From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 82DCA1393E9 for ; Tue, 8 Apr 2014 16:02:05 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 2236DE0B61; Tue, 8 Apr 2014 16:02:03 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 462C4E0BBF for ; Tue, 8 Apr 2014 16:02:02 +0000 (UTC) Received: from spoonbill.gentoo.org (spoonbill.gentoo.org [81.93.255.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 63ADE33FFDC for ; Tue, 8 Apr 2014 16:02:01 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by spoonbill.gentoo.org (Postfix) with ESMTP id 31391188CA for ; Tue, 8 Apr 2014 16:02:00 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1396970451.1a9ac1b5f5f82b586e7879f51670b61ee93757bd.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/userdomain.if X-VCS-Directories: policy/modules/system/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 1a9ac1b5f5f82b586e7879f51670b61ee93757bd X-VCS-Branch: master Date: Tue, 8 Apr 2014 16:02:00 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: ba6e54b1-d52a-4ee9-9189-b01b62e7c8f4 X-Archives-Hash: 1e2d3f36a127d536d5dc3376cc8f27cc commit: 1a9ac1b5f5f82b586e7879f51670b61ee93757bd Author: Nicolas Iooss m4x org> AuthorDate: Sun Mar 23 21:20:22 2014 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Tue Apr 8 15:20:51 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=1a9ac1b5 userdomain: no longer allow unprivileged users to read kernel symbols Unprivileged users don't need to read kallsyms and /boot/System.map. This allow rule was introduced in the initial revision of userdomain.if in 2005, with commit b16c6b8c32a631a2e66265f6f60b664222760972: # cjp: why? bootloader_read_kernel_symbol_table($1_t) --- policy/modules/system/userdomain.if | 2 -- 1 file changed, 2 deletions(-) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 9aeac69..822e21f 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1030,8 +1030,6 @@ template(`userdom_unpriv_user_template', ` corenet_tcp_bind_xserver_port($1_t) files_exec_usr_files($1_t) - # cjp: why? - files_read_kernel_symbol_table($1_t) ifndef(`enable_mls',` fs_exec_noxattr($1_t)