lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 25 Sep 2007 16:48:06 +0100 From: Alan Cox <alan@...rguk.ukuu.org.uk> To: David Newall <david@...idnewall.com> Cc: "Serge E. Hallyn" <serge@...lyn.com>, Bill Davidsen <davidsen@....com>, Philipp Marek <philipp@...ek.priv.at>, 7eggert@....de, majkls <majkls@...pere.com>, bunk@...tum.de, linux-kernel@...r.kernel.org Subject: Re: Chroot bug On Wed, 26 Sep 2007 01:05:07 +0930 David Newall <david@...idnewall.com> wrote: > Alan Cox wrote: > >> Marek's loading dynamic libraries, it seems clear that the prime purpose > >> of chroot is to aid security. Being able to cd your way out is handy > >> > > > > Does it - I can't find any evidence for that. > > It seems self-evident to me. What do you think is it prime purpose? Debugging and testing. At least that is as I understand it much of where it came from. > > A root user can get out of a chroot a million different ways > One of those ways shouldn't be that chroot lets you out. A fence with 10000 open gates is not improved by turning it into a fence with 9999 open gates. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists