Dave Sugar
56db40c099
Updates for utempter
...
Fix label (for RedHat) which places utempter in /usr/libexec/utempter/utempter
Allow utempter to write to xsession log
Sep 07 01:30:50 localhost.localdomain audisp-syslog[1649]: node=localhost type=AVC msg=audit(1694050250.483:3994): avc: denied { write } for pid=1927 comm="utempter" path="/home/toor/.xsession-errors" dev="dm-9" ino=129543 scontext=toor_u:staff_r:utempter_t:s0 tcontext=toor_u:object_r:xsession_log_t:s0 tclass=file permissive=1
Sep 07 01:30:50 localhost.localdomain audisp-syslog[1649]: node=localhost type=AVC msg=audit(1694050250.485:3997): avc: denied { getattr } for pid=1927 comm="utempter" path="/home/toor/.xsession-errors" dev="dm-9" ino=129543 scontext=toor_u:staff_r:utempter_t:s0 tcontext=toor_u:object_r:xsession_log_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-09-06 21:52:05 -04:00
Chris PeBenito
9d03d2ef9e
Merge pull request #656 from gtrentalancia/kernel_fixes_pr
...
Update the kernel module to remove misplaced or obsolete permissions
2023-09-06 13:29:48 -04:00
Chris PeBenito
663284394c
Merge pull request #654 from gtrentalancia/smartmon_fixes_pr
...
Smartmon policy update
2023-09-06 13:28:08 -04:00
Chris PeBenito
246c1aab40
Merge pull request #653 from etbe/master
...
Add iio-sensor-proxy.
2023-09-06 13:27:41 -04:00
Guido Trentalancia
7e5292de29
Update the kernel module to remove misplaced or at least really
...
obsolete permissions during kernel module loading.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/kernel/kernel.te | 12 ------------
1 file changed, 12 deletions(-)
2023-09-06 17:50:52 +02:00
Guido Trentalancia
86f9bfe0ee
Revert the following commit (ability to read /usr files),
...
as it is no longer needed, after the database file got its
own label:
Date: Wed Feb 16 07:24:34 2011 +0100
patch to allow smartmon to read usr files
37ba0d0437
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/services/smartmon.te | 1 -
1 file changed, 1 deletion(-)
2023-09-06 17:12:48 +02:00
Russell Coker
4bd63b2b11
Comment sysfs better
...
Signed-off-by: Russell Coker <russell@coker.com.au>
2023-09-07 00:52:24 +10:00
Chris PeBenito
02da19b0e9
Merge pull request #641 from gtrentalancia/mix_fixes_pr
...
Minor miscellaneous fixes for various policy modules
2023-09-06 08:46:40 -04:00
Chris PeBenito
c57e1f1a6d
Merge pull request #650 from gtrentalancia/xscreensaver_fixes_pr
...
Update the xscreensaver module in order to work with the latest version
2023-09-06 08:31:40 -04:00
Chris PeBenito
92840e9284
Merge pull request #646 from dsugar100/iceauth_xsession_log
...
Allow iceauth write to xsession log
2023-09-06 08:29:33 -04:00
Russell Coker
bc25ff1354
Fixed dependency on unconfined_t
...
Signed-off-by: Russell Coker <russell@coker.com.au>
2023-09-06 21:12:23 +10:00
Russell Coker
2cf4a28321
iio-sensor-proxy (Debian package iio-sensor-proxy)
...
IIO sensors to D-Bus proxy
Industrial I/O subsystem is intended to provide support for devices
that in some sense are analog to digital or digital to analog convertors
.
Devices that fall into this category are:
* ADCs
* Accelerometers
* Gyros
* IMUs
* Capacitance to Digital Converters (CDCs)
* Pressure Sensors
* Color, Light and Proximity Sensors
* Temperature Sensors
* Magnetometers
* DACs
* DDS (Direct Digital Synthesis)
* PLLs (Phase Locked Loops)
* Variable/Programmable Gain Amplifiers (VGA, PGA)
Signed-off-by: Russell Coker <russell@coker.com.au>
2023-09-06 20:31:37 +10:00
Dave Sugar
be5a1e168e
Allow iceauth write to xsession log
...
node=localhost type=AVC msg=audit(1689822970.302:4180): avc: denied { write } for pid=2610 comm="iceauth" path="/home/toor/.xsession-errors" dev="dm-9" ino=129541 scontext=toor_u:staff_r:iceauth_t:s0 tcontext=system_u:object_r:xsession_log_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-09-05 16:58:19 -04:00
Guido Trentalancia
8ca93044b1
Update the xscreensaver module in order to work with
...
the latest version (tested with version 6.06).
