[Bug 2142] openssh sandboxing using libseccomp
    bugzilla-daemon at mindrot.org 
    bugzilla-daemon at mindrot.org
       
    Tue Aug  4 15:40:38 AEST 2015
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=2142
--- Comment #8 from Mike Frysinger <vapier at gentoo.org> ---
Comment on attachment 2563
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2563
libseccomp patch v2
>+static int
>+seccomp_add_secondary_archs(scmp_filter_ctx *c)
>+{
>+#if defined(__i386__) || defined(__x86_64__)
>+	int r;
>+	r = seccomp_arch_add(c, SCMP_ARCH_X86);
>+	if (r < 0 && r != -EEXIST)
>+		return r;
>+	r = seccomp_arch_add(c, SCMP_ARCH_X86_64);
>+	if (r < 0 && r != -EEXIST)
>+		return r;
>+	r = seccomp_arch_add(c, SCMP_ARCH_X32);
>+	if (r < 0 && r != -EEXIST)
>+		return r;
>+#endif
>+	return 0;
>+}
i don't think this is correct.  there's no reason to permit alternative
ABIs from the one you're currently executing as.  x86/32bit should only
permit the X86 ABI, x86_64/64bit should only permit the X86_64 ABI, and
x86_64/32bit should only permit the X32 ABI.
-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
    
    
More information about the openssh-bugs
mailing list