diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch | 36 |
1 files changed, 0 insertions, 36 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch b/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch deleted file mode 100644 index abf5cd9..0000000 --- a/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From 2a54a7cab41aaddc113ed71d68f82e37661c3487 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Fri, 3 Jul 2020 08:57:51 +0800 | ||
4 | Subject: [PATCH] policy/modules/services/inetd: make inetd_t domain MLS | ||
5 | trusted for reading from files up to its clearance | ||
6 | |||
7 | Allow inetd_t to search /run/systemd/journal | ||
8 | |||
9 | Fixes: | ||
10 | avc: denied { search } for pid=286 comm="xinetd" name="journal" | ||
11 | dev="tmpfs" ino=10990 scontext=system_u:system_r:inetd_t:s0-s15:c0.c1023 | ||
12 | tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir | ||
13 | permissive=0 | ||
14 | |||
15 | Upstream-Status: Inappropriate [embedded specific] | ||
16 | |||
17 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
18 | --- | ||
19 | policy/modules/services/inetd.te | 1 + | ||
20 | 1 file changed, 1 insertion(+) | ||
21 | |||
22 | diff --git a/policy/modules/services/inetd.te b/policy/modules/services/inetd.te | ||
23 | index 1a6ad6e1a..8d1fc0241 100644 | ||
24 | --- a/policy/modules/services/inetd.te | ||
25 | +++ b/policy/modules/services/inetd.te | ||
26 | @@ -161,6 +161,7 @@ mls_socket_read_to_clearance(inetd_t) | ||
27 | mls_socket_write_to_clearance(inetd_t) | ||
28 | mls_net_outbound_all_levels(inetd_t) | ||
29 | mls_process_set_level(inetd_t) | ||
30 | +mls_file_read_to_clearance(inetd_t) | ||
31 | |||
32 | userdom_dontaudit_use_unpriv_user_fds(inetd_t) | ||
33 | userdom_dontaudit_search_user_home_dirs(inetd_t) | ||
34 | -- | ||
35 | 2.17.1 | ||
36 | |||