|
|
Subscribe / Log in / New account

Interference from user space

Interference from user space

Posted Mar 3, 2024 21:03 UTC (Sun) by Cyberax (✭ supporter ✭, #52523)
In reply to: Interference from user space by eru
Parent article: A sandbox mode for the kernel

There's also /proc/pid/fd that can expose file descriptors.


to post comments

Interference from user space

Posted Mar 4, 2024 15:07 UTC (Mon) by calumapplepie (guest, #143655) [Link]

Wouldn't having the sandbox task isolated from the kernel necessarily mean that information leaks from it are permissible? I think the fear of allowing ptrace is that it enables attackers to take the now-trusted output of the sandbox task and mess with it, re-opening the attack surface. It doesn't matter if we leak the exact details of what the user-mode task is doing, if those details are only dependent on what the original process was trying to do; an attacker who can ptrace the sandbox can ptrace the original. You can't use the sandbox to, say, break KALSR if it's not mapped to the kernel.**

** This is a blatant lie; we would need to be very careful with what data is passed into the sandbox.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds