Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <54EF7AD9.5010703@gmail.com>
Date: Thu, 26 Feb 2015 14:58:17 -0500
From: Daniel Micay <danielmicay@...il.com>
To: oss-security@...ts.openwall.com
CC: sstewartgallus00@...angara.bc.ca, ryao@...too.org
Subject: Re: CVE request: Linux kernel silently ignores MS_RDONLY for bind
 mounts

The commit adding this in 2.6.26 did actually document the weird
behaviour, so I guess it's just "by design". Users of the API like LXC,
Docker and systemd would likely have to iterate over /proc/self/mounts
and remount everything due to the way MS_REC works. Anyway, there's
clearly something wrong here when containers are claiming to have a
read-only mount feature but writes to the directory tree aren't prevented...


Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.