[node-patches] Change in ovirt-node[master]: selinux: Drop auditd_log_t related rules

fabiand at redhat.com fabiand at redhat.com
Fri Oct 10 14:45:37 UTC 2014


Fabian Deutsch has uploaded a new change for review.

Change subject: selinux: Drop auditd_log_t related rules
......................................................................

selinux: Drop auditd_log_t related rules

Due tue some misslabeling some rules were added allowing several
applications to access auditd_log_t labeled objects.
After the labeling has been fixed, the rules can now be removed again.

Change-Id: I3f5c501a15f31d8e8836465df5c833ac1318adf7
Bug-Url: https://bugzilla.redhat.com/show_bug.cgi?id=1128065
Signed-off-by: Fabian Deutsch <fabiand at fedoraproject.org>
---
M semodule/ovirt.te.in
1 file changed, 0 insertions(+), 19 deletions(-)


  git pull ssh://gerrit.ovirt.org:29418/ovirt-node refs/changes/07/34007/1

diff --git a/semodule/ovirt.te.in b/semodule/ovirt.te.in
index d279129..c735914 100644
--- a/semodule/ovirt.te.in
+++ b/semodule/ovirt.te.in
@@ -11,7 +11,6 @@
 @SEMODULE_WITH_SYSTEMD@    type systemd_localed_t;
 @SEMODULE_WITH_SYSTEMD@    type systemd_unit_file_t;
 @SEMODULE_WITH_SYSTEMD@    type systemd_hostnamed_t;
-    type auditd_log_t;
     type etc_t;
     type device_t;
     type dmesg_t;
@@ -76,7 +75,6 @@
     require {
         type ldconfig_t;
     }
-    allow ldconfig_t auditd_log_t:file append;
     allow ldconfig_t tmpfs_t:dir search;
 ')
 
@@ -115,8 +113,6 @@
 
 #============= sanlock_t ==============
 allow sanlock_t tmpfs_t:dir search;
-allow sanlock_t auditd_log_t:dir search;
-allow sanlock_t auditd_log_t:file { read getattr open append };
 allow sanlock_t nfs_t:dir search;
 allow sanlock_t nfs_t:file open;
 
@@ -172,8 +168,6 @@
     }
     allow local_login_t passwd_file_t:file write;
 ')
-allow local_login_t auditd_log_t:dir { search write add_name };
-allow local_login_t auditd_log_t:file { write lock create open read };
 allow local_login_t chkpwd_t:process { siginh rlimitinh noatsecure };
 allow local_login_t shadow_t:file { write rename create unlink setattr };
 allow local_login_t tmpfs_t:dir { write remove_name add_name };
@@ -223,7 +217,6 @@
 allow sshd_t var_log_t:file { read open write };
 allow sshd_t device_t:sock_file write;
 allow sshd_t ovirt_t:unix_dgram_socket sendto;
-allow sshd_t auditd_log_t:file { read lock open };
 
 #============= svirt_t ==============
 allow svirt_t initrc_t:unix_stream_socket connectto;
@@ -233,8 +226,6 @@
 
 #============= syslogd_t ==============
 allow syslogd_t var_lib_t:file { write getattr open };
-allow syslogd_t auditd_log_t:dir { search write add_name };
-allow syslogd_t auditd_log_t:file { ioctl open create append getattr };
 
 
 #============= sysstat_t ==============
@@ -243,8 +234,6 @@
     type admin_home_t;
 }
 allow sysstat_t admin_home_t:dir { search getattr };
-allow sysstat_t auditd_log_t:file { read lock open append getattr };
-allow sysstat_t auditd_log_t:dir { write search getattr add_name };
 allow sysstat_t tmpfs_t:dir search;
 allow sysstat_t var_lib_t:file { read append };
 allow sysstat_t var_log_t:file { open read };
@@ -351,8 +340,6 @@
     }
     allow rhsmcertd_t tmpfs_t:dir search;
     allow rhsmcertd_t var_log_t:file open;
-    allow rhsmcertd_t auditd_log_t:dir { write getattr add_name search };
-    allow rhsmcertd_t auditd_log_t:file { create open getattr append };
 ')
 
 
@@ -483,8 +470,6 @@
 allow getty_t local_login_t:process { siginh rlimitinh noatsecure };
 allow getty_t var_log_t:file { open write };
 allow getty_t tmpfs_t:dir search;
-allow getty_t auditd_log_t:file { write lock open };
-allow getty_t auditd_log_t:dir search;
 
 
 #============= ifconfig_t ==============
@@ -535,8 +520,6 @@
 
 
 #============= logrotate_t ==============
-allow logrotate_t auditd_log_t:dir read;
-allow logrotate_t auditd_log_t:file getattr;
 allow logrotate_t var_lib_t:file write;
 allow logrotate_t virt_cache_t:dir { read getattr write remove_name add_name };
 allow logrotate_t virt_cache_t:file { rename setattr read create getattr write ioctl unlink open };
@@ -549,8 +532,6 @@
         type iptables_t;
     }
     allow firewalld_t ovirt_t:dbus send_msg;
-    allow firewalld_t auditd_log_t:dir { write add_name search };
-    allow firewalld_t auditd_log_t:file { create open getattr append };
     allow firewalld_t init_t:dbus send_msg;
     allow firewalld_t iptables_t:process { siginh noatsecure rlimitinh };
 ')


-- 
To view, visit http://gerrit.ovirt.org/34007
To unsubscribe, visit http://gerrit.ovirt.org/settings

Gerrit-MessageType: newchange
Gerrit-Change-Id: I3f5c501a15f31d8e8836465df5c833ac1318adf7
Gerrit-PatchSet: 1
Gerrit-Project: ovirt-node
Gerrit-Branch: master
Gerrit-Owner: Fabian Deutsch <fabiand at redhat.com>
Gerrit-Reviewer: Fabian Deutsch <fabiand at redhat.com>



More information about the node-patches mailing list