Issue metadata
Sign in to add a comment
|
Security: User+mount namespace allows creating a R+X mount as non-root |
||||||||||||||||||||||
Issue description
"The noexec bypass uses user mount namespaces with pid mapping to mount a tmpfs directory, which does not have the noexec flag applied, and this mount is then
accessed via the /proc/${PID}/cwd directory from outside the namespace, allowing a temporary executable mount. This mount also does not have the nosuid flag
applied, but it can only be read/written by the chronos user (or root), so this is not useful without another exploit (e.g root command execution to drop a
setuid shell)"
,
Feb 8 2018
,
Feb 8 2018
,
Feb 16 2018
,
Jun 2 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by jorgelo@chromium.org
, Feb 6 2018