selinux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* New Container vulnerability could potentially use an SELinux fix.
@ 2019-06-07 15:42 Daniel Walsh
  2019-06-07 16:44 ` Stephen Smalley
  0 siblings, 1 reply; 10+ messages in thread
From: Daniel Walsh @ 2019-06-07 15:42 UTC (permalink / raw)
  To: Miloslav Trmac, selinux

We have periodic vulnerablities around bad container images having
symbolic link attacks against the host.

One came out last week about doing a `podman cp`

Which would copy content from the host into the container.  The issue
was that if the container was running, it could trick the processes
copying content into it to follow a symbolic link to external of the
container image.

The question came up, is there a way to use SELinux to prevent this. And
sadly the answer right now is no, because we have no way to know what
the label of the process attempting to update the container file system
is running as.  Usually it will be running as unconfined_t.

One idea would be to add a rule to policy that control the following of
symbolic links to only those specified in policy.


Something like

SPECIALRESTRICTED TYPE container_file_t

allow container_file_t container_file_t:symlink follow;

Then if a process attempted to copy content onto a symbolic link from
container_file_t to a non container_file_t type, the kernel would deny
access.

Thoughts?





^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2019-06-10 17:01 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-06-07 15:42 New Container vulnerability could potentially use an SELinux fix Daniel Walsh
2019-06-07 16:44 ` Stephen Smalley
2019-06-07 21:06   ` Daniel Walsh
2019-06-07 21:26     ` Stephen Smalley
2019-06-08 14:08       ` Daniel Walsh
2019-06-10 14:08         ` Stephen Smalley
2019-06-10 14:37           ` Daniel Walsh
2019-06-10 15:00             ` Stephen Smalley
2019-06-10 16:58               ` Daniel Walsh
2019-06-10 17:01               ` Daniel Walsh

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).