All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH] userdomain: no longer allow unprivileged users to read kernel symbols
@ 2014-03-23 21:20 Nicolas Iooss
  2014-04-04 19:53 ` Christopher J. PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: Nicolas Iooss @ 2014-03-23 21:20 UTC (permalink / raw)
  To: refpolicy

Unprivileged users don't need to read kallsyms and /boot/System.map.

This allow rule was introduced in the initial revision of userdomain.if in
2005, with commit b16c6b8c32a631a2e66265f6f60b664222760972:

    # cjp: why?
    bootloader_read_kernel_symbol_table($1_t)
---
 policy/modules/system/userdomain.if | 2 --
 1 file changed, 2 deletions(-)

diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 73678bc..39e665d 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -1005,8 +1005,6 @@ template(`userdom_unpriv_user_template', `
 	corenet_tcp_bind_xserver_port($1_t)
 
 	files_exec_usr_files($1_t)
-	# cjp: why?
-	files_read_kernel_symbol_table($1_t)
 
 	ifndef(`enable_mls',`
 		fs_exec_noxattr($1_t)
-- 
1.9.0

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [refpolicy] [PATCH] userdomain: no longer allow unprivileged users to read kernel symbols
  2014-03-23 21:20 [refpolicy] [PATCH] userdomain: no longer allow unprivileged users to read kernel symbols Nicolas Iooss
@ 2014-04-04 19:53 ` Christopher J. PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2014-04-04 19:53 UTC (permalink / raw)
  To: refpolicy

On 03/23/2014 05:20 PM, Nicolas Iooss wrote:
> Unprivileged users don't need to read kallsyms and /boot/System.map.
> 
> This allow rule was introduced in the initial revision of userdomain.if in
> 2005, with commit b16c6b8c32a631a2e66265f6f60b664222760972:
> 
>     # cjp: why?
>     bootloader_read_kernel_symbol_table($1_t)
> ---
>  policy/modules/system/userdomain.if | 2 --
>  1 file changed, 2 deletions(-)
> 
> diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
> index 73678bc..39e665d 100644
> --- a/policy/modules/system/userdomain.if
> +++ b/policy/modules/system/userdomain.if
> @@ -1005,8 +1005,6 @@ template(`userdom_unpriv_user_template', `
>  	corenet_tcp_bind_xserver_port($1_t)
>  
>  	files_exec_usr_files($1_t)
> -	# cjp: why?
> -	files_read_kernel_symbol_table($1_t)
>  
>  	ifndef(`enable_mls',`
>  		fs_exec_noxattr($1_t)
 
Merged.

-- 
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2014-04-04 19:53 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-03-23 21:20 [refpolicy] [PATCH] userdomain: no longer allow unprivileged users to read kernel symbols Nicolas Iooss
2014-04-04 19:53 ` Christopher J. PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.