Re: Fwd: Fwd: Getting path in inode_permission

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Feb 12, 2015 at 3:44 AM,  <Valdis.Kletnieks@xxxxxx> wrote:
> And if you're using the passphrase for the chroot() call *itself*, you
> have an even bigger problem - whatever access that passphrase adds is now
> available *anywhere inside the chroot*.
>
> So all I need to do is find a way to exploit the chroot, and now I have
> access to resources outside the chroot.  At which point your security
> scheme is *totally* broken.

You are right. Even on adding the passphrase, if the original program
that executed chroot is exploitable(which my solution tried to take
into account), it could still access the passphrase and we would be
back at square one.

> How about you concentrate on "how were they able to access files outside
> the chroot in the first place"?
So, closing all open file descriptors that are outside the new root
directory + changing the CWD + blocking any mounts.

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies




[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux