Thanks for the reply!

The way I look at this is from the perspective of risk. There are two scenarios 
for crossing privilege boundaries:
 - the local user attacking colord via malicious DBus calls (to gain colord 
privs)
 - an external user attacking colord via inserted media (to gain colord privs)

If we don't scan media by default, then the entire external attack goes
away.

If colord doesn't run as root, then a local attacker gains very little
from attacking colord.

The reason I'm so nervous about this is because colord is effectively a
direct path to lcms parsing. Any user can trigger the lcms parser _as
the root user_, and lcms has a non-zero history of security flaws:

        low(2): CVE-2009-0581 CVE-2009-0793
        medium(3): CVE-2008-5317 CVE-2009-0723 CVE-2009-0733

I would much prefer this daemon run as some "colord" system user instead
of as root. The default for any daemon should be to run with least
privilege.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-5317

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0581

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0723

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0733

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0793

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/823185

Title:
  [MIR] colord

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/colord/+bug/823185/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to