nixpkgs/pkgs/os-specific
Joachim Fasting 87bc514620
hardened-config: enable the SafeSetID LSM
The purpose of this LSM is to allow processes to drop to a less privileged
user id without having to grant them full CAP_SETUID (or use file caps).

The LSM allows configuring a whitelist policy of permitted from:to uid
transitions.  The policy is enforced upon calls to setuid(2) and related
syscalls.

Policies are configured through securityfs by writing to
- safesetid/add_whitelist_policy ; and
- safesetid/flush_whitelist_policies

A process attempting a transition not permitted by current policy is killed
(to avoid accidentally running with higher privileges than intended).

A uid that has a configured policy is prevented from obtaining auxiliary
setuid privileges (e.g., setting up user namespaces).

See also: https://www.kernel.org/doc/html/latest/admin-guide/LSM/SafeSetID.html
2019-05-07 13:39:24 +02:00
..
bsd netbsd.mkDerivation: don't supply -z relro 2019-04-10 17:35:08 -04:00
darwin Merge pull request #53863 from thefloweringash/osxfuse 2019-04-21 07:42:08 +00:00
linux hardened-config: enable the SafeSetID LSM 2019-05-07 13:39:24 +02:00
windows Revert "mingw: use current package set for headers" 2019-01-28 10:42:04 -05:00