-
Notifications
You must be signed in to change notification settings - Fork 181
Description
As system calls are added to the kernel, I feel there is not enough discussion by default of the wide variety of applications that will suddenly gain access to a new attack surface.
The canonical example here is perf_event_open()
, the source of numerous CVEs. While perf is awesome, my (e.g.) web server should not (by default) be able to use it.
It's possible to use seccomp today to blacklist. whitelists can get very difficult to manage.
One thing that might be useful is a filter for any system calls newer than a particular kernel version, say 3.10. That way, each new system call would have to be verified for use in e.g. containers before it's added. Upgrading the kernel wouldn't suddenly expose containers to new attack surface.
In a discussion with @pcmoore he indicated this could be another annotation in the struct in e.g. arch-x86-syscalls.c
.