Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While this change fixes the issue with
efibootmgr, it makes/syswritable for all commands executed viaBwrapCmd. This could be a security concern as it weakens the sandbox for commands that don't require write access to/sys, violating the principle of least privilege.A more robust approach would be to make this configurable. For example, you could add a field to
BwrapCmdto control this behavior, and default to read-only. Callers that need a writable/syswould then explicitly opt-in.Here's an example of how you could implement this:
Could you please consider refactoring to this approach for better security?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, could be a followup
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Or I can mount
/sysread-only but add a read-write bind mount for/sys/firmware/efi/efivars. This should be more secure, I think.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah in this specific case I think that's the right thing to do.