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/apps/wm.if | 4 +++
policy/modules/apps/xscreensaver.fc | 1
policy/modules/apps/xscreensaver.if | 46 ++++++++++++++++++++++++++++++++++++
policy/modules/apps/xscreensaver.te | 16 ++++++++++--
4 files changed, 65 insertions(+), 2 deletions(-)
2023-09-05 21:56:04 +02:00
Guido Trentalancia
6e965d40c2
Add permissions to watch libraries directories to the
...
userdomain login user template interface.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/system/userdomain.if | 1 +
1 file changed, 1 insertion(+)
2023-09-05 21:27:05 +02:00
Guido Trentalancia
db408f7f17
Add the permissions to manage the fonts cache (fontconfig)
...
to the window manager role template.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/wm.if | 2 ++
1 file changed, 2 insertions(+)
2023-09-05 21:27:05 +02:00
Guido Trentalancia
dbbfa9877e
Add missing permissions to execute binary files for
...
the evolution_alarm_t domain.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/evolution.te | 2 ++
1 file changed, 2 insertions(+)
2023-09-05 21:27:05 +02:00
Chris PeBenito
49420a8638
Merge pull request #643 from etbe/master
...
policy for eg25-manager to manage Quectel EG25 modem
2023-09-05 11:39:25 -04:00
Chris PeBenito
d2ee8ac352
Merge pull request #635 from gtrentalancia/main
...
The kernel domain should be able to mounton default and runtime directories
2023-09-05 11:06:35 -04:00
Chris PeBenito
20c53171b7
Merge pull request #645 from dsugar100/write_net_sysctl
...
To allow setting for net.netfilter.nf_* in /etc/sysctl.d/*.conf
2023-09-05 11:00:02 -04:00
Chris PeBenito
66a480087a
Update eg25manager.te
...
Minor style fix.
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
2023-09-05 10:56:17 -04:00
Chris PeBenito
9fae196c53
Merge pull request #637 from gtrentalancia/pulseaudio_fixes_pr
...
Pulseaudio fixes
2023-09-05 10:48:48 -04:00
Chris PeBenito
ec6a4ddd47
Merge pull request #640 from gtrentalancia/dbus_fixes_pr
...
Dbus module: fix automatic named socket file transitions and write permissions for bus clients
2023-09-05 10:46:05 -04:00
Dave Sugar
970ef05e19
To allow setting for net.netfilter.nf_* in /etc/sysctl.d/*.conf
...
node=localhost type=AVC msg=audit(1691097149.019:422): avc: denied { search } for pid=2332 comm="sysctl" name="net" dev="proc" ino=11426 scontext=system_u:system_r:kmod_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1691097149.019:422): avc: denied { getattr } for pid=2332 comm="sysctl" path="/proc/sys/net/netfilter/nf_conntrack_max" dev="proc" ino=23194 scontext=system_u:system_r:kmod_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1691097149.020:423): avc: denied { write } for pid=2332 comm="sysctl" name="nf_conntrack_max" dev="proc" ino=23194 scontext=system_u:system_r:kmod_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1691097149.020:423): avc: denied { open } for pid=2332 comm="sysctl" path="/proc/sys/net/netfilter/nf_conntrack_max" dev="proc" ino=23194 scontext=system_u:system_r:kmod_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-09-01 20:22:55 -04:00
Russell Coker
810f333ac5
eg25-manager (Debian package eg25-manager) is a daemon aimed at configuring
...
and monitoring the Quectel EG25 modem on a running system. It is used on the
PinePhone (Pro) and performs the following functions:
* power on/off
* startup configuration using AT commands
* AGPS data upload
* status monitoring (and restart if it becomes unavailable)
Homepage: https://gitlab.com/mobian1/eg25-manager
Signed-off-by: Russell Coker <russell@coker.com.au>
2023-09-01 20:15:13 +10:00
Guido Trentalancia
519fe6f81a
Let pulseaudio search debugfs directories, as currently
...
done with other modules.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/pulseaudio.te | 1 +
1 file changed, 1 insertion(+)
2023-08-31 16:35:01 +02:00
Guido Trentalancia
5b89b4120e
Update the dbus role template so that permissions to get
...
the attributes of the proc filesystem are included.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/dbus.if | 2 ++
1 file changed, 2 insertions(+)
2023-08-30 16:30:54 +02:00
Guido Trentalancia
5ff0aa1b61
Fix the dbus module so that temporary session named sockets
...
