* Fri Feb 28 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-29

- Make docker as permissive domain
This commit is contained in:
Miroslav Grepl 2014-02-28 12:34:15 +01:00
parent 4aa43e264a
commit 18bb7ec6a3
2 changed files with 17 additions and 10 deletions

View File

@ -18132,7 +18132,7 @@ index 3023be7..20e370b 100644
+ corecmd_bin_filetrans($1, cupsd_rw_etc_t, dir, "inf")
')
diff --git a/cups.te b/cups.te
index c91813c..3598e62 100644
index c91813c..2230476 100644
--- a/cups.te
+++ b/cups.te
@@ -5,19 +5,24 @@ policy_module(cups, 1.16.2)
@ -18265,7 +18265,7 @@ index c91813c..3598e62 100644
#
-allow cupsd_t self:capability { ipc_lock sys_admin dac_override dac_read_search kill setgid setuid fsetid fowner chown dac_override sys_rawio sys_resource sys_tty_config };
+allow cupsd_t self:capability { ipc_lock sys_admin dac_override dac_read_search kill fsetid fowner chown dac_override sys_rawio sys_resource sys_tty_config };
+allow cupsd_t self:capability { ipc_lock sys_admin dac_override dac_read_search kill fsetid fowner chown dac_override sys_resource sys_tty_config };
dontaudit cupsd_t self:capability { sys_tty_config net_admin };
allow cupsd_t self:capability2 block_suspend;
-allow cupsd_t self:process { getpgid setpgid setsched signal_perms };
@ -26403,7 +26403,7 @@ index 5010f04..3b73741 100644
optional_policy(`
diff --git a/fprintd.te b/fprintd.te
index 92a6479..064f58e 100644
index 92a6479..e37a473 100644
--- a/fprintd.te
+++ b/fprintd.te
@@ -20,6 +20,8 @@ files_type(fprintd_var_lib_t)
@ -26433,7 +26433,7 @@ index 92a6479..064f58e 100644
userdom_use_user_ptys(fprintd_t)
userdom_read_all_users_state(fprintd_t)
@@ -54,8 +55,13 @@ optional_policy(`
@@ -54,8 +55,17 @@ optional_policy(`
')
')
@ -26446,6 +26446,10 @@ index 92a6479..064f58e 100644
+')
+
+optional_policy(`
+ udev_read_db(fprintd_t)
+')
+
+optional_policy(`
+ xserver_read_state_xdm(fprintd_t)
')
diff --git a/freeipmi.fc b/freeipmi.fc
@ -51881,7 +51885,7 @@ index ba64485..429bd79 100644
+
+/usr/lib/systemd/system/nscd\.service -- gen_context(system_u:object_r:nscd_unit_file_t,s0)
diff --git a/nscd.if b/nscd.if
index 8f2ab09..6ab4ea1 100644
index 8f2ab09..bc2c7fe 100644
--- a/nscd.if
+++ b/nscd.if
@@ -1,8 +1,8 @@
@ -52037,7 +52041,7 @@ index 8f2ab09..6ab4ea1 100644
+interface(`nscd_shm_use',`
+ gen_require(`
+ type nscd_t, nscd_var_run_t;
+ class nscd { getpwd getgrp gethost shmempwd shmemgrp shmemhost };
+ class nscd { getserv getpwd getgrp gethost shmempwd shmemgrp shmemhost shmemserv };
')
+
+ allow $1 nscd_var_run_t:dir list_dir_perms;
@ -58881,7 +58885,7 @@ index 0000000..9b8cb6b
+/var/run/pmcd\.socket -- gen_context(system_u:object_r:pcp_var_run_t,s0)
diff --git a/pcp.if b/pcp.if
new file mode 100644
index 0000000..ba24b40
index 0000000..d9296b1
--- /dev/null
+++ b/pcp.if
@@ -0,0 +1,139 @@
@ -58926,7 +58930,7 @@ index 0000000..ba24b40
+ gen_require(`
+ type pcp_var_lib_t;
+ ')
+ libs_search_lib($1)
+ files_search_var_lib($1)
+ read_files_pattern($1,pcp_var_lib_t,pcp_var_lib_t)
+')
+
@ -105702,7 +105706,7 @@ index 0000000..ceaa219
+/var/spool/zoneminder-upload(/.*)? gen_context(system_u:object_r:zoneminder_spool_t,s0)
diff --git a/zoneminder.if b/zoneminder.if
new file mode 100644
index 0000000..e0604c7
index 0000000..fb0519e
--- /dev/null
+++ b/zoneminder.if
@@ -0,0 +1,374 @@
@ -105915,7 +105919,7 @@ index 0000000..e0604c7
+#
+interface(`zoneminder_manage_lib_sock_files',`
+ gen_require(`
+ type zoneminder_sock_var_lib_t;
+ type zoneminder_var_lib_t;
+ ')
+ files_search_var_lib($1)
+ manage_sock_files_pattern($1, zoneminder_var_lib_t, zoneminder_var_lib_t)

View File

@ -580,6 +580,9 @@ SELinux Reference policy mls base module.
%endif
%changelog
* Fri Feb 28 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-29
- Make docker as permissive domain
* Thu Feb 27 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-28
- Allow bumblebeed to send signal to insmod
- Dontaudit attempts by crond_t net_admin caused by journald