|
|
Subscribe / Log in / New account

Re: CVE-2016-8655, systemd, and Fedora

From:  Paul Wouters <paul-AT-nohats.ca>
To:  Development discussions related to Fedora <devel-AT-lists.fedoraproject.org>
Subject:  Re: CVE-2016-8655, systemd, and Fedora
Date:  Mon, 12 Dec 2016 14:41:06 -0500 (EST)
Message-ID:  <alpine.LRH.2.20.1612121439070.19054@bofh.nohats.ca>

On Mon, 12 Dec 2016, Matthew Miller wrote:

> Question 1: How can we take advantage of this feature in specific? We
> could bulk file a bunch of bugs. Or, what about turning on some more
> restrictive defaults (AF_INET AF_INET6 AF_UNIX) on some flag day in
> Rawhide, and having services which have different needs add exceptions
> to their own unit files (either more or less restrictive).

I don't see the use of a flag day. Everyone can (and should) implement
it in their services file and people can file bug reports for those that
do not?

> Question 2: What about *other* systemd security features? The blog post
> mentions restricting namespaces as an upcoming feature, and there are
> other existing ones which we are not using systemically — like
> PrivateTmp, ProtectSystem, etc. How can we take better advantage of
> these?

Same?

Note that I wonder if restricting address families really belongs in
systemd. Why isnt this a libcap-ng capability? That way my software
can support this without depending on systemd.

Paul
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-leave@lists.fedoraproject.org


to post comments


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds