Re: security_path hooks for xattr

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 1/26/2012 4:45 AM, Miklos Szeredi wrote:
Forwarding from an internal bug report:

    "AppArmor does not mediate the xattr system calls for confined processes.

    As a consequence, a confined process can cross the confinement privilege
    boundary by reading or writing to extended attributes that the confined
    task should not have access to. The restrictions for security and user
    attributes read and write still apply according to DAC; however, this
    does not comply with the claim of AppArmor to mediate fipe
    operations. The use of extended attributes is very flexible, so that the
    effect of a missing mediation can lead to false assumptions in
    subsequent policy decisions (eCryptfs)."

AFAIU this boils down to missing security hooks in *xattr().

Would it be possible to add these hooks?

Please post proposed patches to linux-security-module@xxxxxxxxxxxxxxx



Thanks,
Miklos
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux