From: cgzones@googlemail.com (=?UTF-8?q?Christian=20G=C3=B6ttsche?=) Date: Sun, 10 Sep 2017 17:48:03 +0200 Subject: [refpolicy] [PATCH] rkhunter: add interfaces for var_run and lock dir access check Message-ID: <20170910154803.8977-1-cgzones@googlemail.com> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com --- policy/modules/kernel/files.if | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index 1b10d466..597801ad 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -5816,6 +5816,25 @@ interface(`files_list_locks',` list_dirs_pattern($1, var_t, var_lock_t) ') +######################################## +## +## Test write access on lock directories. +## +## +## +## Domain allowed access. +## +## +# +interface(`files_check_write_lock_dirs',` + gen_require(` + type var_lock_t; + ') + + allow $1 var_lock_t:lnk_file read_lnk_file_perms; + allow $1 var_lock_t:dir write; +') + ######################################## ## ## Add entries in the /var/lock directories. @@ -6222,6 +6241,24 @@ interface(`files_create_pid_dirs',` allow $1 var_run_t:dir create_dir_perms; ') +######################################## +## +## Check write access on /var/run directories. +## +## +## +## Domain allowed access. +## +## +# +interface(`files_check_write_pid_dirs',` + gen_require(` + type var_run_t; + ') + + allow $1 var_run_t:dir write; +') + ######################################## ## ## Read generic process ID files. -- 2.14.1