diff options
Diffstat (limited to '3.0.3/4430_grsec-kconfig-default-gids.patch')
-rw-r--r-- | 3.0.3/4430_grsec-kconfig-default-gids.patch | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/3.0.3/4430_grsec-kconfig-default-gids.patch b/3.0.3/4430_grsec-kconfig-default-gids.patch index aefb6ec..6a448bf 100644 --- a/3.0.3/4430_grsec-kconfig-default-gids.patch +++ b/3.0.3/4430_grsec-kconfig-default-gids.patch @@ -12,7 +12,7 @@ from shooting themselves in the foot. diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-hardened-r44/grsecurity/Kconfig --- linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig 2011-04-17 18:15:55.000000000 -0400 +++ linux-2.6.32-hardened-r44/grsecurity/Kconfig 2011-04-17 18:37:33.000000000 -0400 -@@ -437,7 +437,7 @@ +@@ -433,7 +433,7 @@ config GRKERNSEC_PROC_GID int "GID for special group" depends on GRKERNSEC_PROC_USERGROUP @@ -21,7 +21,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden config GRKERNSEC_PROC_ADD bool "Additional restrictions" -@@ -661,7 +661,7 @@ +@@ -657,7 +657,7 @@ config GRKERNSEC_AUDIT_GID int "GID for auditing" depends on GRKERNSEC_AUDIT_GROUP @@ -30,7 +30,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden config GRKERNSEC_EXECLOG bool "Exec logging" -@@ -847,7 +847,7 @@ +@@ -835,7 +835,7 @@ config GRKERNSEC_TPE_GID int "GID for untrusted users" depends on GRKERNSEC_TPE && !GRKERNSEC_TPE_INVERT @@ -39,7 +39,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden help Setting this GID determines what group TPE restrictions will be *enabled* for. If the sysctl option is enabled, a sysctl option -@@ -856,7 +856,7 @@ +@@ -844,7 +844,7 @@ config GRKERNSEC_TPE_GID int "GID for trusted users" depends on GRKERNSEC_TPE && GRKERNSEC_TPE_INVERT @@ -48,7 +48,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden help Setting this GID determines what group TPE restrictions will be *disabled* for. If the sysctl option is enabled, a sysctl option -@@ -929,7 +929,7 @@ +@@ -917,7 +917,7 @@ config GRKERNSEC_SOCKET_ALL_GID int "GID to deny all sockets for" depends on GRKERNSEC_SOCKET_ALL @@ -57,7 +57,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden help Here you can choose the GID to disable socket access for. Remember to add the users you want socket access disabled for to the GID -@@ -950,7 +950,7 @@ +@@ -938,7 +938,7 @@ config GRKERNSEC_SOCKET_CLIENT_GID int "GID to deny client sockets for" depends on GRKERNSEC_SOCKET_CLIENT @@ -66,7 +66,7 @@ diff -Naur linux-2.6.32-hardened-r44.orig/grsecurity/Kconfig linux-2.6.32-harden help Here you can choose the GID to disable client socket access for. Remember to add the users you want client socket access disabled for to -@@ -968,7 +968,7 @@ +@@ -956,7 +956,7 @@ config GRKERNSEC_SOCKET_SERVER_GID int "GID to deny server sockets for" depends on GRKERNSEC_SOCKET_SERVER |