summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch36
1 files changed, 0 insertions, 36 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch b/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch
deleted file mode 100644
index abf5cd9..0000000
--- a/recipes-security/refpolicy/refpolicy/0087-policy-modules-services-inetd-make-inetd_t-domain-ML.patch
+++ /dev/null
@@ -1,36 +0,0 @@
1From 2a54a7cab41aaddc113ed71d68f82e37661c3487 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 3 Jul 2020 08:57:51 +0800
4Subject: [PATCH] policy/modules/services/inetd: make inetd_t domain MLS
5 trusted for reading from files up to its clearance
6
7Allow inetd_t to search /run/systemd/journal
8
9Fixes:
10avc: denied { search } for pid=286 comm="xinetd" name="journal"
11dev="tmpfs" ino=10990 scontext=system_u:system_r:inetd_t:s0-s15:c0.c1023
12tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
13permissive=0
14
15Upstream-Status: Inappropriate [embedded specific]
16
17Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
18---
19 policy/modules/services/inetd.te | 1 +
20 1 file changed, 1 insertion(+)
21
22diff --git a/policy/modules/services/inetd.te b/policy/modules/services/inetd.te
23index 1a6ad6e1a..8d1fc0241 100644
24--- a/policy/modules/services/inetd.te
25+++ b/policy/modules/services/inetd.te
26@@ -161,6 +161,7 @@ mls_socket_read_to_clearance(inetd_t)
27 mls_socket_write_to_clearance(inetd_t)
28 mls_net_outbound_all_levels(inetd_t)
29 mls_process_set_level(inetd_t)
30+mls_file_read_to_clearance(inetd_t)
31
32 userdom_dontaudit_use_unpriv_user_fds(inetd_t)
33 userdom_dontaudit_search_user_home_dirs(inetd_t)
34--
352.17.1
36