Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auditbeat alerts seccomp policy violation in default system with no outside access #12578

Closed
Paladin opened this issue Jun 17, 2019 · 3 comments · Fixed by #12617
Closed

Auditbeat alerts seccomp policy violation in default system with no outside access #12578

Paladin opened this issue Jun 17, 2019 · 3 comments · Fixed by #12617

Comments

@Paladin
Copy link

Paladin commented Jun 17, 2019

Please post all questions and issues on https://discuss.elastic.co/c/beats
before opening a Github Issue. Your questions will reach a wider audience there,
and if we confirm that there is a bug, then you can open a new issue.

For security vulnerabilities please only send reports to security@elastic.co.
See https://www.elastic.co/community/security for more information.

Please include configurations and logs if available.

For confirmed bugs, please report:

@ph
Copy link
Contributor

ph commented Jun 18, 2019

cc @andrewkroh since you were involved on the discuss thread and you know our seccomp implementation.

@andrewkroh
Copy link
Member

It's the system/package metricset which utilizes librpm on RedHat systems.

It's making two system calls that are not allowed -- umask and mremap.

andrewkroh added a commit to andrewkroh/beats that referenced this issue Jun 19, 2019
While running on CentOS 7 with the system/package dataset Auditbeat was violating its seccomp policy. This adds the syscalls that it was using to the default seccomp policy for Auditbeat.

Fixes elastic#12578
@andrewkroh
Copy link
Member

PR to edit the policy for Auditbeat only: #12617

andrewkroh added a commit that referenced this issue Jun 20, 2019
While running on CentOS 7 with the system/package dataset Auditbeat was violating its seccomp policy. This adds the syscalls that it was using to the default seccomp policy for Auditbeat.

Fixes #12578
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants