Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restore old syscall setresuid behavior when escalating/dropping privileges. #1578

Merged
merged 1 commit into from Jul 24, 2023

Conversation

cclerget
Copy link
Contributor

Description of the Pull Request (PR):

Restore old syscall setresuid behavior when escalating/dropping privileges to only change UID for the locked thread

This fixes or addresses the following GitHub issues:

Before submitting a PR, make sure you have done the following:

internal/pkg/util/priv/priv_linux.go Outdated Show resolved Hide resolved
@DrDaveD
Copy link
Contributor

DrDaveD commented Jul 24, 2023

Also this will need a CHANGELOG entry (just above the v1.2.0 release, not part of the other changes listed above there now which are for 1.3)

@cclerget cclerget force-pushed the issue-1576 branch 2 times, most recently from 9c35c04 to 1f30009 Compare July 24, 2023 18:21
…leges.

Signed-off-by: Cédric Clerget <cedric.clerget@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Instance started with --net as an unprivileged user in SUID mode is owned by root
2 participants