Bug 151145
Summary: | segfaults when changing context | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Enrico Scholz <rh-bugzilla> |
Component: | vixie-cron | Assignee: | Marcela Mašláňová <mmaslano> |
Status: | CLOSED NOTABUG | QA Contact: | Brock Organ <borgan> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | rawhide | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-01-08 15:42:00 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 163883 |
Description
Enrico Scholz
2005-03-15 12:49:45 UTC
This is now fixed with vixie-cron-4.1-26_FC4 . A workaround for this bug would be to copy the /etc/security/default_contexts or the /usr/home/$user/.default_contexts into the chroot environment . Please note that any increase in security obtained through use of a chroot environment is more than offset by disabling SELinux, and that by using SELinux properly, a far more secure environment could be achieved than that obtained by use of a chroot . Also note that if you wish to disable certain users from using cron, a much better way of doing so would be to use PAM access.conf or limits.conf . However, crond should not segfault if the context for a user cannot be found. This is now fixed, and will be in Rawhide / FC4t2 shortly. yes, I found this workaround also. My chroot is secure as I am using Linux-Vserver (http://linux-vserver.org) technology for it. PAM access.conf is a little bit problematic as it requires a login-TTY which is not set by the most servers. So using is generally in system-auth is not possible. Adding it manually to pam.d/crond would be possible but may cause problems on program updates. Linux-Vserver is still way less secure than SELinux when properly configured. Also adding the line 'account required /lib/security/$ISA/pam_access.so' to /etc/pam.d/crond will remain across updates because it is installed as a %config file - crond uses the 'crond' PAM_TTY "login-TTY", which has no more significance to PAM than the name - it is not a real "terminal" . > Linux-Vserver is still way less secure than SELinux I am not aware of any attack against Linux-Vserver which would not work against SELinux also. But SELinux has the following, additional problems: * it has a strange kernel-API; relying on the /proc + /selinux filesystem makes it unsuitable for any chroot tasks * the missing chroot functionality does not allow virtualization * it is very difficultly to configure. The default setup does not fit for more advanced tasks so you have to configure it yourself. When doing this, the upgrade path with 'fixfiles -C ...' does not work and you are just busy with rebooting and relabeling the entire filesystem. > when properly configured. yes, this is a problem with SELinux. It is very difficultly to configure while VServer uses the well-known Unix configuration style. So, most SELinux machines will not be "properly configured" and less secure than corresponding vservers. Well, are you content with vixie-cron-4.1-26_FC4? I know there are still some problems with SElinux. If you have some problems with configuration and I have to fix something in cron, let me know. |