Allow hugetlbfs_t to be on device_t file system
Allow sudo domains to signal user domains Dontaudit xdm_t sending signals to all domains Fix allow_exec* boolean descriptions
This commit is contained in:
parent
e81afdf5c9
commit
1a82786cc8
@ -13,21 +13,21 @@ gen_tunable(allow_execheap,false)
|
|||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")
|
## Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
gen_tunable(allow_execmem,false)
|
gen_tunable(allow_execmem,false)
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")
|
## Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
gen_tunable(allow_execmod,false)
|
gen_tunable(allow_execmod,false)
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")
|
## Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
gen_tunable(allow_execstack,false)
|
gen_tunable(allow_execstack,false)
|
||||||
|
@ -140,6 +140,7 @@ template(`sudo_role_template',`
|
|||||||
userdom_manage_user_tmp_files($1_sudo_t)
|
userdom_manage_user_tmp_files($1_sudo_t)
|
||||||
userdom_manage_user_tmp_symlinks($1_sudo_t)
|
userdom_manage_user_tmp_symlinks($1_sudo_t)
|
||||||
userdom_use_user_terminals($1_sudo_t)
|
userdom_use_user_terminals($1_sudo_t)
|
||||||
|
userdom_signal_unpriv_users($1_sudo_t)
|
||||||
# for some PAM modules and for cwd
|
# for some PAM modules and for cwd
|
||||||
userdom_search_user_home_content($1_sudo_t)
|
userdom_search_user_home_content($1_sudo_t)
|
||||||
userdom_search_admin_dir($1_sudo_t)
|
userdom_search_admin_dir($1_sudo_t)
|
||||||
|
@ -472,6 +472,25 @@ interface(`domain_signal_all_domains',`
|
|||||||
allow $1 domain:process signal;
|
allow $1 domain:process signal;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Dontaudit sending general signals to all domains.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain to not audit.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
## <rolecap/>
|
||||||
|
#
|
||||||
|
interface(`domain_dontaudit_signal_all_domains',`
|
||||||
|
gen_require(`
|
||||||
|
attribute domain;
|
||||||
|
')
|
||||||
|
|
||||||
|
dontaudit $1 domain:process signal;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send a null signal to all domains.
|
## Send a null signal to all domains.
|
||||||
|
@ -102,7 +102,7 @@ type hugetlbfs_t;
|
|||||||
fs_type(hugetlbfs_t)
|
fs_type(hugetlbfs_t)
|
||||||
files_mountpoint(hugetlbfs_t)
|
files_mountpoint(hugetlbfs_t)
|
||||||
fs_use_trans hugetlbfs gen_context(system_u:object_r:hugetlbfs_t,s0);
|
fs_use_trans hugetlbfs gen_context(system_u:object_r:hugetlbfs_t,s0);
|
||||||
dev_associate_sysfs(hugetlbfs_t)
|
dev_associate(hugetlbfs_t)
|
||||||
|
|
||||||
type ibmasmfs_t;
|
type ibmasmfs_t;
|
||||||
fs_type(ibmasmfs_t)
|
fs_type(ibmasmfs_t)
|
||||||
|
@ -576,6 +576,7 @@ domain_use_interactive_fds(xdm_t)
|
|||||||
# Do not audit denied probes of /proc.
|
# Do not audit denied probes of /proc.
|
||||||
domain_dontaudit_read_all_domains_state(xdm_t)
|
domain_dontaudit_read_all_domains_state(xdm_t)
|
||||||
domain_dontaudit_ptrace_all_domains(xdm_t)
|
domain_dontaudit_ptrace_all_domains(xdm_t)
|
||||||
|
domain_dontaudit_signal_all_domains(xdm_t)
|
||||||
|
|
||||||
files_read_etc_files(xdm_t)
|
files_read_etc_files(xdm_t)
|
||||||
files_read_var_files(xdm_t)
|
files_read_var_files(xdm_t)
|
||||||
|
Loading…
Reference in New Issue
Block a user