public inbox for linux-man@vger.kernel.org
 help / color / mirror / Atom feed
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  2022-12-04 20:14 ` Alejandro Colomar
  0 siblings, 1 reply; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue 1:  The same is also of other → The same is true also for other
Issue 2:  Missing full stop at the end

"In order to determine permissions when an unprivileged process accesses a "
"file, the process credentials (UID, GID) and the file credentials are in "
"effect mapped back to what they would be in the initial user namespace and "
"then compared to determine the permissions that the process has on the "
"file.  The same is also of other objects that employ the credentials plus "
"permissions mask accessibility model, such as System V IPC objects"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2023-03-11 17:13 Helge Kreutzmann
  2023-03-11 23:25 ` Alejandro Colomar
  0 siblings, 1 reply; 20+ messages in thread
From: Helge Kreutzmann @ 2023-03-11 17:13 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    /proc/I<pid>/setgroups → I</proc/>pidI</setgroups

"The /proc/I<pid>/setgroups file"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2023-01-22 19:31 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2023-01-22 19:31 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    /proc/ pid /setgroups → I</proc/>pidI</setgroups

"The /proc/ pid /setgroups file"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2023-01-22 19:31 Helge Kreutzmann
  2023-01-22 21:16 ` Alejandro Colomar
  0 siblings, 1 reply; 20+ messages in thread
From: Helge Kreutzmann @ 2023-01-22 19:31 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue 1:  I</proc/ pid /setgroups> → I</proc/>pidI</setgroups>
Issue 2:  I</proc/ pid /gid_map> → I</proc/>pidI</gid_map>
Issue 3:  I</proc/ pid /gid_map> → I</proc/>pidI</gid_map>

"Writing \"I<deny>\" to the I</proc/ pid /setgroups> file before writing to "
"I</proc/ pid /gid_map> will permanently disable B<setgroups>(2)  in a user "
"namespace and allow writing to I</proc/ pid /gid_map> without having the "
"B<CAP_SETGID> capability in the parent user namespace."

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  2022-12-04 20:20 ` Alejandro Colomar
  0 siblings, 1 reply; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    Text missing? in order to drop → in order to drop privileges?

"/* Linux 3.19 made a change in the handling of setgroups(2) and the\n"
"   \\(aqgid_map\\(aq file to address a security issue. The issue allowed\n"
"   *unprivileged* users to employ user namespaces in order to drop\n"
"   The upshot of the 3.19 changes is that in order to update the\n"
"   \\(aqgid_maps\\(aq file, use of the setgroups() system call in this\n"
"   user namespace must first be disabled by writing \"deny\" to one of\n"
"   the /proc/PID/setgroups files for this namespace.  That is the\n"
"   purpose of the following function. */\n"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    /proc/[pid]/setgroups → I</proc/[PID]/setgroups>

"The /proc/[pid]/setgroups file"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  2022-12-04 20:15 ` Alejandro Colomar
  0 siblings, 1 reply; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    I<usage()>  → I<usage>()

"The program below is designed to allow experimenting with user namespaces, "
"as well as other types of namespaces.  It creates namespaces as specified by "
"command-line options and then executes a command inside those namespaces.  "
"The comments and I<usage()> function inside the program provide a full "
"explanation of the program.  The following shell session demonstrates its "
"use."

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue 1:  I</proc/ pid /setgroups> → I</proc/>pidI</setgroups>
Issue 2:  I</proc/ pid /gid_map> → I</proc/>pidI</gid_map>
Issue 3:  I</proc/ pid /gid_map> → I</proc/>pidI</gid_map>

"Writing \"I<deny>\" to the I</proc/ pid /setgroups> file before writing to "
"I</proc/ pid /gid_map> will permanently disable B<setgroups>(2)  in a user "
"namespace and allow writing to I</proc/ pid /gid_map> without having the "
"B<CAP_SETGID> capability in the parent user namespace."

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-12-04  9:07 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-12-04  9:07 UTC (permalink / raw)
  To: alx.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    /proc/ pid /setgroups → I</proc/>pidI</setgroups

"The /proc/ pid /setgroups file"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-03-13 12:34 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-03-13 12:34 UTC (permalink / raw)
  To: mtk.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    I<usage()>  → I<usage>()

"The program below is designed to allow experimenting with user namespaces, "
"as well as other types of namespaces.  It creates namespaces as specified by "
"command-line options and then executes a command inside those namespaces.  "
"The comments and I<usage()> function inside the program provide a full "
"explanation of the program.  The following shell session demonstrates its "
"use."

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-03-13 12:34 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-03-13 12:34 UTC (permalink / raw)
  To: mtk.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:    Text missing? in order to drop → in order to drop privileges?

"/* Linux 3.19 made a change in the handling of setgroups(2) and the\n"
"   \\(aqgid_map\\(aq file to address a security issue. The issue allowed\n"
"   *unprivileged* users to employ user namespaces in order to drop\n"
"   The upshot of the 3.19 changes is that in order to update the\n"
"   \\(aqgid_maps\\(aq file, use of the setgroups() system call in this\n"
"   user namespace must first be disabled by writing \"deny\" to one of\n"
"   the /proc/PID/setgroups files for this namespace.  That is the\n"
"   purpose of the following function. */\n"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-03-13 12:34 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-03-13 12:34 UTC (permalink / raw)
  To: mtk.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue 1:  The same is also of other → The same is true also for other
Issue 2:  Missing full stop at the end

"In order to determine permissions when an unprivileged process accesses a "
"file, the process credentials (UID, GID) and the file credentials are in "
"effect mapped back to what they would be in the initial user namespace and "
"then compared to determine the permissions that the process has on the "
"file.  The same is also of other objects that employ the credentials plus "
"permissions mask accessibility model, such as System V IPC objects"

^ permalink raw reply	[flat|nested] 20+ messages in thread
* Issue in man page user_namespaces.7
@ 2022-03-13 12:34 Helge Kreutzmann
  0 siblings, 0 replies; 20+ messages in thread
From: Helge Kreutzmann @ 2022-03-13 12:34 UTC (permalink / raw)
  To: mtk.manpages; +Cc: mario.blaettermann, linux-man

Without further ado, the following was found:

Issue:   /proc/[pid]/setgroups → I</proc/[PID]/setgroups>

"The /proc/[pid]/setgroups file"

^ permalink raw reply	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2023-03-12 10:55 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-12-04  9:07 Issue in man page user_namespaces.7 Helge Kreutzmann
2022-12-04 20:14 ` Alejandro Colomar
  -- strict thread matches above, loose matches on Subject: below --
2023-03-11 17:13 Helge Kreutzmann
2023-03-11 23:25 ` Alejandro Colomar
2023-03-12  5:06   ` Helge Kreutzmann
2023-03-12 10:55     ` Alejandro Colomar
2023-01-22 19:31 Helge Kreutzmann
2023-01-22 19:31 Helge Kreutzmann
2023-01-22 21:16 ` Alejandro Colomar
2022-12-04  9:07 Helge Kreutzmann
2022-12-04 20:20 ` Alejandro Colomar
2022-12-04  9:07 Helge Kreutzmann
2022-12-04  9:07 Helge Kreutzmann
2022-12-04 20:15 ` Alejandro Colomar
2022-12-04  9:07 Helge Kreutzmann
2022-12-04  9:07 Helge Kreutzmann
2022-03-13 12:34 Helge Kreutzmann
2022-03-13 12:34 Helge Kreutzmann
2022-03-13 12:34 Helge Kreutzmann
2022-03-13 12:34 Helge Kreutzmann

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox