| |
| ▲ | 3form 8 hours ago | parent | next [-] | | So, a break out of chroot in a chroot jailed app would be a non-issue because I need root to set it up? | | |
| ▲ | yjftsjthsd-h 7 hours ago | parent [-] | | If you need root to set up the escape, then yes that is relatively uninteresting. Like, we know chroot can't contain root. | | |
| ▲ | 3form 6 hours ago | parent [-] | | Thanks. It was not evident from the example whether root inside of the sandbox is necessary - I assumed creating arbitrary symlinks doesn't require any particular capabilities, and there's nothing special about the locations. Though it's not clear to me now: - why was this patched then? - is the point about root that non-root wouldn't have access to passwd anyway? | | |
| ▲ | ori_b 5 hours ago | parent [-] | | OpenBSD doesn't have separate user accounts for sandboxes. These sandboxes are not linux-style containers, they're narrowed views of the full install. If you're root inside the sandbox, you're root outside it. This exploit requires you to already be root. | | |
| ▲ | 3form 3 hours ago | parent [-] | | But the issue of root and accessing outside of the sandbox is orthogonal, no? Even if you're logged in as XYZ, accessing XYZ's contents outside of the sandbox is still a breach and a problem. Or does this issue require actual root to manifest? | | |
| ▲ | ori_b 2 hours ago | parent [-] | | This path was special cased used to allow restricted applications to access time zone files, which are needed for time functions. Not any symlink will do, it has to be the specific one shown in the example exploit, or one of a small handful of others that were special cased for similar reasons. The place these symlinks live are owned by root. This is the same root user outside the sandbox as inside it. So, yes, you need to have root on the box to set up this exploit. |
|
|
|
|
| |
| ▲ | rs_rs_rs_rs_rs 8 hours ago | parent | prev [-] | | >Here's what I can figure out: you need root to set up the environment just so. I guess you just don't understand what unveil does. | | |
| ▲ | 866-RON-0-FEZ 8 hours ago | parent [-] | | Your arrogance is continued proof you could never comprehend the work that goes into building, releasing, and maintaining an entire OS, and your contributions will forever be limited to snarky negativity on message boards. | | |
| ▲ | rs_rs_rs_rs_rs 6 hours ago | parent [-] | | Anything on unveil and not about me? | | |
| ▲ | 866-RON-0-FEZ 5 hours ago | parent [-] | | If you think their code sucks to the point people should think twice about using it, I suggest you stop using OpenSSH immediately. Please be sure to let us know when your better, more secure replacement is ready. |
|
|
|
|