|
|
Subscribe / Log in / New account

Surely you need to handle corrupt data anyway

Surely you need to handle corrupt data anyway

Posted Jun 14, 2023 19:50 UTC (Wed) by SLi (subscriber, #53131)
In reply to: Surely you need to handle corrupt data anyway by bluca
Parent article: Mounting images inside a user namespace

I believe the threat model here was that the unprivileged user attacker controls the disk image and wants to compromise the kernel to elevate privileges. I have slightly hard time imagining a non-contrived scenario where an attacker would control a disk image yet need to trigger a vulnerability in a process that could run with effectively the same or fewer privileges as the container.


to post comments

Surely you need to handle corrupt data anyway

Posted Jun 14, 2023 21:05 UTC (Wed) by mb (subscriber, #50428) [Link]

>I have slightly hard time imagining a non-contrived scenario where an attacker would control a disk image yet need to trigger a vulnerability in a process that could run with effectively the same or fewer privileges as the container.

Automount of a USB stick on a screen-locked machine or similar.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds