[PATCH v2] LSM: add SafeSetID module that gates setid calls

James Morris jmorris at namei.org
Tue Jan 15 04:07:23 UTC 2019


On Fri, 11 Jan 2019, mortonm at chromium.org wrote:

> From: Micah Morton <mortonm at chromium.org>
> 
> SafeSetID gates the setid family of syscalls to restrict UID/GID
> transitions from a given UID/GID to only those approved by a
> system-wide whitelist. These restrictions also prohibit the given
> UIDs/GIDs from obtaining auxiliary privileges associated with
> CAP_SET{U/G}ID, such as allowing a user to set up user namespace UID
> mappings. For now, only gating the set*uid family of syscalls is
> supported, with support for set*gid coming in a future patch set.
> 

I can't recall if this has been mentioned, but is this code already 
shipping in any distros or products, and are any distros planning on 
enabling this feature?



- James
-- 
James Morris
<jmorris at namei.org>



More information about the Linux-security-module-archive mailing list