.9
https://bugs.launchpad.net/bugs/532882
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to