Relaxing strict chroot checks on recent Linux kernels?

Damien Miller djm at mindrot.org
Tue Feb 5 08:23:20 EST 2013


On Mon, 4 Feb 2013, Andy Lutomirski wrote:

> > I probably wouldn't want to rely on it
> > though, as there are probably bad things that can be done even without
> > raising privs in the process that launches the attack. E.g. rewrite
> > /etc/ld.so.preload. Remember that ChrootDirectory isn't just for sftp.
> 
> Sure it is -- I'm using ForceCommand internal-sftp.  I agree that if
> there's any way to get a non-no_new_privs program in a writable chroot
> then there's a privilege escalation, but I only want sftp.

You might only want sftp, but like I said: ChrootDirectory is more general
and has to support other uses.

-d


More information about the openssh-unix-dev mailing list