Am 2017-02-19 13:17, schrieb Martin Gräßlin:
But I'm not able to authenticate any more. The seccomp filter gets
inherited to forked processes and cannot be disabled any more (the
idea is that you cannot escape the sandbox). KScreenlocker forks+exec
kcheckpass and that somehow opens a file in write mode for the pam
interaction.

Some additional findings. kcheckpass fails by just activating seccomp without any rules at all except allow all. With the help of /var/log/auth.log I figured out that kcheckpass invokes unix_chkpwd which is setuid and once seccomp is installed one isn't allowed to gain more privs by e.g. forking into a setuid binary. So I start to understand the problem ;-)

Cheers
Martin

Reply via email to