Displaying 4 results from an estimated 4 matches for "unprivilged".
Did you mean:
unprivileged
2023 Aug 08
0
[Bridge] [PATCH v2 11/14] networking: Update to register_net_sysctl_sz
...tls to unprivileged users */
> > - if (net->user_ns != &init_user_ns)
> > - table[1].procname = NULL;
Here I remove the setting of the procname to NULL for ipv6 sysctl
registers in route.c and I do not replace that assignment anywhere.
This means that we will export sysctls to unprivilged users for ipv6.
I'll correct this in V3.
> > }
> > return table;
> > }
> > +
> > +size_t ipv6_route_sysctl_table_size(struct net *net)
> > +{
> > + /* Don't export sysctls to unprivileged users */
> > + if (net->user_ns != &ini...
2006 May 18
27
[PATCH] /sys/hypervisor/uuid
New /sys/hypervisor/uuid, containing this domain''s UUID.
Stripping off /vm/ from the value of vm to get the UUID isn''t exactly
nice. The alternative is to add a XENVER_get_uuid code to
HYPERVISOR_xen_version(), but I''m not sure that''s worth it.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
diff -r ddba92a5cba9 drivers/xen/core/xen_sysfs.c
---
2014 Sep 16
13
[Bug 2276] New: AuthorizedKeysCommand: add an option for alternate owner
...o control the
ownership check of the AuthorizedKeysCommand. Default is root, so no
change is done without explicit request.
---
Discussed without response at[1], I thought I give it a chance here.
Looking forward to fix of bug#2081, this and some others to make it
possible to run sshd in complete unprivilged mode, while enjoying all
benefits provided by the implmentation.
Thanks!
[1]
http://lists.mindrot.org/pipermail/openssh-unix-dev/2014-June/032696.html
--
You are receiving this mail because:
You are watching the assignee of the bug.
2006 Jul 12
24
Xen Roadmap proposal
...s to be efficiently contexted switched between domains would be
useful (though use in this manner would be mutually exclusive with
system-wide use).
Although efforts are made to ensure the security of the xen hypercall
API, it wouldn''t hurt to do a complete code audit: it is critical that
unprivilged guests should not be able to access data that doesn''t
belong to them, or crash the system. Efforts should be made to bound
the scope of ''denial of quality of service'' attacks too.
A useful tool to help test the integrity of the xen guest API would be
a xen equivalent of...