On Tue, Oct 24, 2006 at 10:35:22AM -0700, Christopher Marshall wrote:
> Would running a UML instance from a user account with no priviledges
> on the host be sufficient to prevent a root process controlled by a
> malicious user running within the UML from taking any possible
> advantage of the host? 

At most, the malicious user would be able to get whatever priviliges
the user running the UML has (in your scenario, that would be none).

> I realize that it is probably advisable (due to bugs not currently
> known) to run the UML instance from within a chroot containing only
> the UML kernel and its filesystem image and a few device nodes like
> /dev/net/tun needed to bring up networking, but as far as you know,
> is it *necessary* to do so?

As far as I know, it's not.

                                Jeff

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to