diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch new file mode 100644 index 0000000..64a1dfc --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch | |||
@@ -0,0 +1,39 @@ | |||
1 | From 2b64eabf0cf8982bbb3c537e84fc3a99085858d3 Mon Sep 17 00:00:00 2001 | ||
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | ||
3 | Date: Thu, 25 Feb 2016 04:25:08 -0500 | ||
4 | Subject: [PATCH] policy/modules/system/logging: allow auditd_t to write socket | ||
5 | at any level | ||
6 | |||
7 | Allow auditd_t to write init_t:unix_stream_socket at any level. | ||
8 | |||
9 | Fixes: | ||
10 | avc: denied { write } for pid=748 comm="auditd" \ | ||
11 | path="socket:[17371]" dev="sockfs" ino=17371 \ | ||
12 | scontext=system_u:system_r:auditd_t:s15:c0.c1023 \ | ||
13 | tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \ | ||
14 | tclass=unix_stream_socket permissive=1 | ||
15 | |||
16 | Upstream-Status: Inappropriate [embedded specific] | ||
17 | |||
18 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | ||
19 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
20 | --- | ||
21 | policy/modules/system/logging.te | 2 ++ | ||
22 | 1 file changed, 2 insertions(+) | ||
23 | |||
24 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
25 | index caf319f04..25e1d1397 100644 | ||
26 | --- a/policy/modules/system/logging.te | ||
27 | +++ b/policy/modules/system/logging.te | ||
28 | @@ -235,6 +235,8 @@ miscfiles_read_localization(auditd_t) | ||
29 | |||
30 | mls_file_read_all_levels(auditd_t) | ||
31 | mls_file_write_all_levels(auditd_t) # Need to be able to write to /var/run/ directory | ||
32 | +mls_fd_use_all_levels(auditd_t) | ||
33 | +mls_socket_write_all_levels(auditd_t) | ||
34 | |||
35 | seutil_dontaudit_read_config(auditd_t) | ||
36 | |||
37 | -- | ||
38 | 2.25.1 | ||
39 | |||