<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/linux-user-chroot.git/src, branch baserock/morph</title>
<subtitle>gitlab.gnome.org: GNOME/linux-user-chroot.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/'/>
<entry>
<title>Bump up bind mount limit to 1024</title>
<updated>2013-09-24T13:35:48+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2013-09-23T21:06:05+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=5d23708442b16138b800a4e4e9daf20eda50ba46'/>
<id>5d23708442b16138b800a4e4e9daf20eda50ba46</id>
<content type='text'>
The Baserock people were hitting up against the limit of 50, which as
the newly added comment says isn't really effective against DoS
anyways, so let's just bump it up significantly.

Tested-by: Lars Wirzenius &lt;lars.wirzenius@codethink.co.uk&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The Baserock people were hitting up against the limit of 50, which as
the newly added comment says isn't really effective against DoS
anyways, so let's just bump it up significantly.

Tested-by: Lars Wirzenius &lt;lars.wirzenius@codethink.co.uk&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>[SECURITY] Use fsuid to lookup bind mount paths and chroot target</title>
<updated>2013-02-24T15:55:37+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2013-02-24T13:33:31+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=04028db1d9f7909f4c86d9b4d4a8640e65fd11f1'/>
<id>04028db1d9f7909f4c86d9b4d4a8640e65fd11f1</id>
<content type='text'>
Otherise, the user can access otherwise inaccessible directories like
this:

$ linux-user-chroot --mount-bind /root/.virsh ~/mnt / /bin/sh

Also, we should check the accessibility of the chroot target; this is
much harder to exploit because you'd need an executable inside the
chroot that can be run.

Reported-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
Reported-by: Ryan Lortie &lt;desrt@desrt.ca&gt;
Reviewed-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
Signed-off-by: Colin Walters &lt;walters@verbum.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Otherise, the user can access otherwise inaccessible directories like
this:

$ linux-user-chroot --mount-bind /root/.virsh ~/mnt / /bin/sh

Also, we should check the accessibility of the chroot target; this is
much harder to exploit because you'd need an executable inside the
chroot that can be run.

Reported-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
Reported-by: Ryan Lortie &lt;desrt@desrt.ca&gt;
Reviewed-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
Signed-off-by: Colin Walters &lt;walters@verbum.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>[SECURITY] Invoke chdir() after we've switched uid, not before</title>
<updated>2013-02-24T14:24:08+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2013-02-24T13:27:08+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=c4388a624de392a72a5826b0d61c2aa21f283ede'/>
<id>c4388a624de392a72a5826b0d61c2aa21f283ede</id>
<content type='text'>
Otherwise, the user can access otherwise inaccessible directories like:

$ linux-user-chroot --chdir /root/.virsh / /bin/sh

Reported-by: Ryan Lortie &lt;desrt@desrt.ca&gt;
Reported-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Otherwise, the user can access otherwise inaccessible directories like:

$ linux-user-chroot --chdir /root/.virsh / /bin/sh

Reported-by: Ryan Lortie &lt;desrt@desrt.ca&gt;
Reported-by: Marc Deslauriers &lt;marc.deslauriers@canonical.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Only MS_MOVE the root to / if the root isn't already /</title>
<updated>2013-01-10T19:25:37+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2013-01-10T19:25:37+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=61eea63b4042d1c6fba12d79215f5b9247d3b5c5'/>
<id>61eea63b4042d1c6fba12d79215f5b9247d3b5c5</id>
<content type='text'>
Otherwise the MS_MOVE call aborts.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Otherwise the MS_MOVE call aborts.
</pre>
</div>
</content>
</entry>
<entry>
<title>Use MS_MOVE of / rather than chroot()</title>
<updated>2012-12-30T09:58:40+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-12-30T09:58:40+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=21a2e2b39af9f681d7ebeac72a6fcf0487a2b359'/>
<id>21a2e2b39af9f681d7ebeac72a6fcf0487a2b359</id>
<content type='text'>
chroot() breaks some tools that expect / to be an actual mount point.
Doing namespace manipulation is cleaner than chroot().

See http://lists.freedesktop.org/archives/systemd-devel/2012-September/006703.html
"[systemd-devel] OSTree mount integration"
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
chroot() breaks some tools that expect / to be an actual mount point.
Doing namespace manipulation is cleaner than chroot().

See http://lists.freedesktop.org/archives/systemd-devel/2012-September/006703.html
"[systemd-devel] OSTree mount integration"
</pre>
</div>
</content>
</entry>
<entry>
<title>Exit immediately if clone() fails</title>
<updated>2012-08-10T19:35:09+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-08-10T19:35:09+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=3af381d5ef6fa8b479589583db8c4efb199878e4'/>
<id>3af381d5ef6fa8b479589583db8c4efb199878e4</id>
<content type='text'>
This happens when run recursively.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This happens when run recursively.
</pre>
</div>
</content>
</entry>
<entry>
<title>Make use of PR_SET_NO_NEW_PRIVS if available</title>
<updated>2012-08-10T19:07:42+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-08-10T19:07:42+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=ce49cffb83d35e550c16b7aee23fac262e6f359d'/>
<id>ce49cffb83d35e550c16b7aee23fac262e6f359d</id>
<content type='text'>
This flag is exactly what we want for this tool (it's what I thought
SECBIT_NOROOT did).

See the linked discussion from here:

http://lwn.net/Articles/504879/
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This flag is exactly what we want for this tool (it's what I thought
SECBIT_NOROOT did).

See the linked discussion from here:

http://lwn.net/Articles/504879/
</pre>
</div>
</content>
</entry>
<entry>
<title>Add --help and --version arguments</title>
<updated>2012-04-24T12:56:26+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-04-24T12:56:26+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=8312b26c3733a04583084ee3bae9148db84c8b00'/>
<id>8312b26c3733a04583084ee3bae9148db84c8b00</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>newnet: Improve docs some more</title>
<updated>2012-03-13T18:37:41+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-03-13T18:37:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=976957b0067c17612dc889dbeb52d94cedfdcb31'/>
<id>976957b0067c17612dc889dbeb52d94cedfdcb31</id>
<content type='text'>
Suggested by Owen Taylor &lt;otaylor@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Suggested by Owen Taylor &lt;otaylor@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>newnet: Use correct argv for child</title>
<updated>2012-03-13T18:37:31+00:00</updated>
<author>
<name>Colin Walters</name>
<email>walters@verbum.org</email>
</author>
<published>2012-03-13T18:37:31+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/linux-user-chroot.git/commit/?id=61b63e3b0b8d33818925d70373c1c86ec3ffaaa3'/>
<id>61b63e3b0b8d33818925d70373c1c86ec3ffaaa3</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
