Re: [REVIEW][PATCH 0/43] Completing the user namespace

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx):
> Andrew Lutomirski <luto@xxxxxxx> writes:
> 
> > On Tue, Apr 10, 2012 at 6:01 PM, Eric W. Biederman
> > <ebiederm@xxxxxxxxxxxx> wrote:
> 
> > Sounds like you're reinventing (something very similar to)
> > no_new_privs.  Why not just require no_new_privs as a prerequisite for
> > creating a user namespace if you're unprivileged?
> 
> As I said in the part of my email you snipped, because no_new_privs will
> break suid exec in the user namespace.

Andrew,

note that once you create a new user namespace, you cannot change your
credentials in the ancestor user namespaces.  So in effect you already
have no_new_privs for those namespaces.

So if I'm uid 1001 and I create a task in a new user namespace where
50000 on host is mapped to uid 0 in userns.  Now I try to execute a
file belonging to uid 500 on the host and setuid.  Note that 500 is not
mapped into my user namespace.  That is what Eric meant by either exec
being refused or setuid being ignored.  Either way, the file would be
executed using uid 50000 on the host (and 0 in the user namespace).

-serge
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux