Hacker News .hnnew | past | comments | ask | show | jobs | submitlogin

If I understand correctly, rootfull podman with --userns=auto would also prevent the privilege escalation ?
 help



No it wouldn't. The exploit is not impacted by namespaces.

How?

--userns=auto asign a different namespace for each container, so if you escape it you get a random uid far far away from root it also protects other containers from the compromise since they each have their own namespace and uid/gid range, the drawback though is that you can't mount shared volume unless you use a pod, since you would see files from outside your uid/gid range as owned by nobody and inaccessible.

That might make Copy Fail harder to exploit, but I still wouldn’t bet money on CF being impossible to use in that scenario.

Since in --userns=auto, root inside the container gets assigned to the first uid of the uid range assigned by podman, copyfail would succeed but you'd get uid 647831 and be able to do nothing with it



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: