Do not drop capabilities if running newrole as root
This commit is contained in:
parent
3507aa6632
commit
ebadcd67f7
@ -41,9 +41,26 @@ index e9c80f0..e9d5882 100644
|
|||||||
print "\t\tUnknown - would be allowed by active policy\n",
|
print "\t\tUnknown - would be allowed by active policy\n",
|
||||||
print "\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n"
|
print "\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n"
|
||||||
diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c
|
diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c
|
||||||
index 99d0ed7..3f08d37 100644
|
index 99d0ed7..19e20a8 100644
|
||||||
--- a/policycoreutils/newrole/newrole.c
|
--- a/policycoreutils/newrole/newrole.c
|
||||||
+++ b/policycoreutils/newrole/newrole.c
|
+++ b/policycoreutils/newrole/newrole.c
|
||||||
|
@@ -543,13 +543,13 @@ static int restore_environment(int preserve_environment,
|
||||||
|
#if defined(AUDIT_LOG_PRIV) && !defined(NAMESPACE_PRIV)
|
||||||
|
static int drop_capabilities(int full)
|
||||||
|
{
|
||||||
|
+ uid_t uid = getuid();
|
||||||
|
+ if (!uid) return 0;
|
||||||
|
+
|
||||||
|
capng_clear(CAPNG_SELECT_BOTH);
|
||||||
|
if (capng_lock() < 0)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
- uid_t uid = getuid();
|
||||||
|
- if (!uid) return 0;
|
||||||
|
-
|
||||||
|
/* Change uid */
|
||||||
|
if (setresuid(uid, uid, uid)) {
|
||||||
|
fprintf(stderr, _("Error changing uid, aborting.\n"));
|
||||||
@@ -1030,10 +1030,11 @@ int main(int argc, char *argv[])
|
@@ -1030,10 +1030,11 @@ int main(int argc, char *argv[])
|
||||||
* if it makes sense to continue to run newrole, and setting up
|
* if it makes sense to continue to run newrole, and setting up
|
||||||
* a scrubbed environment.
|
* a scrubbed environment.
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
Summary: SELinux policy core utilities
|
Summary: SELinux policy core utilities
|
||||||
Name: policycoreutils
|
Name: policycoreutils
|
||||||
Version: 2.1.7
|
Version: 2.1.7
|
||||||
Release: 1%{?dist}
|
Release: 2%{?dist}
|
||||||
License: GPLv2
|
License: GPLv2
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
# Based on git repository with tag 20101221
|
# Based on git repository with tag 20101221
|
||||||
@ -352,6 +352,9 @@ fi
|
|||||||
/bin/systemctl try-restart restorecond.service >/dev/null 2>&1 || :
|
/bin/systemctl try-restart restorecond.service >/dev/null 2>&1 || :
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Oct 4 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-2
|
||||||
|
- Do not drop capabilities if running newrole as root
|
||||||
|
|
||||||
* Fri Sep 30 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-1
|
* Fri Sep 30 2011 Dan Walsh <dwalsh@redhat.com> - 2.1.7-1
|
||||||
-Update to upstream
|
-Update to upstream
|
||||||
* semanage: fix indentation error in seobject
|
* semanage: fix indentation error in seobject
|
||||||
|
Loading…
Reference in New Issue
Block a user