Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????t

看板FB_security作者時間14年前 (2011/05/10 19:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串10/29 (看更多)
In message <86zkmu26k3.fsf@ds4.des.no>, =?utf-8?Q?Dag-Erling_Sm鷨grav?= wr ites: >Jason Hellenthal <jhell@DataIX.net> writes: >> Do you know if there is a way that chmod on / from within the jail could > >> be prevented easily without breaking something ? Maybe not failing but >> falling though and return 0 for any operation with the sole argument of /. > >Not without adding explicit checks in the kernel. I identified this issue back when I implemented jails and though long and hard about adding a kernel hack to paste over this. My conclusion was that there were not enough justification for it, based on the usage model envisioned then: virtual-machines-light. Gettys first rule says: 1. Do not add new functionality unless an implementor cannot complete a real application without it. and I think we should stick to that before adding more or less random pieces of magic to the kernel. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1DoHhlqf (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 10 之 29 篇):
文章代碼(AID): #1DoHhlqf (FB_security)