NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/54947: chroot mount file systems leak the actual path in superblock



The following reply was made to PR kern/54947; it has been noted by GNATS.

From: Christos Zoulas <christos%zoulas.com@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: kern-bug-people%netbsd.org@localhost,
 gnats-admin%netbsd.org@localhost,
 netbsd-bugs%netbsd.org@localhost
Subject: Re: kern/54947: chroot mount file systems leak the actual path in
 superblock
Date: Sat, 8 Feb 2020 11:27:40 -0500

 --Apple-Mail=_525BB5EF-7C6C-420B-9FF3-5BD1D18DFA4A
 Content-Transfer-Encoding: quoted-printable
 Content-Type: text/plain;
 	charset=us-ascii
 
 1. There is nothing to be done about it; the part is recorded inside the =
 superblock.
 2. One should not be making device nodes with access to physical devices =
 in the chroot.
     Getting the path from the superblock is the least of the concerns if =
 you give root access
     inside a chroot...
 3. This is purely an information leak. The same can happen if you plug =
 in a usb fob that
     has a filesystem on it, and the information you get on it is not =
 very useful.
 
 christos
 
 --Apple-Mail=_525BB5EF-7C6C-420B-9FF3-5BD1D18DFA4A
 Content-Transfer-Encoding: 7bit
 Content-Disposition: attachment;
 	filename=signature.asc
 Content-Type: application/pgp-signature;
 	name=signature.asc
 Content-Description: Message signed with OpenPGP
 
 -----BEGIN PGP SIGNATURE-----
 Comment: GPGTools - http://gpgtools.org
 
 iF0EARECAB0WIQS+BJlbqPkO0MDBdsRxESqxbLM7OgUCXj7hfAAKCRBxESqxbLM7
 OnS4AJ41vtXheH31Cf8Yk0A1dMy3fhgzhgCgwbYEwZFLnsBIC9S2NsxN8k8Dsz4=
 =jMJM
 -----END PGP SIGNATURE-----
 
 --Apple-Mail=_525BB5EF-7C6C-420B-9FF3-5BD1D18DFA4A--
 


Home | Main Index | Thread Index | Old Index