Merge pull request #44564 from thaJeztah/20.10_backport_seccomp_block_af_vsock

[20.10 backport] seccomp: block socket calls to AF_VSOCK in default profile
This commit is contained in:
Sebastiaan van Stijn 2022-12-05 13:31:18 +01:00 committed by GitHub
commit cfb3ebe96e
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 27 additions and 2 deletions

View file

@ -348,7 +348,6 @@
"signalfd4",
"sigprocmask",
"sigreturn",
"socket",
"socketcall",
"socketpair",
"splice",
@ -417,6 +416,22 @@
},
"excludes": {}
},
{
"names": [
"socket"
],
"action": "SCMP_ACT_ALLOW",
"args": [
{
"index": 0,
"value": 40,
"op": "SCMP_CMP_NE"
}
],
"comment": "",
"includes": {},
"excludes": {}
},
{
"names": [
"personality"

View file

@ -343,7 +343,6 @@ func DefaultProfile() *Seccomp {
"signalfd4",
"sigprocmask",
"sigreturn",
"socket",
"socketcall",
"socketpair",
"splice",
@ -404,6 +403,17 @@ func DefaultProfile() *Seccomp {
MinKernel: &KernelVersion{4, 8},
},
},
{
Names: []string{"socket"},
Action: specs.ActAllow,
Args: []*specs.LinuxSeccompArg{
{
Index: 0,
Value: unix.AF_VSOCK,
Op: specs.OpNotEqual,
},
},
},
{
Names: []string{"personality"},
Action: specs.ActAllow,