* Wed Feb 04 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-108

- Fix labels, improve sysnet_manage_config interface.
- Label /var/run/NetworkManager/resolv.conf.tmp as net_conf_t.
- Dontaudit network connections related to thumb_t. BZ(1187981)
- Remove sysnet_filetrans_named_content from fail2ban
This commit is contained in:
Lukas Vrabec 2015-02-04 13:06:40 +01:00
parent 1808b757f1
commit 203031a6db
3 changed files with 134 additions and 108 deletions

View File

@ -25701,10 +25701,10 @@ index 6bf0ecc..b036584 100644
+') +')
+ +
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 8b40377..635442b 100644 index 8b40377..5a2c173 100644
--- a/policy/modules/services/xserver.te --- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te +++ b/policy/modules/services/xserver.te
@@ -26,28 +26,59 @@ gen_require(` @@ -26,28 +26,66 @@ gen_require(`
# #
## <desc> ## <desc>
@ -25754,6 +25754,13 @@ index 8b40377..635442b 100644
+ +
+## <desc> +## <desc>
+## <p> +## <p>
+## Allows xdm_t to bind on vnc_port_t(5910)
+## </p>
+## </desc>
+gen_tunable(xdm_bind_vnc_tcp_port, false)
+
+## <desc>
+## <p>
+## Support X userspace object manager +## Support X userspace object manager
+## </p> +## </p>
## </desc> ## </desc>
@ -25773,7 +25780,7 @@ index 8b40377..635442b 100644
# X Events # X Events
attribute xevent_type; attribute xevent_type;
@@ -107,44 +138,54 @@ xserver_object_types_template(remote) @@ -107,44 +145,54 @@ xserver_object_types_template(remote)
xserver_common_x_domain_template(remote, remote_t) xserver_common_x_domain_template(remote, remote_t)
type user_fonts_t; type user_fonts_t;
@ -25829,7 +25836,7 @@ index 8b40377..635442b 100644
typealias xauth_tmp_t alias { auditadm_xauth_tmp_t secadm_xauth_tmp_t }; typealias xauth_tmp_t alias { auditadm_xauth_tmp_t secadm_xauth_tmp_t };
userdom_user_tmp_file(xauth_tmp_t) userdom_user_tmp_file(xauth_tmp_t)
@@ -155,19 +196,28 @@ dev_associate(xconsole_device_t) @@ -155,19 +203,28 @@ dev_associate(xconsole_device_t)
fs_associate_tmpfs(xconsole_device_t) fs_associate_tmpfs(xconsole_device_t)
files_associate_tmp(xconsole_device_t) files_associate_tmp(xconsole_device_t)
@ -25861,7 +25868,7 @@ index 8b40377..635442b 100644
type xdm_var_lib_t; type xdm_var_lib_t;
files_type(xdm_var_lib_t) files_type(xdm_var_lib_t)
@@ -175,13 +225,21 @@ files_type(xdm_var_lib_t) @@ -175,13 +232,21 @@ files_type(xdm_var_lib_t)
type xdm_var_run_t; type xdm_var_run_t;
files_pid_file(xdm_var_run_t) files_pid_file(xdm_var_run_t)
@ -25886,7 +25893,7 @@ index 8b40377..635442b 100644
# type for /var/lib/xkb # type for /var/lib/xkb
type xkb_var_lib_t; type xkb_var_lib_t;
files_type(xkb_var_lib_t) files_type(xkb_var_lib_t)
@@ -194,15 +252,13 @@ typealias xserver_t alias { auditadm_xserver_t secadm_xserver_t xdm_xserver_t }; @@ -194,15 +259,13 @@ typealias xserver_t alias { auditadm_xserver_t secadm_xserver_t xdm_xserver_t };
init_system_domain(xserver_t, xserver_exec_t) init_system_domain(xserver_t, xserver_exec_t)
ubac_constrained(xserver_t) ubac_constrained(xserver_t)
@ -25907,7 +25914,7 @@ index 8b40377..635442b 100644
type xsession_exec_t; type xsession_exec_t;
corecmd_executable_file(xsession_exec_t) corecmd_executable_file(xsession_exec_t)
@@ -226,21 +282,35 @@ optional_policy(` @@ -226,21 +289,35 @@ optional_policy(`
# #
allow iceauth_t iceauth_home_t:file manage_file_perms; allow iceauth_t iceauth_home_t:file manage_file_perms;
@ -25950,7 +25957,7 @@ index 8b40377..635442b 100644
') ')
######################################## ########################################
