Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Put a sandboxed application running as spot in a user namespace #3484

Merged
merged 1 commit into from Oct 16, 2022

Conversation

dimkr
Copy link
Contributor

@dimkr dimkr commented Oct 10, 2022

Another layer of security hardening can't hurt. After this change, sandboxed applications running as spot don't see users other than spot: files owned by root look just like files owned by nobody, and UIDs other than spot's UID are invalid.

Copy link
Contributor

@01micko 01micko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While my C is still pretty fundamental, this looks OK to me.

@dimkr dimkr merged commit 86b42f9 into puppylinux-woof-CE:testing Oct 16, 2022
@dimkr dimkr deleted the feature/spot-namespace branch October 16, 2022 05:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants