* Wed Jul 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-137
- inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t - Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib.
This commit is contained in:
parent
ee724ad113
commit
04f749c8f0
@ -5208,7 +5208,7 @@ index f6eb485..164501c 100644
|
|||||||
+ filetrans_pattern($1, { httpd_user_content_t httpd_user_script_exec_t }, httpd_user_htaccess_t, file, ".htaccess")
|
+ filetrans_pattern($1, { httpd_user_content_t httpd_user_script_exec_t }, httpd_user_htaccess_t, file, ".htaccess")
|
||||||
')
|
')
|
||||||
diff --git a/apache.te b/apache.te
|
diff --git a/apache.te b/apache.te
|
||||||
index 6649962..fc23c8a 100644
|
index 6649962..4516b9a 100644
|
||||||
--- a/apache.te
|
--- a/apache.te
|
||||||
+++ b/apache.te
|
+++ b/apache.te
|
||||||
@@ -5,280 +5,346 @@ policy_module(apache, 2.7.2)
|
@@ -5,280 +5,346 @@ policy_module(apache, 2.7.2)
|
||||||
@ -6218,26 +6218,19 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
||||||
@@ -624,68 +804,46 @@ tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
@@ -624,68 +804,56 @@ tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs',`
|
||||||
fs_read_nfs_symlinks(httpd_t)
|
fs_read_nfs_symlinks(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
-tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs && httpd_builtin_scripting',`
|
-tunable_policy(`httpd_enable_homedirs && use_nfs_home_dirs && httpd_builtin_scripting',`
|
||||||
- fs_exec_nfs_files(httpd_t)
|
- fs_exec_nfs_files(httpd_t)
|
||||||
-')
|
|
||||||
-
|
|
||||||
-tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',`
|
|
||||||
+tunable_policy(`httpd_use_nfs',`
|
+tunable_policy(`httpd_use_nfs',`
|
||||||
fs_list_auto_mountpoints(httpd_t)
|
+ fs_list_auto_mountpoints(httpd_t)
|
||||||
- fs_read_cifs_files(httpd_t)
|
|
||||||
- fs_read_cifs_symlinks(httpd_t)
|
|
||||||
+ fs_manage_nfs_dirs(httpd_t)
|
+ fs_manage_nfs_dirs(httpd_t)
|
||||||
+ fs_manage_nfs_files(httpd_t)
|
+ fs_manage_nfs_files(httpd_t)
|
||||||
+ fs_manage_nfs_symlinks(httpd_t)
|
+ fs_manage_nfs_symlinks(httpd_t)
|
||||||
')
|
+')
|
||||||
|
+
|
||||||
-tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs && httpd_builtin_scripting',`
|
|
||||||
- fs_exec_cifs_files(httpd_t)
|
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ tunable_policy(`httpd_use_nfs',`
|
+ tunable_policy(`httpd_use_nfs',`
|
||||||
@ -6245,35 +6238,52 @@ index 6649962..fc23c8a 100644
|
|||||||
+ ')
|
+ ')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',`
|
||||||
|
- fs_list_auto_mountpoints(httpd_t)
|
||||||
|
fs_read_cifs_files(httpd_t)
|
||||||
|
fs_read_cifs_symlinks(httpd_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
-tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs && httpd_builtin_scripting',`
|
||||||
|
- fs_exec_cifs_files(httpd_t)
|
||||||
|
+tunable_policy(`httpd_can_sendmail',`
|
||||||
|
+ # allow httpd to connect to mail servers
|
||||||
|
+ corenet_tcp_connect_smtp_port(httpd_t)
|
||||||
|
+ corenet_sendrecv_smtp_client_packets(httpd_t)
|
||||||
|
+ corenet_tcp_connect_pop_port(httpd_t)
|
||||||
|
+ corenet_sendrecv_pop_client_packets(httpd_t)
|
||||||
|
')
|
||||||
|
|
||||||
-tunable_policy(`httpd_execmem',`
|
-tunable_policy(`httpd_execmem',`
|
||||||
- allow httpd_t self:process { execmem execstack };
|
- allow httpd_t self:process { execmem execstack };
|
||||||
+tunable_policy(`httpd_enable_homedirs && use_samba_home_dirs',`
|
-')
|
||||||
+ fs_read_cifs_files(httpd_t)
|
-
|
||||||
+ fs_read_cifs_symlinks(httpd_t)
|
-tunable_policy(`httpd_can_sendmail',`
|
||||||
')
|
|
||||||
|
|
||||||
tunable_policy(`httpd_can_sendmail',`
|
|
||||||
