Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Jan 2017 18:08:36 +0100
From: sivmu <sivmu@....de>
To: oss-security@...ts.openwall.com
Subject: Re: Re: Firejail local root exploit

Am 05.01.2017 um 23:37 schrieb Martin Carpenter:
> Setuid-root makes me sad, copy_file() worries me still and the ability
> for a non-priv user to run any seccomp filter on anything feels like an
> accident waiting to happen (assuming it cannot already be exploited).

Non-priv users can run seccomp filter on anything anyway.
Seccomp does not rewuire any privileges and as far as I know it onl
restricts permissions (to use syscalls) and never expands them.


Also the question is how many of these issues are specific to firejail
and how many of them also applied to (user)namespaces in general or
wrapper tool lke bubblewrap that utilise namespaces as firejail does.

Meaning some of these issues could applie to a lot more programms.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