can be read and written in the role template and by system
and session bus clients.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/services/dbus.if | 22 ++++++++++++++++++++++
1 file changed, 22 insertions(+)
2023-08-30 16:19:27 +02:00
Guido Trentalancia
de026627fe
Fix the dbus module so that automatic file type transitions
...
are used not only for files and directories, but also for
named sockets.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/dbus.te | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
2023-08-30 16:07:13 +02:00
Guido Trentalancia
1f5bd26210
Fix the pulseaudio module file transition for named
...
sockets in tmp directories.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/contrib/pulseaudio.te | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
2023-08-30 15:40:20 +02:00
Guido Trentalancia
911c02feef
The pulseaudio module should be able to read alsa
...
library directories.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/apps/pulseaudio.te | 1 +
1 file changed, 1 insertion(+)
2023-08-30 15:39:44 +02:00
Guido Trentalancia
191f6d28e1
The kernel domain should be able to mounton default directories
...
during switch_root.
Corresponding suspicious permissions are removed from the init
domain, however this might need further testing on a wider number
of systems.
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/kernel/kernel.te | 1 +
policy/modules/system/init.te | 4 ----
2 files changed, 1 insertion(+), 4 deletions(-)
2023-08-24 21:34:52 +02:00
Guido Trentalancia
718139ca87
The kernel domain should be able to mounton runtime directories
...
during switch_root, otherwise parts of the boot process might
fail on some systems (for example, the udev daemon).
Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
policy/modules/kernel/kernel.te | 1 +
1 file changed, 1 insertion(+)
2023-08-23 17:49:05 +02:00
Chris PeBenito
f3f761c4a8
Merge pull request #631 from dsugar100/label_pwhistory_helper
...
Label pwhistory_helper
2023-08-18 11:53:50 -04:00
Chris PeBenito
626848ad94
Merge pull request #632 from dsugar100/dbsud_var_lib_symlinks
...
If domain can read system_dbusd_var_lib_t files, also allow symlinks
2023-08-18 11:48:06 -04:00
Chris PeBenito
46812c0d52
Merge pull request #634 from dsugar100/read_rfkill
...
systemd-rfkill.socket reads and writes /dev/rfkill (with ListenSocket=) option.
2023-08-18 11:46:51 -04:00
Dave Sugar
e0970d55e6
systemd-rfkill.socket reads /dev/rfkill (with ListenSocket=) option.
...
Need to allow this to open the file so the service starts properly.
node=localhost type=AVC msg=audit(1689883855.890:419): avc: denied { open } for pid=1 comm="systemd" path="/dev/rfkill" dev="devtmpfs" ino=152 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:wireless_device_t:s0 tclass=chr_file permissive=1
node=localhost type=AVC msg=audit(1689883962.317:408): avc: denied { read write } for pid=1 comm="systemd" name="rfkill" dev="devtmpfs" ino=152 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:wireless_device_t:s0 tclass=chr_file permissive=0
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-08-16 11:52:15 -04:00
Dave Sugar
b128e7ea2d
If domain can read system_dbusd_var_lib_t files, also allow symlinks
...
node=localhost type=AVC msg=audit(1689811752.145:511): avc: denied { read } for pid=2622 comm="lightdm-gtk-gre" name="machine-id" dev="dm-10" ino=262170 scontext=system_u:system_r:xdm_t:s0 tcontext=system_u:object_r:system_dbusd_var_lib_t:s0 tclass=lnk_file permissive=0
node=localhost type=AVC msg=audit(1689811752.404:514): avc: denied { read } for pid=2629 comm="at-spi-bus-laun" name="machine-id" dev="dm-10" ino=262170 scontext=system_u:system_r:xdm_t:s0 tcontext=system_u:object_r:system_dbusd_var_lib_t:s0 tclass=lnk_file permissive=0
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-08-16 11:47:08 -04:00
Dave Sugar
9812e9c0ef
Label pwhistory_helper
...
pwhistory_helper is executed by pam_pwhistory (as configued in
/etc/pam.d/sysem-auth). It updates /etc/security/opasswd which contains
old passwords. Label /etc/security/opasswd as shadow_t to control access.
node=localhost type=AVC msg=audit(1689391847.287:8989): avc: denied { execute } for pid=2667 comm="passwd" name="pwhistory_helper" dev="dm-1" ino=402516 scontext=toor_u:staff_r:passwd_t:s0 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1689391847.287:8989): avc: denied { read open } for pid=2667 comm="passwd" path="/usr/sbin/pwhistory_helper" dev="dm-1" ino=402516 scontext=toor_u:staff_r:passwd_t:s0 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1689391847.287:8989): avc: denied { execute_no_trans } for pid=2667 comm="passwd" path="/usr/sbin/pwhistory_helper" dev="dm-1" ino=402516 scontext=toor_u:staff_r:passwd_t:s0 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1689391847.287:8989): avc: denied { map } for pid=2667 comm="pwhistory_helpe" path="/usr/sbin/pwhistory_helper" dev="dm-1" ino=402516 scontext=toor_u:staff_r:passwd_t:s0 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-08-16 11:45:13 -04:00
Chris PeBenito
97e35d8845
Merge pull request #626 from dsugar100/main
...
Allow local login to read /run/motd
2023-08-02 09:36:54 -04:00
Chris PeBenito
90d3f5c339
Merge pull request #619 from 0xC0ncord/container-caps-rework
...
container: rework capabilities
2023-07-18 14:43:08 -04:00
Dave Sugar
a120ea8c25
Allow local login to read /run/motd
...
node=localhost type=AVC msg=audit(1689384764.155:53945): avc: denied { getattr } for pid=5125 comm="login" path="/run/motd" dev="tmpfs" ino=1574 scontext=system_u:system_r:local_login_t:s0 tcontext=system_u:object_r:pam_motd_runtime_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1689384764.155:53946): avc: denied { read } for pid=5125 comm="login" name="motd" dev="tmpfs" ino=1574 scontext=system_u:system_r:local_login_t:s0 tcontext=system_u:object_r:pam_motd_runtime_t:s0 tclass=file permissive=1
node=localhost type=AVC msg=audit(1689384764.155:53946): avc: denied { open } for pid=5125 comm="login" path="/run/motd" dev="tmpfs" ino=1574 scontext=system_u:system_r:local_login_t:s0 tcontext=system_u:object_r:pam_motd_runtime_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2023-07-18 08:13:43 -04:00
Kenton Groombridge
f1e7404baa
container: rework capabilities
...
Rework (primarily) non-namespaced capabilities. These accesses are
leftovers from earlier policy versions before the container module was
introduced that are most likely too coarse for most container
applications.
Put all non-namespaced capability accesses for containers behind
tunables, borrowing ideas from container-selinux. For the more
privileged capabilities (sysadmin, mknod), add a tunable to control both
namespaced and non-namespaced access to these operations.
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2023-07-17 09:40:09 -04:00
Chris PeBenito
bee1bcb496
Merge pull request #622 from chrisschnei/zram-permission
...
systemd-generator: systemd_generator_t load kernel modules used for e…
2023-07-11 10:06:15 -04:00
Christian Schneider
26eb377014
systemd-generator: systemd_generator_t load kernel modules used for e.g. zram-generator
...
Fixes:
avc: denied { getsched } for pid=171 comm="zram-generator" scontext=system_u:system_r:systemd_generator_t tcontext=system_u:system_r:systemd_generator_t tclass=process permissive=1
avc: denied { execute } for pid=173 comm="zram-generator" name="kmod" dev="sda2" ino=17417 scontext=system_u:system_r:systemd_generator_t tcontext=system_u:object_r:kmod_exec_t tclass=file permissive=1
Signed-off-by: Christian Schneider <christian.schneider3@gmx.net>
2023-07-11 09:37:28 +02:00
Chris PeBenito
c6424be02d
Merge pull request #623 from fajs/psi_t
...
Add label and interfaces for kernel PSI files
2023-07-06 10:29:08 -04:00
Florian Schmidt
cf09279eab
Add label and interfaces for kernel PSI files
...
The pressure stall information (PSI) special files in /proc/pressure
currently don't have a separate file context, and so default to proc_t.
Since users need read/write permissions to those files to use PSI, and
handing out blanket permissions to proc_t is strongly discouraged,
introduce a new proc_psi_t label, as well as interfaces for it.
Signed-off-by: Florian Schmidt <flosch@nutanix.com>
2023-07-05 15:21:46 +00:00
Chris PeBenito
4370d6bcdf
Merge pull request #625 from rmsc/main
...
kubernetes: allow kubelet to read /proc/sys/vm files.
2023-07-05 11:07:24 -04:00
Renato Caldas
34cba22df8
kubernetes: allow kubelet to read /proc/sys/vm files.
...
Kubelet checks the value of '/proc/sys/vm/panic_on_oom' before starting.
Signed-off-by: Renato Caldas <renato@calgera.com>
2023-07-03 20:05:35 +01:00
Chris PeBenito
d4e64bb956
Merge pull request #621 from tormath1/tormath1/cilium
...
container: fix cilium denial
2023-06-21 15:32:33 -04:00