Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: Still getting random execute permissions on shared libraries.
From: Stephen Smalley <sds_at_epoch.ncsc.mil>
Date: Wed, 24 Nov 2004 08:30:08 -0500
They aren't random. As discussed previously here and on fedora-selinux-list, execution of a legacy binary causes the read_implies_exec behavior to be enabled for the process, so that subsequent read requests are transparently mapped to read|execute. This was a change in the upstream kernel, not SELinux, and was to allow introduction of NX support without breaking compatibility with legacy binaries. SELinux is merely checking permissions based on the information supplied by the core kernel.
Your options are:
-- Stephen Smalley <sds@epoch.ncsc.mil> National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Wed 24 Nov 2004 - 08:34:36 EST |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |