Re: [PATCH 2/2] sandbox: create a new session for sandboxed processes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 09/23/2016 01:24 PM, Petr Lautrbach wrote:
> It helps to prevent sandboxed processes to inject arbitrary commands
> into the parent.
> 
> Signed-off-by: Petr Lautrbach <plautrba@xxxxxxxxxx>

Thanks, both patches applied.

> ---
>  policycoreutils/sandbox/sandbox | 13 +++++++++----
>  1 file changed, 9 insertions(+), 4 deletions(-)
> 
> diff --git a/policycoreutils/sandbox/sandbox b/policycoreutils/sandbox/sandbox
> index 9cc13c2..07c340c 100644
> --- a/policycoreutils/sandbox/sandbox
> +++ b/policycoreutils/sandbox/sandbox
> @@ -471,10 +471,15 @@ sandbox [-h] [-l level ] [-[X|M] [-H homedir] [-T tempdir]] [-I includefile ] [-
>                      cmds += ["--"] + self.__paths
>                  return subprocess.Popen(cmds).wait()
>  
> -            selinux.setexeccon(self.__execcon)
> -            rc = subprocess.Popen(self.__cmds).wait()
> -            selinux.setexeccon(None)
> -            return rc
> +            pid = os.fork()
> +            if pid == 0:
> +                rc = os.setsid()
> +                if rc:
> +                    return rc
> +                selinux.setexeccon(self.__execcon)
> +                os.execv(self.__cmds[0], self.__cmds)
> +            rc = os.waitpid(pid, 0)
> +            return os.WEXITSTATUS(rc[1])
>  
>          finally:
>              for i in self.__paths:
> 

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux