summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2024-06-06 14:14:34 +0800
committerJoe MacDonald <joe.macdonald@siemens.com>2024-07-23 12:51:05 -0400
commit0dbf1bdc02cdcb38b5a57fad351adeff8d12b66d (patch)
tree4c2cfdec87e9d377c09aade037986e9b96736a2b
parent37ede3a5fec01e97e481101b2b8664666c4923c7 (diff)
downloadmeta-selinux-0dbf1bdc02cdcb38b5a57fad351adeff8d12b66d.tar.gz
refpolicy: fixes for auditctl and rsyslog
* Allow auditctl to read symlink of var/log directory. * Grant getpcap capability to syslogd_t. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Joe MacDonald <joe.macdonald@siemens.com>
-rw-r--r--recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch20
-rw-r--r--recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch38
-rw-r--r--recipes-security/refpolicy/refpolicy_common.inc1
3 files changed, 53 insertions, 6 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch
index e9e717b..6ad2475 100644
--- a/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch
+++ b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch
@@ -1,4 +1,4 @@
1From d7dfe01114f9a1449ce2efd792ddf4b18fe91a45 Mon Sep 17 00:00:00 2001 1From 5b33f07f60b20eb6e07ea3f517c43a539ee21332 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures 4Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures
@@ -13,14 +13,22 @@ Upstream-Status: Inappropriate [embedded specific]
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com> 14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15--- 15---
16 policy/modules/system/logging.te | 2 ++ 16 policy/modules/system/logging.te | 3 +++
17 1 file changed, 2 insertions(+) 17 1 file changed, 3 insertions(+)
18 18
19diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 19diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
20index 45584dba6..8bc70b81d 100644 20index 45584dba6..4fb2fb63c 100644
21--- a/policy/modules/system/logging.te 21--- a/policy/modules/system/logging.te
22+++ b/policy/modules/system/logging.te 22+++ b/policy/modules/system/logging.te
23@@ -177,6 +177,7 @@ dontaudit auditd_t auditd_etc_t:file map; 23@@ -117,6 +117,7 @@ allow auditctl_t self:netlink_audit_socket nlmsg_readpriv;
24
25 read_files_pattern(auditctl_t, auditd_etc_t, auditd_etc_t)
26 allow auditctl_t auditd_etc_t:dir list_dir_perms;
27+allow auditctl_t var_log_t:lnk_file read_lnk_file_perms;
28 dontaudit auditctl_t auditd_etc_t:file map;
29
30 corecmd_search_bin(auditctl_t)
31@@ -177,6 +178,7 @@ dontaudit auditd_t auditd_etc_t:file map;
24 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) 32 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
25 allow auditd_t auditd_log_t:dir setattr; 33 allow auditd_t auditd_log_t:dir setattr;
26 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t) 34 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
@@ -28,7 +36,7 @@ index 45584dba6..8bc70b81d 100644
28 allow auditd_t var_log_t:dir search_dir_perms; 36 allow auditd_t var_log_t:dir search_dir_perms;
29 37
30 manage_files_pattern(auditd_t, auditd_runtime_t, auditd_runtime_t) 38 manage_files_pattern(auditd_t, auditd_runtime_t, auditd_runtime_t)
31@@ -306,6 +307,7 @@ optional_policy(` 39@@ -306,6 +308,7 @@ optional_policy(`
32 allow audisp_remote_t self:capability { setpcap setuid }; 40 allow audisp_remote_t self:capability { setpcap setuid };
33 allow audisp_remote_t self:process { getcap setcap }; 41 allow audisp_remote_t self:process { getcap setcap };
34 allow audisp_remote_t self:tcp_socket create_socket_perms; 42 allow audisp_remote_t self:tcp_socket create_socket_perms;
diff --git a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch
new file mode 100644
index 0000000..5c2e789
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch
@@ -0,0 +1,38 @@
1From f48edb588d799a7aab9110e4f67468d8e5e41c10 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 28 May 2024 11:21:48 +0800
4Subject: [PATCH] policy/modules/system/logging: grant getpcap capability to
5 syslogd_t
6
7The rsyslog is configured with --enable-libpcap which requires getpcap
8capability.
9
10Fixes:
11avc: denied { setpcap } for pid=317 comm="rsyslogd" capability=8
12scontext=system_u:system_r:syslogd_t:s15:c0.c1023
13tcontext=system_u:system_r:syslogd_t:s15:c0.c1023 tclass=capability
14permissive=1
15
16Upstream-Status: Inappropriate [embedded specific]
17
18Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
19---
20 policy/modules/system/logging.te | 2 ++
21 1 file changed, 2 insertions(+)
22
23diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
24index 511604493..9c0a58aef 100644
25--- a/policy/modules/system/logging.te
26+++ b/policy/modules/system/logging.te
27@@ -404,6 +404,8 @@ optional_policy(`
28 # sys_admin for the integrated klog of syslog-ng and metalog
29 # sys_nice for rsyslog
30 allow syslogd_t self:capability { chown dac_override fsetid setgid setuid sys_admin sys_nice sys_resource sys_tty_config };
31+# Rsyslog configures with --enable-libcap-ng
32+allow syslogd_t self:capability setpcap;
33 dontaudit syslogd_t self:capability { sys_ptrace };
34 dontaudit syslogd_t self:cap_userns { kill sys_ptrace };
35 # setpgid for metalog
36--
372.25.1
38
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc
index 000fb3c..05dca2c 100644
--- a/recipes-security/refpolicy/refpolicy_common.inc
+++ b/recipes-security/refpolicy/refpolicy_common.inc
@@ -72,6 +72,7 @@ SRC_URI += " \
72 file://0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \ 72 file://0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \
73 file://0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \ 73 file://0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \
74 file://0056-policy-modules-system-logging-make-syslogd_runtime_t.patch \ 74 file://0056-policy-modules-system-logging-make-syslogd_runtime_t.patch \
75 file://0057-policy-modules-system-logging-grant-getpcap-capabili.patch \
75 " 76 "
76 77
77S = "${WORKDIR}/refpolicy" 78S = "${WORKDIR}/refpolicy"