On Mar  5, 2025 Richard Guy Briggs <r...@redhat.com> wrote:
> 
> When no audit rules are in place, AUDIT_ANOM_{LINK,CREAT} events
> reported in audit_log_path_denied() are unconditionally dropped due to
> an explicit check for the existence of any audit rules.  Given this is a
> report of a security violation, allow it to be recorded regardless of
> the existence of any audit rules.
> 
> To test,
>       mkdir -p /root/tmp
>       chmod 1777 /root/tmp
>       touch /root/tmp/test.txt
>       useradd test
>       chown test /root/tmp/test.txt
>       {echo C0644 12 test.txt; printf 'hello\ntest1\n'; printf \\000;} | \
>               scp -t /root/tmp
> Check with
>       ausearch -m ANOM_CREAT -ts recent
> 
> Link: https://issues.redhat.com/browse/RHEL-9065
> Signed-off-by: Richard Guy Briggs <r...@redhat.com>
> ---
>  kernel/audit.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)

Looks okay to me, merged into audit/dev, thanks!

> diff --git a/kernel/audit.c b/kernel/audit.c
> index 53e3bddcc327..0cf2827882fc 100644
> --- a/kernel/audit.c
> +++ b/kernel/audit.c
> @@ -2285,7 +2285,7 @@ void audit_log_path_denied(int type, const char 
> *operation)
>  {
>       struct audit_buffer *ab;
>  
> -     if (!audit_enabled || audit_dummy_context())
> +     if (!audit_enabled)
>               return;
>  
>       /* Generate log with subject, operation, outcome. */
> -- 
> 2.43.5

--
paul-moore.com

Reply via email to