From mboxrd@z Thu Jan 1 00:00:00 1970 From: cpebenito@tresys.com (Christopher J. PeBenito) Date: Fri, 4 Apr 2014 15:53:44 -0400 Subject: [refpolicy] [PATCH] userdomain: no longer allow unprivileged users to read kernel symbols In-Reply-To: <1395609622-12488-1-git-send-email-nicolas.iooss@m4x.org> References: <1395609622-12488-1-git-send-email-nicolas.iooss@m4x.org> Message-ID: <533F0DC8.90204@tresys.com> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com On 03/23/2014 05:20 PM, Nicolas Iooss wrote: > Unprivileged users don't need to read kallsyms and /boot/System.map. > > This allow rule was introduced in the initial revision of userdomain.if in > 2005, with commit b16c6b8c32a631a2e66265f6f60b664222760972: > > # cjp: why? > bootloader_read_kernel_symbol_table($1_t) > --- > policy/modules/system/userdomain.if | 2 -- > 1 file changed, 2 deletions(-) > > diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if > index 73678bc..39e665d 100644 > --- a/policy/modules/system/userdomain.if > +++ b/policy/modules/system/userdomain.if > @@ -1005,8 +1005,6 @@ template(`userdom_unpriv_user_template', ` > corenet_tcp_bind_xserver_port($1_t) > > files_exec_usr_files($1_t) > - # cjp: why? > - files_read_kernel_symbol_table($1_t) > > ifndef(`enable_mls',` > fs_exec_noxattr($1_t) Merged. -- Chris PeBenito Tresys Technology, LLC www.tresys.com | oss.tresys.com