Investigate possibility to restrict sys_ioctl arguments
Categories
(Core :: Security: Process Sandboxing, defect, P3)
Tracking
()
People
(Reporter: tedd, Assigned: jld)
References
(Blocks 1 open bug)
Details
(Whiteboard: sb+)
Attachments
(2 files)
| Reporter | ||
Updated•9 years ago
|
| Assignee | ||
Comment 1•8 years ago
|
||
| Assignee | ||
Comment 2•8 years ago
|
||
Updated•8 years ago
|
| Assignee | ||
Updated•8 years ago
|
| Assignee | ||
Comment 3•8 years ago
|
||
Updated•8 years ago
|
| Assignee | ||
Comment 4•8 years ago
|
||
Updated•8 years ago
|
Updated•8 years ago
|
Comment 5•3 years ago
|
||
I think with the removal of X11 and WebGL from the content process we might be able to significantly cut down the allowed IOCTL syscalls.
Updated•3 years ago
|
Comment 6•2 years ago
|
||
Any future plans or timeline for implementing this work?
| Assignee | ||
Comment 8•7 months ago
|
||
I've been looking into this. Simply turning off the “allow if not type 'T'” rule seems to work, for the content and socket processes, on my system and on Try. But, I'm concerned about regressions from shipping this to the broader userbase, and I'd like to make this a new sandbox level (controlled by the security.sandbox.*.level prefs). Specifically, for content it should probably be level 6, with security.sandbox.content.headless retroactively turned into level 5, because ruling out the use of graphics drivers is a prerequisite for this.
And that's a little awkward, because security.sandbox.content.headless both modifies the sandbox policy and sets content processes' graphics to headless mode, so that may need to be disentangled.
| Assignee | ||
Comment 9•7 months ago
|
||
| Assignee | ||
Comment 10•7 months ago
|
||
Updated•7 months ago
|
Updated•7 months ago
|
Updated•6 months ago
|
Updated•6 months ago
|
Comment 11•6 months ago
|
||
Comment 12•6 months ago
|
||
| bugherder | ||
https://hg.mozilla.org/mozilla-central/rev/816a06dd64b6
https://hg.mozilla.org/mozilla-central/rev/daaebc45cb3c
Updated•6 months ago
|
Comment 13•6 months ago
|
||
🎉 I think we might even want to add a release note for this?
| Assignee | ||
Comment 14•6 months ago
|
||
Release Note Request (optional, but appreciated)
[Why is this notable]: Security improvement on Linux; Chrome-parity issue that's been called out on social media.
[Affects Firefox for Android]: no
[Suggested wording]: A new sandbox level on Linux, adding defense in depth to existing protections against access to device drivers (ioctl restrictions).
[Links (documentation, blog post, etc)]: none
Note: The parenthetical may not be strictly necessary, but I thought there might be value in having the keyword ioctl (the system call in question) in there for searchability.
Updated•6 months ago
|
Description
•