FS#65401 - Separation of privileges and reducing the use of root in pacman
            Attached to Project:
            Pacman
            
Opened by Eli Schwartz (eschwartz) - Friday, 07 February 2020, 01:11 GMT
          Opened by Eli Schwartz (eschwartz) - Friday, 07 February 2020, 01:11 GMT
| 
 | Details
                    A useful tool for reducing the scope of security bugs would
                    be to do fewer things as root. As suggested in
                      https://lists.archlinux.org/pipermail/pacman-dev/2020-February/024030.html For example if the internal downloader and XferCommand were to operate as a separate user e.g. "libalpm", which had write permissions for only /var/cache/pacman/pkg, the following bug would not have been able to write anywhere on the system, and would usually fail with a permission denied error: https://security.archlinux.org/CVE-2019-9686 The command injections in these bugs could similarly have avoided being able to run command injection *as root*, greatly reducing the scope of the damage they could do: https://security.archlinux.org/CVE-2019-18182 https://security.archlinux.org/CVE-2019-18183 | 
              This task depends upon
              
              
            
            
           Comment by TJ (boogiepop) -
            Wednesday, 19 February 2020, 02:34 GMT
            
            Comment by TJ (boogiepop) -
            Wednesday, 19 February 2020, 02:34 GMT
          
           
          Definitely need this.
          