[PATCH v2] LSM: add SafeSetID module that gates setid calls
James Morris
jmorris at namei.org
Tue Jan 15 04:07:23 UTC 2019
On Fri, 11 Jan 2019, mortonm at chromium.org wrote:
> From: Micah Morton <mortonm at chromium.org>
>
> SafeSetID gates the setid family of syscalls to restrict UID/GID
> transitions from a given UID/GID to only those approved by a
> system-wide whitelist. These restrictions also prohibit the given
> UIDs/GIDs from obtaining auxiliary privileges associated with
> CAP_SET{U/G}ID, such as allowing a user to set up user namespace UID
> mappings. For now, only gating the set*uid family of syscalls is
> supported, with support for set*gid coming in a future patch set.
>
I can't recall if this has been mentioned, but is this code already
shipping in any distros or products, and are any distros planning on
enabling this feature?
- James
--
James Morris
<jmorris at namei.org>
More information about the Linux-security-module-archive
mailing list