Comment 10 for bug 1829071

Revision history for this message
Chris Moberly (chris.moberly) wrote :

This is great, thank you for such quick action. I think this is a definite improvement.

It is still my personal opinion that these are legitimate privilege escalation vulnerabilities, but at least this provides users with a bit of warning.

As a final thought:

- Specifically related to UNIX socket in the proxy device: root processes are allowed to choose which peer credentials are sent in socket message ancillary data. LXD could be designed to pass the creds of the user who instantiated the proxy connection, as opposed to root creds. This would mitigate the issue.

- Specifically to mounting the filesystem. The mount could be done in such a way to replicate the privileges of the initiating user. This would mitigate the issue.

I will update my write-up to state that documentation has been clarified and that there are no plans for remediate these issues.