- corenet_sendrecv_smtp_client_packets(httpd_t)
|
- corenet_sendrecv_smtp_client_packets(httpd_t)
|
||||||
+ # allow httpd to connect to mail servers
|
- corenet_tcp_connect_smtp_port(httpd_t)
|
||||||
corenet_tcp_connect_smtp_port(httpd_t)
|
|
||||||
- corenet_tcp_sendrecv_smtp_port(httpd_t)
|
- corenet_tcp_sendrecv_smtp_port(httpd_t)
|
||||||
- corenet_sendrecv_pop_client_packets(httpd_t)
|
- corenet_sendrecv_pop_client_packets(httpd_t)
|
||||||
+ corenet_sendrecv_smtp_client_packets(httpd_t)
|
- corenet_tcp_connect_pop_port(httpd_t)
|
||||||
corenet_tcp_connect_pop_port(httpd_t)
|
|
||||||
- corenet_tcp_sendrecv_pop_port(httpd_t)
|
- corenet_tcp_sendrecv_pop_port(httpd_t)
|
||||||
-
|
-
|
||||||
+ corenet_sendrecv_pop_client_packets(httpd_t)
|
- mta_send_mail(httpd_t)
|
||||||
mta_send_mail(httpd_t)
|
- mta_signal_system_mail(httpd_t)
|
||||||
mta_signal_system_mail(httpd_t)
|
+optional_policy(`
|
||||||
+ postfix_rw_spool_maildrop_files(httpd_t)
|
+ tunable_policy(`httpd_can_sendmail',`
|
||||||
|
+ mta_send_mail(httpd_t)
|
||||||
|
+ mta_signal_system_mail(httpd_t)
|
||||||
|
+ ')
|
||||||
')
|
')
|
||||||
|
|
||||||
-optional_policy(`
|
optional_policy(`
|
||||||
- tunable_policy(`httpd_can_network_connect_zabbix',`
|
- tunable_policy(`httpd_can_network_connect_zabbix',`
|
||||||
- zabbix_tcp_connect(httpd_t)
|
- zabbix_tcp_connect(httpd_t)
|
||||||
- ')
|
- ')
|
||||||
-')
|
+ tunable_policy(`httpd_can_sendmail',`
|
||||||
-
|
+ postfix_rw_spool_maildrop_files(httpd_t)
|
||||||
|
+ ')
|
||||||
|
')
|
||||||
|
|
||||||
-optional_policy(`
|
-optional_policy(`
|
||||||
- tunable_policy(`httpd_can_sendmail && httpd_can_check_spam',`
|
- tunable_policy(`httpd_can_sendmail && httpd_can_check_spam',`
|
||||||
- spamassassin_domtrans_client(httpd_t)
|
- spamassassin_domtrans_client(httpd_t)
|
||||||
@ -6311,7 +6321,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_setrlimit',`
|
tunable_policy(`httpd_setrlimit',`
|
||||||
@@ -695,49 +853,48 @@ tunable_policy(`httpd_setrlimit',`
|
@@ -695,49 +863,48 @@ tunable_policy(`httpd_setrlimit',`
|
||||||
|
|
||||||
tunable_policy(`httpd_ssi_exec',`
|
tunable_policy(`httpd_ssi_exec',`
|
||||||
corecmd_shell_domtrans(httpd_t, httpd_sys_script_t)
|
corecmd_shell_domtrans(httpd_t, httpd_sys_script_t)
|
||||||
@ -6392,7 +6402,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -749,24 +906,32 @@ optional_policy(`
|
@@ -749,24 +916,32 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6431,7 +6441,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -775,6 +940,10 @@ optional_policy(`
|
@@ -775,6 +950,10 @@ optional_policy(`
|
||||||
tunable_policy(`httpd_dbus_avahi',`
|
tunable_policy(`httpd_dbus_avahi',`
|
||||||
avahi_dbus_chat(httpd_t)
|
avahi_dbus_chat(httpd_t)
|
||||||
')
|
')
|
||||||
@ -6442,7 +6452,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -786,35 +955,60 @@ optional_policy(`
|
@@ -786,35 +965,60 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6516,7 +6526,7 @@ index 6649962..fc23c8a 100644
|
|||||||
|
|
||||||
tunable_policy(`httpd_manage_ipa',`
|
tunable_policy(`httpd_manage_ipa',`
|
||||||
memcached_manage_pid_files(httpd_t)
|
memcached_manage_pid_files(httpd_t)
|
||||||
@@ -822,8 +1016,30 @@ optional_policy(`
|
@@ -822,8 +1026,30 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6547,7 +6557,7 @@ index 6649962..fc23c8a 100644
|
|||||||
|
|
||||||
tunable_policy(`httpd_can_network_connect_db',`
|
tunable_policy(`httpd_can_network_connect_db',`
|
||||||
mysql_tcp_connect(httpd_t)
|
mysql_tcp_connect(httpd_t)
|
||||||
@@ -832,6 +1048,8 @@ optional_policy(`
|
@@ -832,6 +1058,8 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
nagios_read_config(httpd_t)
|
nagios_read_config(httpd_t)
|
||||||
@ -6556,7 +6566,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -842,20 +1060,40 @@ optional_policy(`
|
@@ -842,20 +1070,40 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6603,7 +6613,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -863,16 +1101,31 @@ optional_policy(`
|
@@ -863,16 +1111,31 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -6623,21 +6633,21 @@ index 6649962..fc23c8a 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
smokeping_read_lib_files(httpd_t)
|
smokeping_read_lib_files(httpd_t)
|
||||||
+ smokeping_read_pid_files(httpd_t)
|
+ smokeping_read_pid_files(httpd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ files_dontaudit_rw_usr_dirs(httpd_t)
|
||||||
|
+ snmp_dontaudit_manage_snmp_var_lib_files(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
- snmp_dontaudit_read_snmp_var_lib_files(httpd_t)
|
- snmp_dontaudit_read_snmp_var_lib_files(httpd_t)
|
||||||
- snmp_dontaudit_write_snmp_var_lib_files(httpd_t)
|
- snmp_dontaudit_write_snmp_var_lib_files(httpd_t)
|
||||||
+ files_dontaudit_rw_usr_dirs(httpd_t)
|
|
||||||
+ snmp_dontaudit_manage_snmp_var_lib_files(httpd_t)
|
|
||||||
+')
|
|
||||||
+
|
|
||||||
+optional_policy(`
|
|
||||||
+ thin_stream_connect(httpd_t)
|
+ thin_stream_connect(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -883,65 +1136,189 @@ optional_policy(`
|
@@ -883,65 +1146,189 @@ optional_policy(`
|
||||||
yam_read_content(httpd_t)
|
yam_read_content(httpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -6849,7 +6859,7 @@ index 6649962..fc23c8a 100644
|
|||||||
files_dontaudit_search_pids(httpd_suexec_t)
|
files_dontaudit_search_pids(httpd_suexec_t)
|
||||||
files_search_home(httpd_suexec_t)
|
files_search_home(httpd_suexec_t)
|
||||||
|
|
||||||
@@ -950,123 +1327,74 @@ auth_use_nsswitch(httpd_suexec_t)
|
@@ -950,123 +1337,74 @@ auth_use_nsswitch(httpd_suexec_t)
|
||||||
logging_search_logs(httpd_suexec_t)
|
logging_search_logs(httpd_suexec_t)
|
||||||
logging_send_syslog_msg(httpd_suexec_t)
|
logging_send_syslog_msg(httpd_suexec_t)
|
||||||
|
|
||||||
@ -7004,7 +7014,7 @@ index 6649962..fc23c8a 100644
|
|||||||
mysql_read_config(httpd_suexec_t)
|
mysql_read_config(httpd_suexec_t)
|
||||||
|
|
||||||
tunable_policy(`httpd_can_network_connect_db',`
|
tunable_policy(`httpd_can_network_connect_db',`
|
||||||
@@ -1083,172 +1411,107 @@ optional_policy(`
|
@@ -1083,172 +1421,107 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -7171,7 +7181,8 @@ index 6649962..fc23c8a 100644
|
|||||||
-#
|
-#
|
||||||
-# System script local policy
|
-# System script local policy
|
||||||
-#
|
-#
|
||||||
-
|
+corenet_all_recvfrom_netlabel(httpd_sys_script_t)
|
||||||
|
|
||||||
-allow httpd_sys_script_t self:tcp_socket { accept listen };
|
-allow httpd_sys_script_t self:tcp_socket { accept listen };
|
||||||
-
|
-
|
||||||
-allow httpd_sys_script_t httpd_t:tcp_socket { read write };
|
-allow httpd_sys_script_t httpd_t:tcp_socket { read write };
|
||||||
@ -7187,8 +7198,7 @@ index 6649962..fc23c8a 100644
|
|||||||
-kernel_read_kernel_sysctls(httpd_sys_script_t)
|
-kernel_read_kernel_sysctls(httpd_sys_script_t)
|
||||||
-
|
-
|
||||||
-fs_search_auto_mountpoints(httpd_sys_script_t)
|
-fs_search_auto_mountpoints(httpd_sys_script_t)
|
||||||
+corenet_all_recvfrom_netlabel(httpd_sys_script_t)
|
-
|
||||||
|
|
||||||
-files_read_var_symlinks(httpd_sys_script_t)
|
-files_read_var_symlinks(httpd_sys_script_t)
|
||||||
-files_search_var_lib(httpd_sys_script_t)
|
-files_search_var_lib(httpd_sys_script_t)
|
||||||
-files_search_spool(httpd_sys_script_t)
|
-files_search_spool(httpd_sys_script_t)
|
||||||
@ -7242,7 +7252,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_read_user_content',`
|
tunable_policy(`httpd_read_user_content',`
|
||||||
@@ -1256,64 +1519,74 @@ tunable_policy(`httpd_read_user_content',`
|
@@ -1256,64 +1529,74 @@ tunable_policy(`httpd_read_user_content',`
|
||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`httpd_use_cifs',`
|
tunable_policy(`httpd_use_cifs',`
|
||||||
@ -7339,7 +7349,7 @@ index 6649962..fc23c8a 100644
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@@ -1321,8 +1594,15 @@ miscfiles_read_localization(httpd_rotatelogs_t)
|
@@ -1321,8 +1604,15 @@ miscfiles_read_localization(httpd_rotatelogs_t)
|
||||||
#
|
#
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -7356,7 +7366,7 @@ index 6649962..fc23c8a 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1330,49 +1610,38 @@ optional_policy(`
|
@@ -1330,49 +1620,38 @@ optional_policy(`
|
||||||
# User content local policy
|
# User content local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -7421,7 +7431,7 @@ index 6649962..fc23c8a 100644
|
|||||||
kernel_read_system_state(httpd_passwd_t)
|
kernel_read_system_state(httpd_passwd_t)
|
||||||
|
|
||||||
corecmd_exec_bin(httpd_passwd_t)
|
corecmd_exec_bin(httpd_passwd_t)
|
||||||
@@ -1382,38 +1651,109 @@ dev_read_urand(httpd_passwd_t)
|
@@ -1382,38 +1661,109 @@ dev_read_urand(httpd_passwd_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(httpd_passwd_t)
|
domain_use_interactive_fds(httpd_passwd_t)
|
||||||
|
|
||||||
@ -36113,7 +36123,7 @@ index eb87f23..d3d32c3 100644
|
|||||||
|
|
||||||
init_labeled_script_domtrans($1, innd_initrc_exec_t)
|
init_labeled_script_domtrans($1, innd_initrc_exec_t)
|
||||||
diff --git a/inn.te b/inn.te
|
diff --git a/inn.te b/inn.te
|
||||||
index d39f0cc..889dfd5 100644
|
index d39f0cc..d141652 100644
|
||||||
--- a/inn.te
|
--- a/inn.te
|
||||||
+++ b/inn.te
|
+++ b/inn.te
|
||||||
@@ -15,6 +15,9 @@ files_config_file(innd_etc_t)
|
@@ -15,6 +15,9 @@ files_config_file(innd_etc_t)
|
||||||
@ -36144,7 +36154,7 @@ index d39f0cc..889dfd5 100644
|
|||||||
-setattr_files_pattern(innd_t, innd_log_t, innd_log_t)
|
-setattr_files_pattern(innd_t, innd_log_t, innd_log_t)
|
||||||
+manage_files_pattern(innd_t, innd_log_t, innd_log_t)
|
+manage_files_pattern(innd_t, innd_log_t, innd_log_t)
|
||||||
+manage_dirs_pattern(innd_t, innd_log_t, innd_log_t)
|
+manage_dirs_pattern(innd_t, innd_log_t, innd_log_t)
|
||||||
+logging_log_filetrans(innd_t, innd_var_run_t, { dir file })
|
+logging_log_filetrans(innd_t, innd_log_t, { dir file })
|
||||||
|
|
||||||
manage_dirs_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
|
manage_dirs_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
|
||||||
manage_files_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
|
manage_files_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 136%{?dist}
|
Release: 137%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -602,6 +602,10 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Jul 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-137
|
||||||
|
- inn daemon should create innd_log_t objects in var_log_t instead of innd_var_run_t
|
||||||
|
- Fix rule definitions for httpd_can_sendmail boolean. We need to distinguish between base and contrib.
|
||||||
|
|
||||||
* Tue Jul 14 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-136
|
* Tue Jul 14 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-136
|
||||||
- Add samba_unconfined_script_exec_t to samba_admin header.
|
- Add samba_unconfined_script_exec_t to samba_admin header.
|
||||||
- Add jabberd_lock_t label to jabberd_admin header.
|
- Add jabberd_lock_t label to jabberd_admin header.
|
||||||
|
Loading…
Reference in New Issue
Block a user