FoxInABox: Difference between revisions

Jump to navigation Jump to search
1,222 bytes added ,  24 October 2013
Line 33: Line 33:
}
}
</bugzilla>
</bugzilla>
Permission Burndown permission list (see http://hg.mozilla.org/mozilla-central/file/40c7c53fe9b0/security/sandbox/seccomp_filter.h for current list):
{| class="wikitable"
|-
| ioctl() || High || Mainly used for GL/Graphics. To be removed or/and argument-filtered, see {{bug|920372}}
|-
| fstat64(), stat64(), access() || Med || Information leak. Tells the process if a file/path exists, and its attributes (inode, etc. See man fstat64)
|-
| getdents64() || Med || Information leak. Lists directories.
|-
| sigprocmask() || Med || Change signals. We don't want signals to be rerouted in general.
|-
| open() || High || FS access: Open files.
|-
| prctl() || Med || Change process attributes, including security relevant bits. Note: when removed, this means no child process can tighten it's whitelist further either.
|-
| unlink() || High || FS access: Delete files.
|-
| getpriority(), setpriority() || Med || Access priority attributes from target processes.
|-
| sched_setscheduler() || Med || Change scheduling policy/params of target processes.
|}
Note: More syscalls could be removed as some of them, while not a direct security issue, may lead to access to a kernel bug, for example, see do_brk()'s CVE-2003-0961)




Confirmed users
502

edits

Navigation menu