New issue
Advanced search Search tips

Issue 852282 link

Starred by 1 user

Issue metadata

Status: Available
Owner: ----
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Feature

Blocked on:
issue 922485



Sign in to add a comment

Verified boot hardening: Compartmentalize access to the stateful file system

Project Member Reported by mnissler@chromium.org, Jun 13 2018

Issue description

Spin-off from  issue 655606 : Re-exploitation of the system after verified boot typically depends on malicious data being staged in the stateful file system (we've seen symlinks, fifos, malicious data, etc.). We've also seen that exploits typically rely on multiple steps where the first one stages a file that a later stage will consume and similar.

To make it harder to pull off these attacks, it'd be helpful to restrict each init job / system daemon to only be able to access the parts of the stateful file system that it actually needs to access to operate correctly. In particular, we'd ideally not make the stateful mount visible in the root mount namespace and only inject stateful file system subtrees into a job's mount namespace if it explicitly requests that.
 

Comment 1 by mnissler@chromium.org, Jan 16 (6 days ago)

Blockedon: 922485

Sign in to add a comment