diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0036-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0036-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0036-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch b/recipes-security/refpolicy/refpolicy/0036-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch new file mode 100644 index 0000000..f9aa158 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0036-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch | |||
@@ -0,0 +1,45 @@ | |||
1 | From d1352b688603b16eb6da7a30198d8b7abfc55d1e Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Wed, 1 Jul 2020 08:44:07 +0800 | ||
4 | Subject: [PATCH] policy/modules/services/rpcbind: allow rpcbind_t to create | ||
5 | directory with label rpcbind_runtime_t | ||
6 | |||
7 | Fixes: | ||
8 | avc: denied { create } for pid=136 comm="rpcbind" name="rpcbind" | ||
9 | scontext=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 | ||
10 | tcontext=system_u:object_r:var_run_t:s0 tclass=dir permissive=0 | ||
11 | |||
12 | Upstream-Status: Inappropriate [embedded specific] | ||
13 | |||
14 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
15 | --- | ||
16 | policy/modules/services/rpcbind.te | 5 +++-- | ||
17 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
18 | |||
19 | diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te | ||
20 | index 168c28ca3..e1eb7d5fc 100644 | ||
21 | --- a/policy/modules/services/rpcbind.te | ||
22 | +++ b/policy/modules/services/rpcbind.te | ||
23 | @@ -25,16 +25,17 @@ files_type(rpcbind_var_lib_t) | ||
24 | # Local policy | ||
25 | # | ||
26 | |||
27 | -allow rpcbind_t self:capability { dac_override setgid setuid sys_tty_config }; | ||
28 | +allow rpcbind_t self:capability { dac_override setgid setuid sys_tty_config chown }; | ||
29 | # net_admin is for SO_SNDBUFFORCE | ||
30 | dontaudit rpcbind_t self:capability net_admin; | ||
31 | allow rpcbind_t self:fifo_file rw_fifo_file_perms; | ||
32 | allow rpcbind_t self:unix_stream_socket { accept listen }; | ||
33 | allow rpcbind_t self:tcp_socket { accept listen }; | ||
34 | |||
35 | +manage_dirs_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t) | ||
36 | manage_files_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t) | ||
37 | manage_sock_files_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t) | ||
38 | -files_runtime_filetrans(rpcbind_t, rpcbind_runtime_t, { file sock_file }) | ||
39 | +files_runtime_filetrans(rpcbind_t, rpcbind_runtime_t, { file sock_file dir }) | ||
40 | |||
41 | manage_dirs_pattern(rpcbind_t, rpcbind_var_lib_t, rpcbind_var_lib_t) | ||
42 | manage_files_pattern(rpcbind_t, rpcbind_var_lib_t, rpcbind_var_lib_t) | ||
43 | -- | ||
44 | 2.17.1 | ||
45 | |||