@@ -248,48 +318,91 @@ tunable_policy(`use_samba_home_dirs',` @@ -248,48 +325,91 @@ tunable_policy(`use_samba_home_dirs',`
# Xauth local policy # Xauth local policy
# #
@ -26042,18 +26049,18 @@ index 8b40377..635442b 100644
+ifdef(`hide_broken_symptoms',` +ifdef(`hide_broken_symptoms',`
+ term_dontaudit_use_unallocated_ttys(xauth_t) + term_dontaudit_use_unallocated_ttys(xauth_t)
+ dev_dontaudit_rw_dri(xauth_t) + dev_dontaudit_rw_dri(xauth_t)
+')
+
+optional_policy(`
+ nx_var_lib_filetrans(xauth_t, xauth_home_t, file)
') ')
optional_policy(` optional_policy(`
+ nx_var_lib_filetrans(xauth_t, xauth_home_t, file)
+')
+
+optional_policy(`
+ ssh_use_ptys(xauth_t) + ssh_use_ptys(xauth_t)
ssh_sigchld(xauth_t) ssh_sigchld(xauth_t)
ssh_read_pipes(xauth_t) ssh_read_pipes(xauth_t)
ssh_dontaudit_rw_tcp_sockets(xauth_t) ssh_dontaudit_rw_tcp_sockets(xauth_t)
@@ -300,64 +413,103 @@ optional_policy(` @@ -300,64 +420,103 @@ optional_policy(`
# XDM Local policy # XDM Local policy
# #
@ -26081,14 +26088,14 @@ index 8b40377..635442b 100644
allow xdm_t self:appletalk_socket create_socket_perms; allow xdm_t self:appletalk_socket create_socket_perms;
allow xdm_t self:key { search link write }; allow xdm_t self:key { search link write };
+allow xdm_t self:dbus { send_msg acquire_svc }; +allow xdm_t self:dbus { send_msg acquire_svc };
+
-allow xdm_t xconsole_device_t:fifo_file { getattr setattr };
+allow xdm_t xauth_home_t:file manage_file_perms; +allow xdm_t xauth_home_t:file manage_file_perms;
+ +
+allow xdm_t xconsole_device_t:fifo_file { getattr_fifo_file_perms setattr_fifo_file_perms }; +allow xdm_t xconsole_device_t:fifo_file { getattr_fifo_file_perms setattr_fifo_file_perms };
+manage_dirs_pattern(xdm_t, xkb_var_lib_t, xkb_var_lib_t) +manage_dirs_pattern(xdm_t, xkb_var_lib_t, xkb_var_lib_t)
+manage_files_pattern(xdm_t, xkb_var_lib_t, xkb_var_lib_t) +manage_files_pattern(xdm_t, xkb_var_lib_t, xkb_var_lib_t)
+
-allow xdm_t xconsole_device_t:fifo_file { getattr setattr };
+manage_dirs_pattern(xdm_t, xdm_home_t, xdm_home_t) +manage_dirs_pattern(xdm_t, xdm_home_t, xdm_home_t)
+manage_files_pattern(xdm_t, xdm_home_t, xdm_home_t) +manage_files_pattern(xdm_t, xdm_home_t, xdm_home_t)
+xserver_filetrans_home_content(xdm_t) +xserver_filetrans_home_content(xdm_t)
@ -26170,7 +26177,7 @@ index 8b40377..635442b 100644
# connect to xdm xserver over stream socket # connect to xdm xserver over stream socket
stream_connect_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t, xserver_t) stream_connect_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t, xserver_t)
@@ -366,20 +518,30 @@ stream_connect_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t, xserver_t) @@ -366,20 +525,30 @@ stream_connect_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t, xserver_t)
delete_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t) delete_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t)
delete_sock_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t) delete_sock_files_pattern(xdm_t, xserver_tmp_t, xserver_tmp_t)
@ -26203,7 +26210,7 @@ index 8b40377..635442b 100644
corenet_all_recvfrom_netlabel(xdm_t) corenet_all_recvfrom_netlabel(xdm_t)
corenet_tcp_sendrecv_generic_if(xdm_t) corenet_tcp_sendrecv_generic_if(xdm_t)
corenet_udp_sendrecv_generic_if(xdm_t) corenet_udp_sendrecv_generic_if(xdm_t)
@@ -389,38 +551,49 @@ corenet_tcp_sendrecv_all_ports(xdm_t) @@ -389,38 +558,49 @@ corenet_tcp_sendrecv_all_ports(xdm_t)
corenet_udp_sendrecv_all_ports(xdm_t) corenet_udp_sendrecv_all_ports(xdm_t)
corenet_tcp_bind_generic_node(xdm_t) corenet_tcp_bind_generic_node(xdm_t)
