From: cgzones@googlemail.com (=?UTF-8?q?Christian=20G=C3=B6ttsche?=)
Date: Sun, 10 Sep 2017 17:48:03 +0200
Subject: [refpolicy] [PATCH] rkhunter: add interfaces for var_run and lock
dir access check
Message-ID: <20170910154803.8977-1-cgzones@googlemail.com>
To: refpolicy@oss.tresys.com
List-Id: refpolicy.oss.tresys.com
---
policy/modules/kernel/files.if | 37 +++++++++++++++++++++++++++++++++++++
1 file changed, 37 insertions(+)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 1b10d466..597801ad 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -5816,6 +5816,25 @@ interface(`files_list_locks',`
list_dirs_pattern($1, var_t, var_lock_t)
')
+########################################
+##
+## Test write access on lock directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`files_check_write_lock_dirs',`
+ gen_require(`
+ type var_lock_t;
+ ')
+
+ allow $1 var_lock_t:lnk_file read_lnk_file_perms;
+ allow $1 var_lock_t:dir write;
+')
+
########################################
##
## Add entries in the /var/lock directories.
@@ -6222,6 +6241,24 @@ interface(`files_create_pid_dirs',`
allow $1 var_run_t:dir create_dir_perms;
')
+########################################
+##
+## Check write access on /var/run directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`files_check_write_pid_dirs',`
+ gen_require(`
+ type var_run_t;
+ ')
+
+ allow $1 var_run_t:dir write;
+')
+
########################################
##
## Read generic process ID files.
--
2.14.1