ebiederm@xxxxxxxxxxxx (Eric W. Biederman) writes: > I have just merged a security fix into the linux kernel that corrects an > oversight in the permission checks of /proc/self/gid_map. > > The root of the issue is that unix allows anyone to specify permissions > such like: --rwx---rwx on a file, and setgroups call at login time > allows seting groups that even setgid exectuables don't drop. Which > results in the ability to assign a process fewer privileges just because > it is in a specified group, and this makes dropping groups an unsafe > operation. > > Therefore unprivileged writing of /proc/self/gid_map has been disabled > unless /proc/self/setgroups is written first to permanently disable the > ability to call setgroups in that user namespace. > > In part this design was chosen so that applications that are affected > will break early instead of late, and in part to make it clear to > everyone what is going on. > > I think for the experimental tool that is unshare --make-root-user we > just want to flip the bit and be done with it (patch below). > > However we may want to require an additional option to clear setgroups, > if there loging type applications running that call setgroups and having > explicit breakage up front instead of more silent stealthy breakage > when the application runs is desired. > > If we don't want any extra options working tested code is below. This may also have some affect on the setgroups(0, NULL) case of nsenter as well. Eric -- To unsubscribe from this list: send the line "unsubscribe util-linux" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html