Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754515AbYAIJM7 (ORCPT ); Wed, 9 Jan 2008 04:12:59 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752166AbYAIJMn (ORCPT ); Wed, 9 Jan 2008 04:12:43 -0500 Received: from fxip-0047f.externet.hu ([88.209.222.127]:50094 "EHLO pomaz-ex.szeredi.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752154AbYAIJMl (ORCPT ); Wed, 9 Jan 2008 04:12:41 -0500 To: pavel@ucw.cz CC: akpm@linux-foundation.org, hch@infradead.org, serue@us.ibm.com, viro@ftp.linux.org.uk, ebiederm@xmission.com, kzak@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, containers@lists.osdl.org, util-linux-ng@vger.kernel.org In-reply-to: <20080108225820.GA9735@elf.ucw.cz> (message from Pavel Machek on Tue, 8 Jan 2008 23:58:20 +0100) Subject: Re: [patch 7/9] unprivileged mounts: allow unprivileged fuse mounts References: <20080108113502.184459371@szeredi.hu> <20080108113630.861045063@szeredi.hu> <20080108214625.GE5050@ucw.cz> <20080108225820.GA9735@elf.ucw.cz> Message-Id: From: Miklos Szeredi Date: Wed, 09 Jan 2008 10:11:06 +0100 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1490 Lines: 37 > > > 'updatedb no longer works' is not a problem? > > > > I haven't seen any problems with updatedb, and haven't had any bug > > reports about it either. > > Ok, I don't know much about FUSE. In current version, if user creates > infinite maze and mounts it under ~, updatedb just does not enter it? It doesn't. See Documentation/filesystems/fuse.txt > > AFAIR there were two security vulnerabilities in fuse's history, one > > of them an information leak in the kernel module, and the other one an > > mtab corruption issue in the fusermount utility. I don't think this > > is such a bad track record. > > Not bad indeed. But I'd consider 'kill -9 not working' to be DoS > vulnerability... The worst that can happen is that a sysadmin doesn't read the docs (likely) before enabling fuse on a multiuser system, and is surprised by a user doing funny things. And _then_ has to go read the docs, or google for some info. This is basically how things normally work, and I don't consider it a DoS. > and I'm woried about problems fuse + user mounts expose in other > parts of system. I'm worried too, and I'm not saying that enabling unprivileged fuse mounts is completely risk free. Nothing is, and nobody is forced to do it. Miklos -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/