Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

units: add nosuid and nodev options to tmp.mount #3575

Merged
merged 1 commit into from Jun 22, 2016

Conversation

martinpitt
Copy link
Contributor

This makes privilege escalation attacks harder by putting traps and exploits into /tmp.

This was pointed out in https://bugs.debian.org/826377: under SysV init, enabling /tmp on tmpfs used these options.

There are a few corner cases where this might break things, such as putting a container overlay into /tmp. But real-world container managers (nspawn, lxc, etc.) already create their own emphemeral overlay mounts and do not depend on /tmp.

This makes privilege escalation attacks harder by putting traps and exploits
into /tmp.

https://bugs.debian.org/826377
@poettering
Copy link
Member

these kinds of changes always tend to break a lot of stuff. but ok, let's let this go in but keep a watchful eye.

Any chance you can prep a NEWS entry for this already?

@poettering poettering merged commit 2f9df7c into systemd:master Jun 22, 2016
@martinpitt
Copy link
Contributor Author

Sure! I didn't expect this to get merged that fast :-). So I filed a new PR #3576 for the NEWS update. Thanks!

Werkov pushed a commit to Werkov/systemd that referenced this pull request May 12, 2017
This makes privilege escalation attacks harder by putting traps and exploits
into /tmp.

https://bugs.debian.org/826377
(cherry picked from commit 2f9df7c)
Werkov pushed a commit to Werkov/systemd that referenced this pull request Jun 22, 2017
This makes privilege escalation attacks harder by putting traps and exploits
into /tmp.

https://bugs.debian.org/826377
(cherry picked from commit 2f9df7c)
mikhailnov added a commit to mikhailnov/systemd that referenced this pull request Oct 22, 2019
This reverts commit 2f9df7c.

[ compat230 ] Only for max compatibility with behaviour of systemd 230
mikhailnov added a commit to mikhailnov/systemd that referenced this pull request Aug 10, 2021
This reverts commit 2f9df7c.

[ compat230 ] Only for max compatibility with behaviour of systemd 230

Signed-off-by: Mikhail Novosyolov <m.novosyolov@rosalinux.ru>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

Successfully merging this pull request may close these issues.

None yet

2 participants