From cd03b6d85930eaf8f68240cd3e91a6bcf5035c53 Mon Sep 17 00:00:00 2001 From: Holger Dengler Date: Fri, 28 Oct 2016 16:57:24 +0200 Subject: security: Review findings (Holger, John) Signed-off-by: Holger Dengler --- security/advanced/frm_capabilities.tex | 2 +- security/advanced/frm_namespace_container.tex | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) (limited to 'security/advanced') diff --git a/security/advanced/frm_capabilities.tex b/security/advanced/frm_capabilities.tex index 5acd8e9..d4a2890 100644 --- a/security/advanced/frm_capabilities.tex +++ b/security/advanced/frm_capabilities.tex @@ -205,7 +205,7 @@ Scenario for dropping capabilities in suid-root processes \item effective: drop all \item permitted: keep only required \end{itemize} -\item set SEC\_KEEP\_CAPS (prctl(PR\_SET\_KEEPCAPS, 1)) +\item preserve capabilities (prctl(PR\_SET\_KEEPCAPS, 1)) \item set all UIDs to non-zero \item raise capability in effecive set before calling a privileged syscall \item drop capability from effective set after syscall diff --git a/security/advanced/frm_namespace_container.tex b/security/advanced/frm_namespace_container.tex index c63b6b2..5b907e6 100644 --- a/security/advanced/frm_namespace_container.tex +++ b/security/advanced/frm_namespace_container.tex @@ -37,6 +37,8 @@ \begin{itemize} \item Mount: \\ Provide different filesystem +\item PID: \\ + Provide new Process-ID scope \item IPC: \\ Provide isolated inter process communication entities \item Network: \\ -- cgit v1.2.3