Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[merged] Protect against hostname changes with unshared UTS namespace #108

Closed
wants to merge 2 commits into from

Conversation

alexlarsson
Copy link
Collaborator

As reported in #107 we're currently vulnerable to ptrace of the unprivileged part of the child setup. This allows the hostname to be set, even for the host in case the UTS namespace is not unshared.

This is a quick fix to disallow this. We also want to look into the DUMPABLE handling a bit more carefully.

This way we can access these from all the functions.
This is normally verified on argument validation, but it may happen
if someone managed to send custom priv-sep operations via e.g. ptrace.

See containers#107
@giuseppe
Copy link
Member

LGTM

@alexlarsson
Copy link
Collaborator Author

@rh-atomic-bot r+ 1112870

@rh-atomic-bot
Copy link

⌛ Testing commit 1112870 with merge 133dcb7...

rh-atomic-bot pushed a commit that referenced this pull request Oct 13, 2016
This is normally verified on argument validation, but it may happen
if someone managed to send custom priv-sep operations via e.g. ptrace.

See #107

Closes: #108
Approved by: alexlarsson
@rh-atomic-bot
Copy link

☀️ Test successful - travis
Approved by: alexlarsson
Pushing 133dcb7 to master...

@rh-atomic-bot rh-atomic-bot changed the title Protect against hostname changes with unshared UTS namespace [merged] Protect against hostname changes with unshared UTS namespace Oct 13, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants