![]() |
|
Message-ID: <aKQrHYrHZ_VT61Um@remnant.pseudorandom.co.uk> Date: Tue, 19 Aug 2025 08:43:25 +0100 From: Simon McVittie <smcv@...ian.org> To: oss-security@...ts.openwall.com Cc: "David A. Wheeler" <dwheeler@...eeler.com>, Vincent Lefevre <vincent@...c17.net> Subject: Re: blocking weird file names (was: xterm terminal crash due to malicious character sequences in file name) On Mon, 18 Aug 2025 at 21:24:07 -0500, Jacob Bachmeyer wrote: >Does this need to be an entirely new module or could it be an extension to >SELinux? If it isn't a core kernel enhancement like /proc/sys/fs/protected_symlinks, then it would be better to have this as a new LSM, or perhaps extend an existing "small" LSM like Yama. Only one "big" LSM (with labelling) can be active at a time, so loading AppArmor excludes SELinux and vice versa, meaning that each distro has to choose whether they will have SELinux, AppArmor, Smack or none of those by default. Lifting that restriction has been in progress for a while, but it's difficult to achieve and the relevant APIs assume there is only one "big" LSM. But any number of "small" LSMs like Yama and Landlock can coexist with up to one "big" LSM. Even if the SELinux team saw it as in-scope (which I suspect they might not), adding this functionality to SELinux would not protect AppArmor users and vice versa, whereas having it in a "small" LSM would benefit everyone. smcv
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.