Re: cups-config-daemon ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Monday 29 November 2004 06:51, Tom London <selinux@xxxxxxxxx> wrote:
> Running strict/enforcing, latest Rawhide.
>
> I think the following is coming from cups-config-daemon
>
> I'm always a bit suspicious of fd denials....
> these are to /dev/null...
> Is this an open file leaking across an exec?

I don't think that this is a problem.  Granting access to /dev/null is not an 
issue.  For cron jobs this sort of thing is common.

The attached patch should do the job.

> Help welcomed.....
>    tom
>
>
> Nov 28 10:12:25 fedora cups: cupsd shutdown succeeded
> Nov 28 10:12:25 fedora kernel: audit(1101665545.088:0): avc:  denied
> { use } for  pid=4223 exe=/usr/bin/python path=/dev/null dev=tmpfs
> ino=3516 scontext=system_u:system_r:cupsd_config_t
> tcontext=system_u:system_r:system_crond_t tclass=fd
> Nov 28 10:12:25 fedora kernel: audit(1101665545.088:0): avc:  denied
> { use } for  pid=4223 exe=/usr/bin/python path=/dev/null dev=tmpfs
> ino=3516 scontext=system_u:system_r:cupsd_config_t
> tcontext=system_u:system_r:logrotate_t tclass=fd
> Nov 28 10:12:25 fedora kernel: audit(1101665545.088:0): avc:  denied
> { use } for  pid=4223 exe=/usr/bin/python path=/dev/null dev=tmpfs
> ino=3516 scontext=system_u:system_r:cupsd_config_t
> tcontext=system_u:system_r:logrotate_t tclass=fd
> Nov 28 10:12:25 fedora kernel: audit(1101665545.232:0): avc:  denied
> { use } for  pid=4226 exe=/usr/sbin/cupsd path=/dev/null dev=tmpfs
> ino=3516 scontext=system_u:system_r:cupsd_t
> tcontext=system_u:system_r:system_crond_t tclass=fd
> Nov 28 10:12:25 fedora cups: cupsd startup succeeded

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page
--- domains/program/cups.te	2004-11-12 14:11:26.000000000 +1100
+++ /tmp/cups.te	2004-11-29 19:02:25.548101438 +1100
@@ -211,7 +211,7 @@
 allow cupsd_t userdomain:dbus send_msg;
 allow cupsd_t hald_t:dbus send_msg;
 allow hald_t cupsd_t:dbus send_msg;
-')
+')dnl end if dbusd.te
 
 can_exec(cupsd_config_t, { bin_t sbin_t shell_exec_t })
 allow cupsd_config_t { bin_t sbin_t }:dir { search getattr };
@@ -225,7 +225,11 @@
 allow cupsd_config_t urandom_device_t:chr_file { getattr read };
 
 domain_auto_trans(hald_t, cupsd_config_exec_t, cupsd_config_t)
+ifdef(`logrotate.te', `
+allow cupsd_config_t logrotate_t:fd use;
+')dnl end if logrotate.te
+allow cupsd_config_t system_crond_t:fd use;
+')dnl end if hald.te
 
-')
 # Alternatives asks for this
 allow cupsd_config_t initrc_exec_t:file getattr;

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux