packages (LINUX_2_6_32): kernel/kernel-grsec-caps.patch, kernel/kernel-grse...

hawk hawk at pld-linux.org
Sat Feb 11 16:13:28 CET 2012


Author: hawk                         Date: Sat Feb 11 15:13:28 2012 GMT
Module: packages                      Tag: LINUX_2_6_32
---- Log message:
- updated for 2.6.32.56

---- Files affected:
packages/kernel:
   kernel-grsec-caps.patch (1.2 -> 1.2.2.1) , kernel-grsec-common.patch (1.2 -> 1.2.4.1) , kernel-grsec.config (1.36.2.1 -> 1.36.2.2) , kernel-grsec_fixes.patch (1.7 -> 1.7.2.1) 

---- Diffs:

================================================================
Index: packages/kernel/kernel-grsec-caps.patch
diff -u packages/kernel/kernel-grsec-caps.patch:1.2 packages/kernel/kernel-grsec-caps.patch:1.2.2.1
--- packages/kernel/kernel-grsec-caps.patch:1.2	Tue Mar 31 14:04:37 2009
+++ packages/kernel/kernel-grsec-caps.patch	Sat Feb 11 16:13:23 2012
@@ -1,6 +1,6 @@
---- e/grsecurity/gracl_cap.c~	2008-05-18 23:53:55.000000000 +0200
-+++ e/grsecurity/gracl_cap.c	2008-05-18 23:55:05.591733291 +0200
-@@ -39,7 +39,8 @@ static const char *captab_log[] = {
+--- a/grsecurity/grsec_exec.c.orig	2012-02-11 14:25:53.000000000 +0000
++++ a/grsecurity/grsec_exec.c	2012-02-11 14:32:29.013151816 +0000
+@@ -173,7 +173,8 @@
  	"CAP_AUDIT_CONTROL",
  	"CAP_SETFCAP",
  	"CAP_MAC_OVERRIDE",
@@ -9,4 +9,4 @@
 +	"CAP_CONTEXT"
  };
  
- EXPORT_SYMBOL(gr_task_is_capable);
+ int captab_log_entries = sizeof(captab_log)/sizeof(captab_log[0]);

================================================================
Index: packages/kernel/kernel-grsec-common.patch
diff -u packages/kernel/kernel-grsec-common.patch:1.2 packages/kernel/kernel-grsec-common.patch:1.2.4.1
--- packages/kernel/kernel-grsec-common.patch:1.2	Tue Mar 31 14:04:38 2009
+++ packages/kernel/kernel-grsec-common.patch	Sat Feb 11 16:13:23 2012
@@ -28,9 +28,9 @@
 --- a/kernel/capability.c~	2007-12-11 00:46:02.000000000 +0100
 +++ a/kernel/capability.c	2007-12-11 01:35:00.244481500 +0100
 @@ -322,6 +322,8 @@
+ 		BUG();
+ 	}
  
- int capable_nolog(int cap)
- {
 +	if (vs_check_bit(VXC_CAP_MASK, cap) && !vx_mcaps(1L << cap))
 +		return 0;
  	if (security_capable(cap) == 0 && gr_is_capable_nolog(cap)) {

================================================================
Index: packages/kernel/kernel-grsec.config
diff -u packages/kernel/kernel-grsec.config:1.36.2.1 packages/kernel/kernel-grsec.config:1.36.2.2
--- packages/kernel/kernel-grsec.config:1.36.2.1	Tue May  4 21:50:12 2010
+++ packages/kernel/kernel-grsec.config	Sat Feb 11 16:13:23 2012
@@ -16,6 +16,7 @@
 CONFIG_GRKERNSEC_BRUTE=y
 CONFIG_GRKERNSEC_MODSTOP=y
 # CONFIG_GRKERNSEC_HIDESYM is not set
+# CONFIG_GRKERNSEC_KERN_LOCKOUT is not set
 
 CONFIG_GRKERNSEC_VM86=y
 
@@ -37,6 +38,7 @@
 CONFIG_GRKERNSEC_PROC_ADD=y
 CONFIG_GRKERNSEC_LINK=y
 CONFIG_GRKERNSEC_FIFO=y
+CONFIG_GRKERNSEC_SYSFS_RESTRICT=y
 CONFIG_GRKERNSEC_ROFS=y
 CONFIG_GRKERNSEC_CHROOT=y
 CONFIG_GRKERNSEC_CHROOT_MOUNT=y
@@ -76,6 +78,9 @@
 #
 CONFIG_GRKERNSEC_EXECVE=y
 CONFIG_GRKERNSEC_DMESG=y
+CONFIG_GRKERNSEC_HARDEN_PTRACE=y
+CONFIG_GRKERNSEC_PTRACE_READEXEC=y
+CONFIG_GRKERNSEC_SETXID=y
 CONFIG_GRKERNSEC_TPE=y
 CONFIG_GRKERNSEC_TPE_ALL=y
 # CONFIG_GRKERNSEC_TPE_INVERT is not set
@@ -109,4 +114,4 @@
 CONFIG_IP_NF_MATCH_STEALTH=m
 
 # CONFIG_GRKERNSEC_MODHARDEN is not set
-CONFIG_GRKERNSEC_HARDEN_PTRACE=y
+# CONFIG_PAX_MEMORY_STACKLEAK is not set

================================================================
Index: packages/kernel/kernel-grsec_fixes.patch
diff -u packages/kernel/kernel-grsec_fixes.patch:1.7 packages/kernel/kernel-grsec_fixes.patch:1.7.2.1
--- packages/kernel/kernel-grsec_fixes.patch:1.7	Tue Feb  2 13:58:20 2010
+++ packages/kernel/kernel-grsec_fixes.patch	Sat Feb 11 16:13:23 2012
@@ -73,9 +73,9 @@
 --- a/include/linux/grsecurity.h	2007-12-01 00:54:57.224769000 +0000
 +++ c/include/linux/grsecurity.h	2007-12-01 01:09:34.923621750 +0000
 @@ -76,6 +76,7 @@ void gr_log_semrm(const uid_t uid, const
- void gr_log_shmget(const int err, const int shmflg, const size_t size);
- void gr_log_shmrm(const uid_t uid, const uid_t cuid);
  void gr_log_textrel(struct vm_area_struct *vma);
+ void gr_log_rwxmmap(struct file *file);
+ void gr_log_rwxmprotect(struct file *file);
 +void gr_log_cap_pid(const int cap, pid_t pid);
  
  int gr_handle_follow_link(const struct inode *parent,
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/kernel/kernel-grsec-caps.patch?r1=1.2&r2=1.2.2.1&f=u
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/kernel/kernel-grsec-common.patch?r1=1.2&r2=1.2.4.1&f=u
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/kernel/kernel-grsec.config?r1=1.36.2.1&r2=1.36.2.2&f=u
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/kernel/kernel-grsec_fixes.patch?r1=1.7&r2=1.7.2.1&f=u



More information about the pld-cvs-commit mailing list