| ▲ | stonegray 5 hours ago | ||||||||||||||||
> “and is writable with CAP_SYS_ADMIN” Am I reading this wrong or is this just a way of executing an arbitrary binary with uid=0 if you have both CAP_NET_ADMIN and CAP_SYS_ADMIN? If you can write modprobe_path, is it really news that you can find a way to execute code? | |||||||||||||||||
| ▲ | PlasmaPower 4 hours ago | parent | next [-] | ||||||||||||||||
No, you can grant yourself this inside an unprivileged user namespace. `unshare -Ur capsh --print` lists the capabilities inside a user namespace and demonstrates that it has both CAP_SYS_ADMIN and CAP_NET_ADMIN. Almost all distros allow unprivileged user namespaces, and in my opinion this is the right decision, because they're important for browser sandboxing which I think is more important than LPEs. | |||||||||||||||||
| |||||||||||||||||
| ▲ | pizzalife 5 hours ago | parent | prev [-] | ||||||||||||||||
Right. `CAP_SYS_ADMIN` is for all intents and purposes equivalent to root. | |||||||||||||||||