[selinux-policy: 2455/3172] Fix userdom_write_user_tmp_sockets to use write_sock_file_perms to allow domains to open user_tmp_t

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 22:37:58 UTC 2010


commit 4cb24aed7b3d036f8ff3a60889c73cfe3237e0f7
Author: Dominick Grift <domg472 at gmail.com>
Date:   Wed Mar 3 16:10:56 2010 +0100

    Fix userdom_write_user_tmp_sockets to use write_sock_file_perms to allow domains to open user_tmp_t sock_files.
    
    Signed-off-by: Dominick Grift <domg472 at gmail.com>
    Signed-off-by: Chris PeBenito <cpebenito at tresys.com>

 policy/modules/system/userdomain.if |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index b18abce..b3b08d6 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -2077,7 +2077,7 @@ interface(`userdom_write_user_tmp_sockets',`
 		type user_tmp_t;
 	')
 
-	allow $1 user_tmp_t:sock_file write;
+	allow $1 user_tmp_t:sock_file write_sock_file_perms;
 	files_search_tmp($1)
 ')
 


More information about the scm-commits mailing list