#
496b3c3a |
| 17-May-2025 |
Simon J. Gerraty <sjg@FreeBSD.org> |
grantbylabel_syscall check p_textvp != NULL
kernel process will not have valid p_textvp
Reviewed by: stevek Differential Revision: https://reviews.freebsd.org/D50368
|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0 |
|
#
db33c6f3 |
| 04-Jul-2024 |
Olivier Certner <olce@FreeBSD.org> |
MAC: mac_policy.h: Declare common MAC sysctl and jail parameters' nodes
Do this only when the headers for these functionalities were included prior to this one. Indeed, if they need to be included,
MAC: mac_policy.h: Declare common MAC sysctl and jail parameters' nodes
Do this only when the headers for these functionalities were included prior to this one. Indeed, if they need to be included, style(9) mandates they should have been so before this one.
Remove the common MAC sysctl declaration from <security/mac/mac_internal.h>, as it is now redundant (all its includers also include <security/mac/mac_policy.h>).
Remove local such declarations from all policies' files.
Reviewed by: jamie Approved by: markj (mentor) MFC after: 5 days Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D46903
show more ...
|
#
4a5fa108 |
| 19-Sep-2024 |
Simon J. Gerraty <sjg@FreeBSD.org> |
procfs require PRIV_PROC_MEM_WRITE to write mem
Add a priv_check for PRIV_PROC_MEM_WRITE which will be blocked by mac_veriexec if being enforced, unless the process has a maclabel to grant priv.
Re
procfs require PRIV_PROC_MEM_WRITE to write mem
Add a priv_check for PRIV_PROC_MEM_WRITE which will be blocked by mac_veriexec if being enforced, unless the process has a maclabel to grant priv.
Reviewed by: stevek Sponsored by: Juniper Networks, Inc. Differential Revision: https://reviews.freebsd.org/D46692
show more ...
|
Revision tags: release/14.1.0, release/13.3.0, release/14.0.0 |
|
#
1554ba03 |
| 25-Aug-2023 |
Simon J. Gerraty <sjg@FreeBSD.org> |
Add mac_grantbylabel
This module allows controlled privilege escallation via mac labels securely associated with a process via mac_veriexec.
There are over 700 PRIV_* but we can compress many of th
Add mac_grantbylabel
This module allows controlled privilege escallation via mac labels securely associated with a process via mac_veriexec.
There are over 700 PRIV_* but we can compress many of them into a single GBL_* thus constraining the size of gbl labels.
The goal is to allow a daemon to run as an unprivileged process while still being able a set of privileged operations needed.
We add APIs to libveriexec so that userland processes can check labels and an exec_script API that allows a suitably labeled process to run something like a python interpreter directly if necessary; overcomming the 'indirect' flag applied to the interpreter.
Add -l option to sbin/veriexec to report labels.
Reviewed by: stevek Sponsored by: Juniper Networks, Inc. Differential Revision: https://reviews.freebsd.org/D41431
show more ...
|