
Currently, this filter only takes into account 'ip netns exec' as input but this command accepts different aliases like 'ip net e' or 'ip netn ex', etcetera. This is a security issue since bypassing this filter basically allows anyone to execute arbitary commands because IpFilter will get hit and there's not going to be any further checks against CommandFilters. Change-Id: I2f6e55de4e60f2d3a6166c2fefbc31e9afc6c26f Closes-Bug: 1765734 Co-Authored-By: Jakub Libosvar <jlibosva@redhat.com> Signed-off-by: Daniel Alvarez <dalvarez@redhat.com>
Team and repository tags
oslo.rootwrap -- Escalated Permission Control
oslo.rootwrap allows fine-grained filtering of shell commands to run as root from OpenStack services.
- License: Apache License, Version 2.0
- Documentation: https://docs.openstack.org/oslo.rootwrap/latest/
- Source: https://git.openstack.org/cgit/openstack/oslo.rootwrap
- Bugs: https://bugs.launchpad.net/oslo.rootwrap
Description
Languages
Python
100%