diff options
author | Christian Göttsche <cgzones@googlemail.com> | 2017-09-10 17:49:48 +0200 |
---|---|---|
committer | Luis Ressel <aranea@aixah.de> | 2017-09-14 21:34:43 +0200 |
commit | 855cc1c93352b29d1e2f7e1f65f9ac91ae49d174 (patch) | |
tree | 9f1a8e27ca135d80096c4bf6b43d811597a96cc1 | |
parent | chkrootkit: update (diff) | |
download | hardened-refpolicy-855cc1c93352b29d1e2f7e1f65f9ac91ae49d174.tar.gz hardened-refpolicy-855cc1c93352b29d1e2f7e1f65f9ac91ae49d174.tar.bz2 hardened-refpolicy-855cc1c93352b29d1e2f7e1f65f9ac91ae49d174.zip |
rkhunter: add several missing permission
-rw-r--r-- | policy/modules/contrib/rkhunter.te | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/policy/modules/contrib/rkhunter.te b/policy/modules/contrib/rkhunter.te index 4ebfdf6c5..caa1680db 100644 --- a/policy/modules/contrib/rkhunter.te +++ b/policy/modules/contrib/rkhunter.te @@ -35,7 +35,7 @@ files_type(rkhunter_var_lib_t) # Application local policy # -allow rkhunter_t self:capability { dac_override dac_read_search net_admin setgid setuid sys_nice sys_ptrace }; +allow rkhunter_t self:capability { dac_read_search kill net_admin setgid setuid sys_nice sys_ptrace }; allow rkhunter_t self:process { getsched setsched signal }; allow rkhunter_t self:netlink_route_socket r_netlink_socket_perms; allow rkhunter_t self:tcp_socket { bind connect create listen read write }; @@ -68,6 +68,7 @@ corenet_udp_bind_all_ports(rkhunter_t) corenet_tcp_bind_generic_node(rkhunter_t) corenet_udp_bind_generic_node(rkhunter_t) +dev_getattr_fs(rkhunter_t) dev_read_urand(rkhunter_t) dev_getattr_all_chr_files(rkhunter_t) dev_getattr_all_blk_files(rkhunter_t) @@ -76,15 +77,22 @@ domain_read_all_domains_state(rkhunter_t) domain_use_interactive_fds(rkhunter_t) domain_getattr_all_sockets(rkhunter_t) domain_getattr_all_pipes(rkhunter_t) +domain_getpgid_all_domains(rkhunter_t) +domain_getsched_all_domains(rkhunter_t) +domain_getsession_all_domains(rkhunter_t) +domain_signull_all_domains(rkhunter_t) files_read_non_auth_files(rkhunter_t) files_read_all_symlinks(rkhunter_t) files_read_all_chr_files(rkhunter_t) files_getattr_all_pipes(rkhunter_t) files_getattr_all_sockets(rkhunter_t) +files_check_write_lock_dirs(rkhunter_t) +files_check_write_pid_dirs(rkhunter_t) fs_getattr_tracefs(rkhunter_t) fs_getattr_tracefs_dirs(rkhunter_t) +fs_getattr_xattr_fs(rkhunter_t) hostname_exec(rkhunter_t) |