[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-12 Thread Launchpad Bug Tracker
This bug was fixed in the package lxc - 1.0.0~alpha1-0ubuntu13 --- lxc (1.0.0~alpha1-0ubuntu13) saucy-proposed; urgency=low * debian/rules and debian/lxc.postinst: set /var/lib/lxc and /var/cache/lxc to be perms 700. That prevents unprivileged users from running setuid-root

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Stéphane Graber
Confirmed on precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid executables in a container may compromise security on the host To manage notifications about t

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Stéphane Graber
And confirmed on saucy. Marking verification-done. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: s

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Launchpad Bug Tracker
This bug was fixed in the package lxc - 0.8.0~rc1-4ubuntu39.12.10.5 --- lxc (0.8.0~rc1-4ubuntu39.12.10.5) quantal-proposed; urgency=low * add mkdir before chown of /var/{lib,cache}/lxc to avoid build failure. lxc (0.8.0~rc1-4ubuntu39.12.10.4) quantal-proposed; urgency=low * debi

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Launchpad Bug Tracker
This bug was fixed in the package lxc - 0.9.0-0ubuntu3.7 --- lxc (0.9.0-0ubuntu3.7) raring-proposed; urgency=low * debian/rules and debian/lxc.postinst: set /var/lib/lxc and /var/cache/lxc to be perms 700. That prevents unprivileged users from running setuid-root applicatio

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Launchpad Bug Tracker
This bug was fixed in the package lxc - 0.7.5-3ubuntu69 --- lxc (0.7.5-3ubuntu69) precise-proposed; urgency=low * mkdir /var/{cache.lib}/lxc before chmoding them to avoid FTBFS. lxc (0.7.5-3ubuntu68) precise-proposed; urgency=low * debian/rules and debian/lxc.postinst: set /var/

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Stéphane Graber
Confirmed on quantal -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid executables in a container may compromise security on the host To manage notifications about t

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-05 Thread Stéphane Graber
Confirmed on raring -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid executables in a container may compromise security on the host To manage notifications about th

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-11-04 Thread Stéphane Graber
Hello Andrea, or anyone else affected, Accepted lxc into saucy-proposed. The package will build now and be available at http://launchpad.net/ubuntu/+source/lxc/1.0.0~alpha1-0ubuntu13 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wik

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-30 Thread Serge Hallyn
The saucy fix must wait for another active SRU to complete. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid executables in a container may compromise security on th

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-30 Thread Andrea Corbellini
Waiting for the SRU to land in Saucy. Has it been delayed for some reason or has it been forgotten? :-) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid executables

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Stéphane Graber
Not to mention the change is being SRUed to all release, so they'll get the change way before they dist-upgrade. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to lxc in Ubuntu. https://bugs.launchpad.net/bugs/1244635 Title: setuid exe

Re: [Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Serge Hallyn
Quoting Seth Arnold (1244...@bugs.launchpad.net): > Serge, what does " After this version, respect the user's choice." mean? It means if the user manually chmods /var/lib/lxc to 755, we don't change it again after this. (Except, see below) > Does this mean someone upgrading from e.g. 12.04.3 lxc

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Seth Arnold
Serge, what does " After this version, respect the user's choice." mean? Does this mean someone upgrading from e.g. 12.04.3 lxc packages to 14.04 lxc packages -- skipping this update -- would have the 'unsafe' permissions? Or will this check be carried before to e.g. 14.04 lxc packages and only ex

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Stéphane Graber
Hello Andrea, or anyone else affected, Accepted lxc into precise-proposed. The package will build now and be available at http://launchpad.net/ubuntu/+source/lxc/0.7.5-3ubuntu68 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubu

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Serge Hallyn
** Changed in: lxc (Ubuntu Quantal) Status: New => Fix Committed ** Changed in: lxc (Ubuntu Raring) Status: New => Fix Committed ** Changed in: lxc (Ubuntu Raring) Importance: Undecided => Medium ** Changed in: lxc (Ubuntu Quantal) Importance: Undecided => Medium ** Changed

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-29 Thread Launchpad Bug Tracker
This bug was fixed in the package lxc - 1.0.0~alpha2-0ubuntu5 --- lxc (1.0.0~alpha2-0ubuntu5) trusty; urgency=low [ Serge Hallyn] * debian/rules and debian/lxc.postinst: set /var/lib/lxc and /var/cache/lxc to be perms 700. That prevents unprivileged users from running setuid-

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-28 Thread Serge Hallyn
** Also affects: lxc (Ubuntu Quantal) Importance: Undecided Status: New ** Description changed: + == + 1. Impact: unprivileged users could run setuid-root binaries from out-of-date containers. + 2. Development fix: make /var/lib/lxc world- and group-unre

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-26 Thread Andrea Corbellini
Good news. However I must say that the documentation on LXC does not say that libvirt is less secure than the official LXC: https://help.ubuntu.com/13.10/serverguide/lxc.html#lxc-libvirt So either libvirt should ship with an Apparmor profile for LXC, or a warning should be added to the relevant p

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-26 Thread Stéphane Graber
Right, libvirt-lxc isn't LXC (even though they sort of stole the name) and is indeed completely unsafe... As for the rest, I'm happy to report that you misread the apparmor profile and that we thought of and blocked all of those from the beginning as is shown below: root@lxc-dev:/# echo abc > /s

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-26 Thread Andrea Corbellini
Hi Stéphane, I can see at least three ways of escaping. The first is using LXC through libvirt. I see that there's an Apparmor profile for usr.bin.lxc-start, but AFAIK libvirt does not use lxc-start. Also, libvirt does not load the "lxc-containers" profile (AFAIK). This is proven by the fact tha

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-26 Thread Stéphane Graber
For those users, getting back to the old way would be a chmod away and I asked Serge to make sure permissions would only be changed once and not with every update, so it should be a one time thing. As for security, while we don't currently say LXC is secure on Ubuntu, we're not aware of any way to

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-26 Thread Andrea Corbellini
> I also don't feel that this is a high priority bug since, so far, we do not recommend allowing unprivileged users to use containers. Agreed. Especially because (currently) it's fairly easy to escape from LXC when you have root access to the container. > I don't believe it would be a serious los

[Bug 1244635] Re: setuid executables in a container may compromise security on the host

2013-10-25 Thread Serge Hallyn
Thanks for pointing this out. I don't believe it would be a serious loss of functionality to chmod 0700 /var/lib/lxc. I also don't feel that this is a high priority bug since, so far, we do not recommend allowing unprivileged users to use containers. So I think a regular update in trusty with SR