Skip to content
This repository has been archived by the owner on Oct 2, 2024. It is now read-only.

seccomp root emulation: filter capset(2) with more nuance #1891

Open
reidpr opened this issue Apr 15, 2024 · 0 comments
Open

seccomp root emulation: filter capset(2) with more nuance #1891

reidpr opened this issue Apr 15, 2024 · 0 comments

Comments

@reidpr
Copy link
Collaborator

reidpr commented Apr 15, 2024

At present, we simply fake success for capset(2). However, like mknod(2), some uses of capset(2) are privileged and others are unprivileged. We could let through the unprivileged calls.

Figuring out what is privileged and what isn’t is quite a bit more complicated, though, and it requires dereferencing struct pointers.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant