
oss-sec mailing list archives
Re: Using quilt on untrusted RPM spec files
From: "Stuart D. Gathman" <stuart () gathman org>
Date: Mon, 22 Oct 2018 23:42:21 -0400
On Thu, Oct 18, 2018 at 10:57 AM, Jakub Wilk <jwilk () jwilk net> wrote:
* Randy Barlow <randy () electronsweatshop com>, 2018-09-27, 22:39:In Fedora we have similar challenges. We've got a tool called fedora-review[0] that is maybe kinda similar to quilt.Quilt is a tool to manage patch series, so maybe not that similar. :-)
mock can run quilt also
It uses mock[1] to build the source RPM (and mock does this in a chroot to help with the problems you described)If it's really just chroot, then I'm afraid that's not a sufficient protection. One can easily escape the chroot with ptrace(2).
Doesn't that escape require root? Or at least a ptraceable process (i.e. with the same uid) outside the chroot?
Not that I'd stake anything really important on current container security... (And even VMs are vulnerable to the latest round of hardware bugs.)
Current thread:
- Re: Using quilt on untrusted RPM spec files Jakub Wilk (Oct 18)
- Re: Using quilt on untrusted RPM spec files Stuart D. Gathman (Oct 23)
- <Possible follow-ups>
- Re: Using quilt on untrusted RPM spec files Jakub Wilk (Oct 22)
- Re: Using quilt on untrusted RPM spec files Stuart D. Gathman (Oct 23)