corenet_udp_bind_generic_node(xdm_t) corenet_udp_bind_generic_node(xdm_t)
@ -26257,7 +26264,7 @@ index 8b40377..635442b 100644
files_read_etc_files(xdm_t) files_read_etc_files(xdm_t)
files_read_var_files(xdm_t) files_read_var_files(xdm_t)
@@ -431,9 +604,28 @@ files_list_mnt(xdm_t) @@ -431,9 +611,28 @@ files_list_mnt(xdm_t)
files_read_usr_files(xdm_t) files_read_usr_files(xdm_t)
# Poweroff wants to create the /poweroff file when run from xdm # Poweroff wants to create the /poweroff file when run from xdm
files_create_boot_flag(xdm_t) files_create_boot_flag(xdm_t)
@ -26286,7 +26293,7 @@ index 8b40377..635442b 100644
storage_dontaudit_read_fixed_disk(xdm_t) storage_dontaudit_read_fixed_disk(xdm_t)
storage_dontaudit_write_fixed_disk(xdm_t) storage_dontaudit_write_fixed_disk(xdm_t)
@@ -442,28 +634,45 @@ storage_dontaudit_raw_read_removable_device(xdm_t) @@ -442,28 +641,45 @@ storage_dontaudit_raw_read_removable_device(xdm_t)
storage_dontaudit_raw_write_removable_device(xdm_t) storage_dontaudit_raw_write_removable_device(xdm_t)
storage_dontaudit_setattr_removable_dev(xdm_t) storage_dontaudit_setattr_removable_dev(xdm_t)
storage_dontaudit_rw_scsi_generic(xdm_t) storage_dontaudit_rw_scsi_generic(xdm_t)
@ -26335,7 +26342,7 @@ index 8b40377..635442b 100644
userdom_dontaudit_use_unpriv_user_fds(xdm_t) userdom_dontaudit_use_unpriv_user_fds(xdm_t)
userdom_create_all_users_keys(xdm_t) userdom_create_all_users_keys(xdm_t)
@@ -472,24 +681,155 @@ userdom_read_user_home_content_files(xdm_t) @@ -472,24 +688,155 @@ userdom_read_user_home_content_files(xdm_t)
# Search /proc for any user domain processes. # Search /proc for any user domain processes.
userdom_read_all_users_state(xdm_t) userdom_read_all_users_state(xdm_t)
userdom_signal_all_users(xdm_t) userdom_signal_all_users(xdm_t)
@ -26497,10 +26504,15 @@ index 8b40377..635442b 100644
tunable_policy(`xdm_sysadm_login',` tunable_policy(`xdm_sysadm_login',`
userdom_xsession_spec_domtrans_all_users(xdm_t) userdom_xsession_spec_domtrans_all_users(xdm_t)
# FIXME: # FIXME:
@@ -503,11 +843,26 @@ tunable_policy(`xdm_sysadm_login',` @@ -502,12 +849,31 @@ tunable_policy(`xdm_sysadm_login',`
# allow xserver_t xdm_tmpfs_t:file rw_file_perms;
') ')
optional_policy(` +tunable_policy(`xdm_bind_vnc_tcp_port',`
+ corenet_tcp_bind_vnc_port(xdm_t)
+')
+
+optional_policy(`
+ accountsd_read_lib_files(xdm_t) + accountsd_read_lib_files(xdm_t)
+ accountsd_dbus_chat(xdm_t) + accountsd_dbus_chat(xdm_t)
+') +')
@ -26513,7 +26525,7 @@ index 8b40377..635442b 100644
+ boinc_dontaudit_getattr_lib(xdm_t) + boinc_dontaudit_getattr_lib(xdm_t)
+') +')
+ +
+optional_policy(` optional_policy(`
alsa_domtrans(xdm_t) alsa_domtrans(xdm_t)
+ alsa_read_rw_config(xdm_t) + alsa_read_rw_config(xdm_t)
') ')
@ -26524,7 +26536,7 @@ index 8b40377..635442b 100644
') ')
optional_policy(` optional_policy(`
@@ -517,9 +872,34 @@ optional_policy(` @@ -517,9 +883,34 @@ optional_policy(`
optional_policy(` optional_policy(`
dbus_system_bus_client(xdm_t) dbus_system_bus_client(xdm_t)
dbus_connect_system_bus(xdm_t) dbus_connect_system_bus(xdm_t)
@ -26560,7 +26572,7 @@ index 8b40377..635442b 100644
') ')
') ')
@@ -530,6 +910,20 @@ optional_policy(` @@ -530,6 +921,20 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -26581,7 +26593,7 @@ index 8b40377..635442b 100644
hostname_exec(xdm_t) hostname_exec(xdm_t)
') ')
@@ -547,28 +941,78 @@ optional_policy(` @@ -547,28 +952,78 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -26669,7 +26681,7 @@ index 8b40377..635442b 100644
') ')
optional_policy(` optional_policy(`
