- 05 Sep, 2015 1 commit
-
-
Colin Walters authored
By default, we had supported `--mount-bind /dev /dev` to get access to devices. But in many cases, build systems and the like will want to avoid exposing host physical devices. For example, if I'm building something locally, I don't want the makefile etc. to be able to access `/dev/dri`.
-
- 01 Sep, 2015 1 commit
-
-
Colin Walters authored
-
- 28 Aug, 2015 1 commit
-
-
Colin Walters authored
seccomp is disabled by default for backwards compatibility. This "v0" version is a basic blacklist that turns off some of the known historical attack surface, initially imported from xdg-app. I added a note about code sharing - we should share rules among container implementations.
-
- 25 Aug, 2015 2 commits
-
-
Colin Walters authored
I took this from xdg-app.
-
Colin Walters authored
So sadly, I screwed up the invocation of `prctl(PR_SET_NO_NEW_PRIVS` - we need to provide 0 for the remaining arguments, otherwise the kernel will *always* give us `-EINVAL`. I didn't notice this at the time because I wanted to support the RHEL6 kernel. Anyways, I no longer care about RHEL6 myself, and I'm going to declare no one else should either =)
-
- 24 Sep, 2013 1 commit
-
-
Colin Walters authored
The Baserock people were hitting up against the limit of 50, which as the newly added comment says isn't really effective against DoS anyways, so let's just bump it up significantly. Tested-by:
Lars Wirzenius <lars.wirzenius@codethink.co.uk>
-
- 24 Feb, 2013 2 commits
-
-
Colin Walters authored
Otherise, the user can access otherwise inaccessible directories like this: $ linux-user-chroot --mount-bind /root/.virsh ~/mnt / /bin/sh Also, we should check the accessibility of the chroot target; this is much harder to exploit because you'd need an executable inside the chroot that can be run. Reported-by:
Marc Deslauriers <marc.deslauriers@canonical.com> Reported-by:
Ryan Lortie <desrt@desrt.ca> Reviewed-by:
Marc Deslauriers <marc.deslauriers@canonical.com> Signed-off-by:
Colin Walters <walters@verbum.org>
-
Colin Walters authored
Otherwise, the user can access otherwise inaccessible directories like: $ linux-user-chroot --chdir /root/.virsh / /bin/sh Reported-by:
Ryan Lortie <desrt@desrt.ca> Reported-by:
Marc Deslauriers <marc.deslauriers@canonical.com>
-
- 10 Jan, 2013 1 commit
-
-
Colin Walters authored
Otherwise the MS_MOVE call aborts.
-
- 30 Dec, 2012 1 commit
-
-
Colin Walters authored
chroot() breaks some tools that expect / to be an actual mount point. Doing namespace manipulation is cleaner than chroot(). See http://lists.freedesktop.org/archives/systemd-devel/2012-September/006703.html "[systemd-devel] OSTree mount integration"
-
- 10 Aug, 2012 2 commits
-
-
Colin Walters authored
This happens when run recursively.
-
Colin Walters authored
This flag is exactly what we want for this tool (it's what I thought SECBIT_NOROOT did). See the linked discussion from here: http://lwn.net/Articles/504879/
-
- 24 Apr, 2012 1 commit
-
-
Colin Walters authored
-
- 20 Feb, 2012 1 commit
-
-
Colin Walters authored
For some reason the RHEL6 kernel-headers package doesn't have it. Let's just follow for now the cargo culting of "define defines ourself if not available" that various kernel-tied utilities have because various buildsystems are too shitty to make it easy to install newer kernel headers even if you're running an old kernel.
-
- 22 Jan, 2012 1 commit
-
-
Colin Walters authored
It was just an extra check to be sure we would be switching back to the right uid, but there's no reason not to allow executing this program as root.
-
- 18 Jan, 2012 2 commits
-
-
Colin Walters authored
Just more convenient, and there's no reason not to.
-
Colin Walters authored
This is convenient for when we just want e.g. --unshare-net.
-
- 06 Jan, 2012 1 commit
-
-
Colin Walters authored
-