[selinux-policy: 2455/3172] Fix userdom_write_user_tmp_sockets to use write_sock_file_perms to allow domains to open user_tmp_t
Daniel J Walsh
dwalsh at fedoraproject.org
Thu Oct 7 22:37:58 UTC 2010
commit 4cb24aed7b3d036f8ff3a60889c73cfe3237e0f7
Author: Dominick Grift <domg472 at gmail.com>
Date: Wed Mar 3 16:10:56 2010 +0100
Fix userdom_write_user_tmp_sockets to use write_sock_file_perms to allow domains to open user_tmp_t sock_files.
Signed-off-by: Dominick Grift <domg472 at gmail.com>
Signed-off-by: Chris PeBenito <cpebenito at tresys.com>
policy/modules/system/userdomain.if | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index b18abce..b3b08d6 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -2077,7 +2077,7 @@ interface(`userdom_write_user_tmp_sockets',`
type user_tmp_t;
')
- allow $1 user_tmp_t:sock_file write;
+ allow $1 user_tmp_t:sock_file write_sock_file_perms;
files_search_tmp($1)
')
More information about the scm-commits
mailing list