| Summary: | jail problem | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | Kalou <pb> | ||||
| Component: | kern | Assignee: | Robert Watson <rwatson> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Only Me | ||||||
| Priority: | Normal | ||||||
| Version: | Unspecified | ||||||
| Hardware: | Any | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
Responsible Changed From-To: freebsd-bugs->rwatson I'm chasing these bugs. State Changed From-To: open->closed Committed to -CURRENT as part of vfs_syscalls.c:1.207 |
A jailed superuser is able to unmount a directory, provided the fact that this directory is under his jail root directory. The problem lies in the way uid is checked. Where user.creds are compared to object.creds, if uid == 0, the suser()-in-jail-like behaviour is not true anymore. This may be true for other protection checks (ipc, nicing of processes, what else.. ?) How-To-Repeat: I'm so sorry i don't have an example right there. Just email me back for the C source I tested this with.