1
0
Files
linux/kernel
Serge E. Hallyn ce6ada35bd security: Define CAP_SYSLOG
Privileged syslog operations currently require CAP_SYS_ADMIN.  Split
this off into a new CAP_SYSLOG privilege which we can sanely take away
from a container through the capability bounding set.

With this patch, an lxc container can be prevented from messing with
the host's syslog (i.e. dmesg -c).

Changelog: mar 12 2010: add selinux capability2:cap_syslog perm
Changelog: nov 22 2010:
	. port to new kernel
	. add a WARN_ONCE if userspace isn't using CAP_SYSLOG

Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Andrew G. Morgan <morgan@kernel.org>
Acked-By: Kees Cook <kees.cook@canonical.com>
Cc: James Morris <jmorris@namei.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>
Cc: "Christopher J. PeBenito" <cpebenito@tresys.com>
Cc: Eric Paris <eparis@parisplace.org>
Signed-off-by: James Morris <jmorris@namei.org>
2010-11-29 08:35:12 +11:00
..
2010-09-09 20:48:37 +02:00
2010-08-09 16:48:42 -04:00
2010-07-14 11:29:46 +02:00
2010-10-30 01:42:19 -04:00
2010-10-30 01:42:19 -04:00
2010-10-30 08:45:43 -04:00
2010-10-29 04:17:06 -04:00
2010-10-29 04:17:06 -04:00
2010-11-18 13:18:47 +01:00
2010-10-01 10:50:58 -07:00
2010-06-29 10:07:09 +02:00
2010-10-18 18:44:26 +02:00
2010-08-11 23:04:20 +09:30
2010-11-18 13:18:46 +01:00
2010-08-19 17:18:02 -07:00
2010-11-29 08:35:12 +11:00
2010-08-20 08:55:00 -07:00
2010-11-18 13:12:33 +01:00
2010-10-27 17:28:36 +01:00
2010-10-27 18:03:17 -07:00
2010-07-27 12:40:54 +02:00
2010-10-26 16:52:14 -07:00