Uploaded image for project: 'MicroShift'
  1. MicroShift
  2. USHIFT-1755

Add test which verifies that it's not possible to utilize the privilieges of another domain in order to do more than what's possible inside a restricted domain

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Normal Normal
    • openshift-4.14.z
    • None
    • None
    • 3
    • False
    • Hide

      None

      Show
      None
    • False
    • uShift Sprint 241, uShift Sprint 242, uShift Sprint 243, uShift Sprint 244, uShift Sprint 245, uShift Sprint 246

      As follow-on work to USHIFT-1568, we should add a test which verifies that it's not possible to utilize the privileges of another domain in order to do more than what's possible inside a restricted domain.

      An example of this would be running the `foo` binary, which might have policy which might instruct SELinux to automatically transition to the `bar` domain when foo is executed from a process running in the `foobar` domain. We should be able to find policy which might facilitate this via `sesearch`.

              ehila@redhat.com Egli Hila
              jerpeter@redhat.com Jeremy Peterson
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: