summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch34
1 files changed, 34 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch b/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch
new file mode 100644
index 0000000..52887e5
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch
@@ -0,0 +1,34 @@
1From 4316f85adb1ab6e0278fb8e8ff68b358f36a933e Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 08:19:16 +0800
4Subject: [PATCH] policy/modules/services/avahi: allow avahi_t to watch /etc
5 directory
6
7Fixes:
8type=AVC msg=audit(1592813140.176:24): avc: denied { watch } for
9pid=360 comm="avahi-daemon" path="/services" dev="vda" ino=173
10scontext=system_u:system_r:avahi_t tcontext=system_u:object_r:etc_t
11tclass=dir permissive=1
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/services/avahi.te | 1 +
18 1 file changed, 1 insertion(+)
19
20diff --git a/policy/modules/services/avahi.te b/policy/modules/services/avahi.te
21index f77e5546d..5643349e3 100644
22--- a/policy/modules/services/avahi.te
23+++ b/policy/modules/services/avahi.te
24@@ -76,6 +76,7 @@ domain_use_interactive_fds(avahi_t)
25
26 files_read_etc_runtime_files(avahi_t)
27 files_read_usr_files(avahi_t)
28+files_watch_etc_dirs(avahi_t)
29
30 auth_use_nsswitch(avahi_t)
31
32--
332.17.1
34