|
|
Subscribe / Log in / New account

Disabling SELinux's runtime disable

Disabling SELinux's runtime disable

Posted Apr 20, 2023 16:08 UTC (Thu) by qperret (subscriber, #117873)
Parent article: Disabling SELinux's runtime disable

Moving the function vectors to __ro_after_init could probably be done without disabling the entire feature by using a temporary writable alias (a fixmap?) when modifying them, similar to how e.g. the kernel patches its text. That way the window during which an attacker can use an OOB write (for example) to modify those structs will remain small, making exploitation much less practical. Not being familiar with all the history behind the change, I assume this type of approach has been discussed? Would anyone with enough background be able to share more details as to why this wasn't pursued?


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds