1 |
commit: bf29459cb0451db9170934809e8d204c9358d1b6 |
2 |
Author: Laurent Bigonville <bigon <AT> bigon <DOT> be> |
3 |
AuthorDate: Mon Nov 12 15:16:04 2018 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Nov 18 10:56:47 2018 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=bf29459c |
7 |
|
8 |
Allow minissdpd_t to create a unix_stream_socket |
9 |
|
10 |
---- |
11 |
type=PROCTITLE msg=audit(12/11/18 15:37:06.293:231) : proctitle=/usr/sbin/minissdpd -i enp0s25 -i wlp3s0 -6 |
12 |
type=SYSCALL msg=audit(12/11/18 15:37:06.293:231) : arch=x86_64 syscall=listen success=yes exit=0 a0=0x7 a1=0x5 a2=0x6e a3=0x7ffdbca26c50 items=0 ppid=1 pid=1880 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=minissdpd exe=/usr/sbin/minissdpd subj=system_u:system_r:minissdpd_t:s0 key=(null) |
13 |
type=AVC msg=audit(12/11/18 15:37:06.293:231) : avc: denied { listen } for pid=1880 comm=minissdpd path=/run/minissdpd.sock scontext=system_u:system_r:minissdpd_t:s0 tcontext=system_u:system_r:minissdpd_t:s0 tclass=unix_stream_socket permissive=1 |
14 |
---- |
15 |
type=PROCTITLE msg=audit(12/11/18 16:12:29.172:758) : proctitle=/usr/sbin/minissdpd -i enp0s25 -i wlp3s0 -6 |
16 |
type=SYSCALL msg=audit(12/11/18 16:12:29.172:758) : arch=x86_64 syscall=accept success=yes exit=8 a0=0x7 a1=0x0 a2=0x0 a3=0x0 items=0 ppid=1 pid=11460 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=minissdpd exe=/usr/sbin/minissdpd subj=system_u:system_r:minissdpd_t:s0 key=(null) |
17 |
type=AVC msg=audit(12/11/18 16:12:29.172:758) : avc: denied { accept } for pid=11460 comm=minissdpd path=/run/minissdpd.sock scontext=system_u:system_r:minissdpd_t:s0 tcontext=system_u:system_r:minissdpd_t:s0 tclass=unix_stream_socket permissive=1 |
18 |
|
19 |
Signed-off-by: Jason Zaman <jason <AT> perfinion.com> |
20 |
|
21 |
policy/modules/services/minissdpd.te | 3 ++- |
22 |
1 file changed, 2 insertions(+), 1 deletion(-) |
23 |
|
24 |
diff --git a/policy/modules/services/minissdpd.te b/policy/modules/services/minissdpd.te |
25 |
index 86d0d54e..65b1aed3 100644 |
26 |
--- a/policy/modules/services/minissdpd.te |
27 |
+++ b/policy/modules/services/minissdpd.te |
28 |
@@ -27,6 +27,7 @@ allow minissdpd_t self:capability { net_admin sys_module }; |
29 |
allow minissdpd_t self:netlink_route_socket r_netlink_socket_perms; |
30 |
allow minissdpd_t self:udp_socket create_socket_perms; |
31 |
allow minissdpd_t self:unix_dgram_socket create_socket_perms; |
32 |
+allow minissdpd_t self:unix_stream_socket create_stream_socket_perms; |
33 |
|
34 |
allow minissdpd_t minissdpd_var_run_t:file manage_file_perms; |
35 |
allow minissdpd_t minissdpd_var_run_t:sock_file manage_sock_file_perms; |
36 |
@@ -48,4 +49,4 @@ corenet_udp_sendrecv_ssdp_port(minissdpd_t) |
37 |
|
38 |
logging_send_syslog_msg(minissdpd_t) |
39 |
|
40 |
-miscfiles_read_localization(minissdpd_t) |
41 |
\ No newline at end of file |
42 |
+miscfiles_read_localization(minissdpd_t) |