Comment 2 for bug 1534961

Revision history for this message
Seth Forshee (sforshee) wrote : Re: insecure overlayfs xattrs handling in copy_up

I did reproduce on trusty.

I tried again on wily/xenial. If I run the steps to completion I do end up with a suid/sgid escalate executable owned by ubuntu:mail, but './Test/mail/escalate /bin/sh' still only gives me a process running as ubuntu:ubuntu.