Gentoo Archives: gentoo-commits

From: Sven Vermeulen <swift@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/
Date: Tue, 30 Dec 2014 20:44:03
Message-Id: 1419972200.90bfde5dce608aa910e0e0e7db0af6c5dda0cb21.swift@gentoo
1 commit: 90bfde5dce608aa910e0e0e7db0af6c5dda0cb21
2 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
3 AuthorDate: Tue Dec 30 20:43:20 2014 +0000
4 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
5 CommitDate: Tue Dec 30 20:43:20 2014 +0000
6 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=90bfde5d
7
8 Grant all PAM using applications read access to SELinux state
9
10 ---
11 policy/modules/system/authlogin.if | 7 +++++++
12 1 file changed, 7 insertions(+)
13
14 diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
15 index f05d7bf..6aac59c 100644
16 --- a/policy/modules/system/authlogin.if
17 +++ b/policy/modules/system/authlogin.if
18 @@ -80,6 +80,13 @@ interface(`auth_use_pam',`
19 optional_policy(`
20 nis_authenticate($1)
21 ')
22 +
23 + ifdef(`distro_gentoo',`
24 + # pam_unix.so only calls unix_chkpwd if geteuid <> 0 or if SELinux is enabled.
25 + # So we need to grant it the proper privileges to check if SELinux is enabled
26 + selinux_getattr_fs($1)
27 + selinux_get_enforce_mode($1)
28 + ')
29 ')
30
31 ########################################