Drawing lessons from fatal SELinux bug #1054350
Josh Stone
jistone at redhat.com
Sat Jan 25 18:37:48 UTC 2014
On 01/25/2014 06:03 AM, Bruno Wolff III wrote:
> On Fri, Jan 24, 2014 at 20:40:28 -0800,
> Josh Stone <jistone at redhat.com> wrote:
>>
>> My point was not about what root can do. Suppose there's a vulnerable
>> 'sudo' binary that gives everyone a root shell. If that binary is
>> available on any executable path, even readonly, that's trouble.
>
> That isn't true. File systems can be mounted such that suid bits are
> ignored. suid executables on such file systems are effectively just
> normal executables.
Ok, sure, you can mount -o nosuid,noexec,nodev ... but this isn't the
default for btrfs subvolume paths AFAIK. It needs to be a conscious
decision in whatever snapshot design we choose.
More information about the devel
mailing list