[lxc-devel] ioctl CAP_LINUX_IMMUTABLE is checked in the wrong namespace

Andy Lutomirski luto at amacapital.net
Tue Apr 29 18:37:20 UTC 2014




On 04/29/2014 06:49 AM, Marian Marinov wrote:
> Hello,
> when using user namespaces I found a bug in the capability checks done
> by ioctl.
> 
> If someone tries to use chattr +i while in a different user namespace it
> will get the following:
> 
> ioctl(3, EXT2_IOC_SETFLAGS, 0x7fffa4fedacc) = -1 EPERM (Operation not
> permitted)

NAK.  This is correct: you don't want users to be able to
unshare(CLONE_NEWUSER) and then start playing with the immutable bit.

--Andy




More information about the lxc-devel mailing list