[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-discuss] manipulating raw disk image as non-root user

From: Dallas Clement
Subject: Re: [Qemu-discuss] manipulating raw disk image as non-root user
Date: Mon, 4 Aug 2014 13:00:44 -0500

On Mon, Aug 4, 2014 at 10:14 AM, Dale R. Worley <address@hidden> wrote:
Perhaps you could add an entry to /etc/fstab with the 'user' option.
It would allow the mounting of a file with a specific name, looped
back to a specific mount point.  (Assuming you can set up loopback
mounts in /etc/fstab.)  It may be possible to set enough restrictions
in the fstab entry (noexec, nodev, etc.) to prevent this from being a
gigantic security hole.

(The actual safe way would be to write a setuid program that is given
the basic formatting specifications, creates an empty filesystem, and
mounts that.  That way the user can't put anything into the disk image
file beforehand that would compromise security.)


Hi Dale.  Thanks for the tip.  This is certainly worth exploring also.

I heard about this tool on the buildroot mailing list which seems perfect for my task:  http://genext2fs.sourceforge.net/

I just need a similar tool now to work with FAT partitions.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]