forked from pool/libvirt
7fe9d077c7
- Update to libvirt 5.1.0 - Many incremental improvements and bug fixes, see http://libvirt.org/news.html - Dropped patches: 11c8aca9-libxl-set-mem-after-balloon.patch, 70c2933d-apparmor-named-profiles.patch, a3ab6d42-apparmor-conv-libvirtd-named-profile.patch, b6440119-qemu-conf-sev.patch, a404ac34-qemu-cgroup-sev.patch, 6fd4c8f8-qemu-domain-sev.patch, 17f6a257-security-dac-sev.patch, a2d3dea9-qemu-caps-dac-override-sev.patch, 620d9dd5-qemu-no-dac-override-nonroot.patch - jsc#SLE-3887, jsc#SLE-4480, jsc#SLE-4577 OBS-URL: https://build.opensuse.org/request/show/681981 OBS-URL: https://build.opensuse.org/package/show/Virtualization/libvirt?expand=0&rev=734
47 lines
1.4 KiB
Diff
47 lines
1.4 KiB
Diff
Index: libvirt-5.1.0/src/security/apparmor/libvirt-lxc
|
|
===================================================================
|
|
--- libvirt-5.1.0.orig/src/security/apparmor/libvirt-lxc
|
|
+++ libvirt-5.1.0/src/security/apparmor/libvirt-lxc
|
|
@@ -2,39 +2,15 @@
|
|
|
|
#include <abstractions/base>
|
|
|
|
- umount,
|
|
-
|
|
- # ignore DENIED message on / remount
|
|
- deny mount options=(ro, remount) -> /,
|
|
-
|
|
- # allow tmpfs mounts everywhere
|
|
- mount fstype=tmpfs,
|
|
-
|
|
- # allow mqueue mounts everywhere
|
|
- mount fstype=mqueue,
|
|
-
|
|
- # allow fuse mounts everywhere
|
|
- mount fstype=fuse.*,
|
|
-
|
|
- # deny writes in /proc/sys/fs but allow binfmt_misc to be mounted
|
|
- mount fstype=binfmt_misc -> /proc/sys/fs/binfmt_misc/,
|
|
+ # deny writes in /proc/sys/fs
|
|
deny @{PROC}/sys/fs/** wklx,
|
|
|
|
- # allow efivars to be mounted, writing to it will be blocked though
|
|
- mount fstype=efivarfs -> /sys/firmware/efi/efivars/,
|
|
-
|
|
# block some other dangerous paths
|
|
deny @{PROC}/sysrq-trigger rwklx,
|
|
deny @{PROC}/mem rwklx,
|
|
deny @{PROC}/kmem rwklx,
|
|
|
|
- # deny writes in /sys except for /sys/fs/cgroup, also allow
|
|
- # fusectl, securityfs and debugfs to be mounted there (read-only)
|
|
- mount fstype=fusectl -> /sys/fs/fuse/connections/,
|
|
- mount fstype=securityfs -> /sys/kernel/security/,
|
|
- mount fstype=debugfs -> /sys/kernel/debug/,
|
|
- mount fstype=proc -> /proc/,
|
|
- mount fstype=sysfs -> /sys/,
|
|
+ # deny writes in /sys
|
|
deny /sys/firmware/efi/efivars/** rwklx,
|
|
deny /sys/kernel/security/** rwklx,
|
|
|