Confirmed users
502
edits
Gdestuynder (talk | contribs) (→Status) |
|||
| Line 33: | Line 33: | ||
} | } | ||
</bugzilla> | </bugzilla> | ||
Permission Burndown permission list (see http://hg.mozilla.org/mozilla-central/file/40c7c53fe9b0/security/sandbox/seccomp_filter.h for current list): | |||
{| class="wikitable" | |||
|- | |||
| ioctl() || High || Mainly used for GL/Graphics. To be removed or/and argument-filtered, see {{bug|920372}} | |||
|- | |||
| fstat64(), stat64(), access() || Med || Information leak. Tells the process if a file/path exists, and its attributes (inode, etc. See man fstat64) | |||
|- | |||
| getdents64() || Med || Information leak. Lists directories. | |||
|- | |||
| sigprocmask() || Med || Change signals. We don't want signals to be rerouted in general. | |||
|- | |||
| open() || High || FS access: Open files. | |||
|- | |||
| prctl() || Med || Change process attributes, including security relevant bits. Note: when removed, this means no child process can tighten it's whitelist further either. | |||
|- | |||
| unlink() || High || FS access: Delete files. | |||
|- | |||
| getpriority(), setpriority() || Med || Access priority attributes from target processes. | |||
|- | |||
| sched_setscheduler() || Med || Change scheduling policy/params of target processes. | |||
|} | |||
Note: More syscalls could be removed as some of them, while not a direct security issue, may lead to access to a kernel bug, for example, see do_brk()'s CVE-2003-0961) | |||