confine ldconfig in targeted, from dan
This commit is contained in:
parent
ebc1e8be97
commit
19b2dee3cc
@ -1,3 +1,4 @@
|
|||||||
|
- Patch to confine ldconfig in the targeted policy from Dan Walsh.
|
||||||
- Man page updates from Dan Walsh.
|
- Man page updates from Dan Walsh.
|
||||||
- Two patches from Paul Moore to for ipsec to remove redundant rules and
|
- Two patches from Paul Moore to for ipsec to remove redundant rules and
|
||||||
have setkey read the config file.
|
have setkey read the config file.
|
||||||
|
@ -203,12 +203,6 @@ ifdef(`distro_redhat',`
|
|||||||
/usr/lib(64)?/.*/program/libsoffice\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/.*/program/libsoffice\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/(.*/)?pcsc/drivers(/.*)?/lib(cm2020|cm4000|SCR24x)\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?pcsc/drivers(/.*)?/lib(cm2020|cm4000|SCR24x)\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
|
||||||
/usr/lib(64)?/firefox.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
|
||||||
/usr/lib(64)?/mozilla.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
|
||||||
/usr/lib(64)?/seamonkey.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
|
||||||
/usr/lib(64)?/sunbird.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
|
||||||
/usr/lib(64)?/thunderbird.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
|
||||||
|
|
||||||
# Fedora Extras packages: ladspa, imlib2, ocaml
|
# Fedora Extras packages: ladspa, imlib2, ocaml
|
||||||
/usr/lib(64)?/ladspa/analogue_osc_1416\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/ladspa/analogue_osc_1416\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/ladspa/bandpass_a_iir_1893\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/ladspa/bandpass_a_iir_1893\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(libraries,1.5.3)
|
policy_module(libraries,1.5.4)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -18,6 +18,14 @@ files_type(ld_so_cache_t)
|
|||||||
type ld_so_t;
|
type ld_so_t;
|
||||||
files_type(ld_so_t)
|
files_type(ld_so_t)
|
||||||
|
|
||||||
|
type ldconfig_t;
|
||||||
|
type ldconfig_exec_t;
|
||||||
|
init_system_domain(ldconfig_t,ldconfig_exec_t)
|
||||||
|
role system_r types ldconfig_t;
|
||||||
|
|
||||||
|
type ldconfig_tmp_t;
|
||||||
|
files_tmp_file(ldconfig_tmp_t)
|
||||||
|
|
||||||
#
|
#
|
||||||
# lib_t is the type of files in the system lib directories.
|
# lib_t is the type of files in the system lib directories.
|
||||||
#
|
#
|
||||||
@ -46,14 +54,16 @@ files_type(textrel_shlib_t)
|
|||||||
#
|
#
|
||||||
# ldconfig local policy
|
# ldconfig local policy
|
||||||
#
|
#
|
||||||
type ldconfig_t;
|
|
||||||
type ldconfig_exec_t;
|
allow ldconfig_t self:capability sys_chroot;
|
||||||
init_system_domain(ldconfig_t,ldconfig_exec_t)
|
|
||||||
role system_r types ldconfig_t;
|
|
||||||
|
|
||||||
allow ldconfig_t ld_so_cache_t:file manage_file_perms;
|
allow ldconfig_t ld_so_cache_t:file manage_file_perms;
|
||||||
files_etc_filetrans(ldconfig_t,ld_so_cache_t,file)
|
files_etc_filetrans(ldconfig_t,ld_so_cache_t,file)
|
||||||
|
|
||||||
|
manage_dirs_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t)
|
||||||
|
manage_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t)
|
||||||
|
files_tmp_filetrans(ldconfig_t, ldconfig_tmp_t, { file dir })
|
||||||
|
|
||||||
manage_lnk_files_pattern(ldconfig_t,lib_t,lib_t)
|
manage_lnk_files_pattern(ldconfig_t,lib_t,lib_t)
|
||||||
|
|
||||||
kernel_read_system_state(ldconfig_t)
|
kernel_read_system_state(ldconfig_t)
|
||||||
@ -74,6 +84,8 @@ init_use_script_ptys(ldconfig_t)
|
|||||||
libs_use_ld_so(ldconfig_t)
|
libs_use_ld_so(ldconfig_t)
|
||||||
libs_use_shared_libs(ldconfig_t)
|
libs_use_shared_libs(ldconfig_t)
|
||||||
|
|
||||||
|
miscfiles_read_localization(ldconfig_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(ldconfig_t)
|
logging_send_syslog_msg(ldconfig_t)
|
||||||
|
|
||||||
userdom_use_all_users_fds(ldconfig_t)
|
userdom_use_all_users_fds(ldconfig_t)
|
||||||
@ -86,7 +98,9 @@ ifdef(`hide_broken_symptoms',`
|
|||||||
|
|
||||||
ifdef(`targeted_policy',`
|
ifdef(`targeted_policy',`
|
||||||
allow ldconfig_t lib_t:file read_file_perms;
|
allow ldconfig_t lib_t:file read_file_perms;
|
||||||
unconfined_domain(ldconfig_t)
|
files_read_generic_tmp_symlinks(ldconfig_t)
|
||||||
|
term_dontaudit_use_generic_ptys(ldconfig_t)
|
||||||
|
term_dontaudit_use_unallocated_ttys(ldconfig_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
Loading…
Reference in New Issue
Block a user