Comment 1 for bug 1010787

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for reporting a bug in Ubuntu. I'm not following your reasoning. Chroots are not designed to provide a security barrier for root processes, so, like you say, a root process can break out. However, typical usage of sbuild is with schroot and packages that are built in the chroot should not be running as root. Therefore a user in the schroot should not be able to gain root in the manner described unless the chroot is misconfigured -- can you provide specifics? All that said, building untrusted packages means running untrusted code and a chroot should not necessarily be relied on for security (one can use snapshotted or throwaway virtual machines for this sort of thing).