Not logged in
Log in now
Create an account
Subscribe to LWN
LWN.net Weekly Edition for May 23, 2013
An "enum" for Python 3
An unexpected perf feature
LWN.net Weekly Edition for May 16, 2013
A look at the PyPy 2.0 release
Yes, you lose the ability for the unprivileged user to install random syscall filters, but does it matter?
Cook: seccomp filter now in Ubuntu
Posted Mar 27, 2012 14:51 UTC (Tue) by renox (subscriber, #23785)
Yes, it matter if installing an application implies installing a kernel module.
Posted Mar 28, 2012 17:51 UTC (Wed) by nix (subscriber, #2304)
Posted Mar 28, 2012 19:14 UTC (Wed) by dpquigl (subscriber, #52852)
Posted Mar 28, 2012 19:58 UTC (Wed) by Cyberax (✭ supporter ✭, #52523)
The _parent_ process can start children with arbitrary filters. Children can't override filters (in fact, they are _forced_ to have NNP flag set).
Posted Mar 28, 2012 21:34 UTC (Wed) by dpquigl (subscriber, #52852)
Posted Mar 28, 2012 23:51 UTC (Wed) by khc (subscriber, #45209)
The assumption is the child process is the one that's loading untrusted data, and so is more likely to be exploitable.
Posted Mar 29, 2012 0:12 UTC (Thu) by Cyberax (✭ supporter ✭, #52523)
NNP flag is a prerequisite for BPF filtering to avoid repeating the infamous Sendmail bug.
Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds