Bug#1012547: linux: disable user namespaces per default

2022-10-26 Thread Philippe Cerfon
Here we go, another one, it seems: CVE-2022-2588 (https://seclists.org/oss-sec/2022/q3/115) Seems I'm not the only one who's quite concerned about the ongoing security impact of user namspaces, as the recent/current discussion about some LSM patches for 6.1 shows: https://lwn.net/ml/linux-kernel

Bug#1012547: linux: disable user namespaces per default

2022-08-08 Thread Philippe Cerfon
Apparently it's already Christmas: The next two holes that likely allow privilege escalation and that would have been mitigated by unprivileged user namespaces being disabled: CVE-2022-1015, CVE-2022-1016 Cheers, Phiippe

Bug#1012547: linux: disable user namespaces per default

2022-07-05 Thread Philippe Cerfon
On Thu, Jun 16, 2022 at 6:19 PM Philippe Cerfon wrote: > Well I guess the 6 or so root security holes, and counting And here we go already, faster than even I'd have expected: Say welcome to CVE-2022-32250, the next root security hole which would apparently have been mitigated if Debian were to

Bug#1012547: linux: disable user namespaces per default

2022-06-16 Thread Philippe Cerfon
On Mon, Jun 13, 2022 at 4:56 PM Ben Hutchings wrote: > This is wrong. Well quite apparently not. > On the desktop, browsers and Flatpak rely on user > namespaces for sandboxing (with an alternative being to install more > programs setuid-root). At least firefox doesn't seem to need it, neither

Bug#1012547: linux: disable user namespaces per default

2022-06-13 Thread Ben Hutchings
On Mon, 2022-06-13 at 17:46 +0200, Diederik de Haas wrote: > On Monday, 13 June 2022 16:56:35 CEST Ben Hutchings wrote: > > We made the decision that the benefits of sandboxing with user > > namespaces are likely to outweigh the risks, on most systems. Nothing > > you've said convinces me to alter

Bug#1012547: linux: disable user namespaces per default

2022-06-13 Thread Diederik de Haas
On Monday, 13 June 2022 16:56:35 CEST Ben Hutchings wrote: > We made the decision that the benefits of sandboxing with user > namespaces are likely to outweigh the risks, on most systems. Nothing > you've said convinces me to alter that assessment. I don't really/fully understand this topic, but

Bug#1012547: linux: disable user namespaces per default

2022-06-13 Thread Ben Hutchings
Control: tag -1 wontfix On Thu, 2022-06-09 at 01:57 +0200, Philippe Cerfon wrote: [...] > It rather seems that this feature is only of special use, namely for > those people who use user namespaces with containers or similar - by > far no default on a average server or desktop. [...] This is wron

Bug#1012547: linux: disable user namespaces per default

2022-06-08 Thread Philippe Cerfon
Source: linux Version: 5.17.11-1 Severity: normal Tags: security Hi. Some time ago, Debian decided to enable user namespaces per default. Since then we've had numerous security holes which would have been prevented when user namespaces were disabled. I vaguely recall at least around 6-7 such ho