Date: Wed, 13 Aug 2014 17:35:23 +0200 From: Yves-Alexis Perez <corsac@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: ro bind mount bypass using user namespaces On Tue, Aug 12, 2014 at 02:48:28PM -0700, Kenton Varda wrote: > Due to a bug in the Linux kernel's implementation of remount, on systems > with unprivileged user namespaces enabled, it is possible for an > unprivileged user to gain write access to any visible read-only bind mount. > It is also possible to bypass flags like nodev, nosuid, and noexec. > So that means running with both USER_NS=y and kernel.unprivileged_userns_clone=1? Regards, -- Yves-Alexis [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