Thank you for reporting a bug in Ubuntu. I'm not following your
reasoning. Chroots are not designed to provide a security barrier for
root processes, so, like you say, a root process can break out. However,
typical usage of sbuild is with schroot and packages that are built in
the chroot should not be running as root. Therefore a user in the
schroot should not be able to gain root in the manner described unless
the chroot is misconfigured -- can you provide specifics? All that said,
building untrusted packages means running untrusted code and a chroot
should not necessarily be relied on for security (one can use
snapshotted or throwaway virtual machines for this sort of thing).

** Changed in: sbuild (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1010787

Title:
  Process building package can escape from chroot and gain local root

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sbuild/+bug/1010787/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to