LSM: add SafeSetID module that gates setid calls
SafeSetID gates the setid family of syscalls to restrict UID/GID transitions from a given UID/GID to only those approved by a system-wide whitelist. These restrictions also prohibit the given UIDs/GIDs from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as allowing a user to set up user namespace UID mappings. For now, only gating the set*uid family of syscalls is supported, with support for set*gid coming in a future patch set. Signed-off-by:Micah Morton <mortonm@chromium.org> Acked-by:
Kees Cook <keescook@chromium.org> Signed-off-by:
James Morris <james.morris@microsoft.com>
Showing
- Documentation/admin-guide/LSM/SafeSetID.rst 107 additions, 0 deletionsDocumentation/admin-guide/LSM/SafeSetID.rst
- Documentation/admin-guide/LSM/index.rst 1 addition, 0 deletionsDocumentation/admin-guide/LSM/index.rst
- security/Kconfig 2 additions, 1 deletionsecurity/Kconfig
- security/Makefile 2 additions, 0 deletionssecurity/Makefile
- security/safesetid/Kconfig 12 additions, 0 deletionssecurity/safesetid/Kconfig
- security/safesetid/Makefile 7 additions, 0 deletionssecurity/safesetid/Makefile
- security/safesetid/lsm.c 277 additions, 0 deletionssecurity/safesetid/lsm.c
- security/safesetid/lsm.h 33 additions, 0 deletionssecurity/safesetid/lsm.h
- security/safesetid/securityfs.c 193 additions, 0 deletionssecurity/safesetid/securityfs.c
Loading
Please register or sign in to comment