Filesystem mounts in user namespaces
Filesystem mounts in user namespaces
Posted Aug 7, 2015 1:45 UTC (Fri) by koverstreet (✭ supporter ✭, #4296)In reply to: Filesystem mounts in user namespaces by neilbrown
Parent article: Filesystem mounts in user namespaces
Oh yeah, the lack of auditing is definitely scary - that's not quite what I was getting at, though. Because there's never been any real pressure to be concerned about this attack vector before, I'm worried that there might be security issues that are just baked into the semantics of posix filesystems - or at least, the VFS interface.
Like it's straightforward enough to e.g. in bcachefs audit all the code that reads in a btree node for buffer overflows and whatnot; there, the issues one is looking for are all local. An adversarial device modifying fs metadata underneath us to do god knows what at the filesystem level? Ugh...
It would be nice if it motivates people to start caring about FUSE performance, too.