Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
base: 7085da0cef8a
Choose a base ref
...
head repository: NixOS/nixpkgs
compare: 87bc51462099
Choose a head ref
  • 1 commit
  • 1 file changed
  • 1 contributor

Commits on May 7, 2019

  1. hardened-config: enable the SafeSetID LSM

    The purpose of this LSM is to allow processes to drop to a less privileged
    user id without having to grant them full CAP_SETUID (or use file caps).
    
    The LSM allows configuring a whitelist policy of permitted from:to uid
    transitions.  The policy is enforced upon calls to setuid(2) and related
    syscalls.
    
    Policies are configured through securityfs by writing to
    - safesetid/add_whitelist_policy ; and
    - safesetid/flush_whitelist_policies
    
    A process attempting a transition not permitted by current policy is killed
    (to avoid accidentally running with higher privileges than intended).
    
    A uid that has a configured policy is prevented from obtaining auxiliary
    setuid privileges (e.g., setting up user namespaces).
    
    See also: https://www.kernel.org/doc/html/latest/admin-guide/LSM/SafeSetID.html
    joachifm committed May 7, 2019
    Copy the full SHA
    87bc514 View commit details
    Browse the repository at this point in the history