Re: security_path hooks for xattr

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/26/2012 04:45 AM, Miklos Szeredi wrote:
> Forwarding from an internal bug report:
> 
>    "AppArmor does not mediate the xattr system calls for confined processes.
> 
>    As a consequence, a confined process can cross the confinement privilege
>    boundary by reading or writing to extended attributes that the confined
>    task should not have access to. The restrictions for security and user
>    attributes read and write still apply according to DAC; however, this
>    does not comply with the claim of AppArmor to mediate fipe
>    operations. The use of extended attributes is very flexible, so that the
>    effect of a missing mediation can lead to false assumptions in
>    subsequent policy decisions (eCryptfs)."
> 
> AFAIU this boils down to missing security hooks in *xattr().
> 
> Would it be possible to add these hooks?
> 
right, this is something we lost when we moved to the security_path hooks and
while we have spent some time looking at the problem, we haven't addressed it
yet.  

New hooks would certainly be the easiest solution. I looked at it back when
I initially did the port, and considered proposing new hooks at the time, but
for various reasons it was decided to separate that from the main apparmor
submission, and I haven't had a chance to revisit this since.

--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux