From nobody Fri Dec 20 00:03:33 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YDngn6HTYz5hwVB for ; Fri, 20 Dec 2024 00:03:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YDngn3YjHz4nj7 for ; Fri, 20 Dec 2024 00:03:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734653013; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kviTPvFbrVTmY5d1zTzFox06iZCY3C3KObJhmyyXxZY=; b=DL+F7ZTRTbMSUUKuDByZSGgRzKjqta5csERSJFbW/eFK4b6/U9MARh8BOEYzriTqxXagqa HXVw+NTAnyslqNCTrWCDqfjYrSZkmzyWwwUnXXjdNAJzx6WLr0fS6bcQiYjVfKKBOpQ0BM eW48UwIMdektgo4eXdktqtiMejMlNpQZhFCmATNyVLsQMTKvEFJYeTxWrAHSYuyfs1bggR bnCT003w/69Ds5mMa5Hu9+e2Zym1LhLlBdFBCdvGAV/p8Cv67O5U+LNkc60t2gCYOTDDA6 gL+ZCs6Vcop0id1ivw+fzpMJcsxuH0xfnOc/EtHsi/ItOPfe/aGVo9xAxi+Yuw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734653013; a=rsa-sha256; cv=none; b=KKZ//pmNkvnnnROX8IgP7fUiLMh+pTYdR51iObM2uYvt2SNUo3/EGTniD49xTLgGKNWiL4 O2DmWlLLJ08u0tkUvSbIOs+JUWfsk+1cktt4SlKTzu4eKr31xIkmBl1c9b3mgGmxJLLvST 9uLb+S/FaKC750X+MkwEyMEqk2uHVNCv3PQaN+AO4pTkQseEellq/ZHuN0zo1rPMMkmIbi bBH7tJnVcbny6HlVt1cErP3Cr/HVchA1liwl0BA/9Vi3rNSBZBHFc97CAt5Ol7LkLDYufQ sEvE50PF8+qM6Xor3LB485rRHFNINOezuDmnlwVJ06pb1Ck9zESjniduZN+Z5A== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YDngn3B4BzG56 for ; Fri, 20 Dec 2024 00:03:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BK03XbT018239 for ; Fri, 20 Dec 2024 00:03:33 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BK03XP9018238 for bugs@FreeBSD.org; Fri, 20 Dec 2024 00:03:33 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 283425] [nullfs] nosuid bypass Date: Fri, 20 Dec 2024 00:03:33 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: Unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: bugs-freebsd-org916@ketas.si.pri.ee X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D283425 --- Comment #6 from Sulev-Madis Silber --- (In reply to Konstantin Belousov from comment #5) yes. it would confuse hell out of tools and users if some options appear to= be configured and they are not. esp one that actually (try) to impose restrict= ions and are supposed to increase security, even if only a little bit i honestly believed that lower fs limits are respected. unsure, from manpag= e, such things aren't very clear too but what if it instead of lying of flags, it would actually use them? if you mount null from ro fs, it won't become rw suddenly (i actually tried it). perhaps this could be configured from somewhere i mean, nullfs is popular in jails and unsure which is better way for it to operate but it should behave consistently i wonder how many systems suddenly start reporting suid binaries from either periodic or from some other ids tools since mount output just lied. might actually have something there too. or just the fact that you think you have those options configured. exec and suid was not only allowed but nothing checked fses too since it's cheap and easy to check if fs even supports it i realize that this is maybe not that good practice but confusion is also b= ad and everyone is human. luckily i outright tested what i configured. i expec= ted it to be nosuid, tried anyway, looked at mount, didn't get why it's still on --=20 You are receiving this mail because: You are the assignee for the bug.=