| Summary: | [GTK] SeccompFilters: trap more filesystem access system calls | ||||||
|---|---|---|---|---|---|---|---|
| Product: | WebKit | Reporter: | Michael Catanzaro <mcatanzaro> | ||||
| Component: | WebKitGTK | Assignee: | Michael Catanzaro <mcatanzaro> | ||||
| Status: | RESOLVED WONTFIX | ||||||
| Severity: | Enhancement | CC: | cgarcia, mcatanzaro, tmpsantos | ||||
| Priority: | P2 | ||||||
| Version: | 528+ (Nightly build) | ||||||
| Hardware: | PC | ||||||
| OS: | Linux | ||||||
| Bug Depends on: | |||||||
| Bug Blocks: | 140072 | ||||||
| Attachments: |
|
||||||
|
Description
Michael Catanzaro
2015-01-06 11:06:27 PST
The upcoming patch implements a whitelist of syscalls to not block; i.e. it is much more aggressive (and more secure) than the approach I recommend in comment #0. Caveats: * This increases the potential for breakage. If a whitelist of filesystem locations may not work on any distros except those we test it on, a syscall whitelist is extremely unlikely to work. * This probably makes it difficult or impossible to write web extensions. We must add API to allow extensions to whitelist syscalls (bug #140073) or else give up on whitelisting syscalls, because we're obviously not going to give up on web extensions. * The patch includes a list of calls that should be trapped but which are not yet trapped: i.e. whitelisted, but audited by the broker process. That is future work. Created attachment 249289 [details]
[GTK] SeccompFilters: Use a syscall whitelist for the web process
|