Conversation

a key but often overlooked feature of distributions is that package *removal* is another form of package curation that is largely targeted at harm reduction. maybe i should blog about that someday
2
21
Replying to
Firejail is horrible but unfortunately user namespaces also provide a bunch of low-hanging local root vulnerabilities by exposing substantially more kernel attack surface to anything able to use them. It's important to disallow nearly anything from actually making namespaces.
1
5
A lot of setuid binaries don't take the risk of that poorly designed privilege elevation mechanism seriously and Firejail is definitely one of those. Unfortunately most of the Linux kernel has the same approach to user namespaces. Developers see their code as not attack surface.
1
2
The developers who wrote a lot of those things assumed only root could use them and did not write them to be at all robust to unprivileged users having access. Many of them don't agree with exposing the code this way so they don't actually see it as an issue for their subsystem.
1
2
Similar in some ways to how filesystem developers have historically considered it laughable to avoid trusting the filesystem state despite removable drives and verified boot both being widely used for ages and both depending on this actually being taken seriously.
1
3
Show replies