fix: add system UID range validation to prevent privilege escalation#267
fix: add system UID range validation to prevent privilege escalation#267
Conversation
Co-authored-by: Mossaka <5447827+Mossaka@users.noreply.github.com>
✅ Coverage Check PassedOverall Coverage
📁 Per-file Coverage Changes (1 files)
Coverage comparison generated by |
|
🎬 THE END — Smoke Claude MISSION: ACCOMPLISHED! The hero saves the day! ✨ |
|
🌑 The shadows whisper... Smoke Codex failed. The oracle requires further meditation... |
|
📰 VERDICT: Smoke Copilot has concluded. All systems operational. This is a developing story. 🎤 |
Smoke Test ResultsLast 2 merged PRs:
Test Results:
Status: PASS
|
Smoke Test ResultsLast 2 Merged PRs:
Test Results:
Overall Status: PASS 🎉 cc: @Mossaka
|
|
📰 VERDICT: Smoke Copilot has concluded. All systems operational. This is a developing story. 🎤 |
|
🌑 The shadows whisper... Smoke Codex failed. The oracle requires further meditation... |
|
🎬 THE END — Smoke Claude MISSION: ACCOMPLISHED! The hero saves the day! ✨ |
Smoke Test ResultsLast 2 Merged PRs:
Test Results:
Status: PASS
|
Smoke Test ResultsLast 2 Merged PRs:
Test Results:
Status: FAIL (Playwright test failed) cc: @Mossaka
|
UID/GID validation in
getSafeHostUid()andgetSafeHostGid()didn't reject system UIDs (0-999), potentially allowing container user mappings with unintended privileges.Changes
MIN_REGULAR_UIDconstant (1000) as the threshold for regular usersvalidateIdNotInSystemRange()that falls back to 1000 for any system UID/GIDgetSafeHostUid()andgetSafeHostGid()to validate all sources (process.getuid/getgid()andSUDO_UID/SUDO_GID)Example
Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.