Root privilege escalation(?) #23918
Closed
jeroendev-one
started this conversation in
General
Replies: 2 comments
-
That's not root, it's UID 0 in a separate user namespace, but id(1) doesn't know that. See user_namespaces(7). |
Beta Was this translation helpful? Give feedback.
0 replies
-
This is intended behavior and not a root privilege escalation, just the way User Namespaces work. You are root of your usernamespace but really just a process running as your normal UID. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Issue Description
Running Rootless podman on RHEL8:
With these options in the
/etc/containers/storage.conf
I noticed while trying to cleanup container images to save up space, podman allowed me to become root by using
podman unshare
:It's not a fully privileged root, but I found it strange that it does elevate to root.
Steps to reproduce the issue
Steps to reproduce the issue
podman unshare
Describe the results you received
It elevates the privileges to uid 0 (root)
Describe the results you expected
It should stay the same user
podman info output
Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
Yes
Additional environment details
No response
Additional information
No response
Beta Was this translation helpful? Give feedback.
All reactions