@@ -580,6 +1024,14 @@ optional_policy(` @@ -580,6 +1035,14 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -26684,7 +26696,7 @@ index 8b40377..635442b 100644
xfs_stream_connect(xdm_t) xfs_stream_connect(xdm_t)
') ')
@@ -594,7 +1046,7 @@ type_transition xserver_t xserver_t:x_colormap root_xcolormap_t; @@ -594,7 +1057,7 @@ type_transition xserver_t xserver_t:x_colormap root_xcolormap_t;
type_transition root_xdrawable_t input_xevent_t:x_event root_input_xevent_t; type_transition root_xdrawable_t input_xevent_t:x_event root_input_xevent_t;
allow xserver_t { root_xdrawable_t x_domain }:x_drawable send; allow xserver_t { root_xdrawable_t x_domain }:x_drawable send;
@ -26693,7 +26705,7 @@ index 8b40377..635442b 100644
# setuid/setgid for the wrapper program to change UID # setuid/setgid for the wrapper program to change UID
# sys_rawio is for iopl access - should not be needed for frame-buffer # sys_rawio is for iopl access - should not be needed for frame-buffer
@@ -604,8 +1056,11 @@ allow xserver_t input_xevent_t:x_event send; @@ -604,8 +1067,11 @@ allow xserver_t input_xevent_t:x_event send;
# execheap needed until the X module loader is fixed. # execheap needed until the X module loader is fixed.
# NVIDIA Needs execstack # NVIDIA Needs execstack
@ -26706,7 +26718,7 @@ index 8b40377..635442b 100644
allow xserver_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap }; allow xserver_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
allow xserver_t self:fd use; allow xserver_t self:fd use;
allow xserver_t self:fifo_file rw_fifo_file_perms; allow xserver_t self:fifo_file rw_fifo_file_perms;
@@ -618,8 +1073,15 @@ allow xserver_t self:unix_dgram_socket { create_socket_perms sendto }; @@ -618,8 +1084,15 @@ allow xserver_t self:unix_dgram_socket { create_socket_perms sendto };
allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow xserver_t self:tcp_socket create_stream_socket_perms; allow xserver_t self:tcp_socket create_stream_socket_perms;
allow xserver_t self:udp_socket create_socket_perms; allow xserver_t self:udp_socket create_socket_perms;
@ -26722,7 +26734,7 @@ index 8b40377..635442b 100644
manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t)
manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t)
manage_sock_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) manage_sock_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t)
@@ -627,6 +1089,10 @@ files_tmp_filetrans(xserver_t, xserver_tmp_t, { file dir sock_file }) @@ -627,6 +1100,10 @@ files_tmp_filetrans(xserver_t, xserver_tmp_t, { file dir sock_file })
filetrans_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t, sock_file) filetrans_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t, sock_file)
@ -26733,7 +26745,7 @@ index 8b40377..635442b 100644
manage_dirs_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t) manage_dirs_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
manage_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t) manage_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
manage_lnk_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t) manage_lnk_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
@@ -638,25 +1104,32 @@ manage_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t) @@ -638,25 +1115,32 @@ manage_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
manage_lnk_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t) manage_lnk_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
files_search_var_lib(xserver_t) files_search_var_lib(xserver_t)
@ -26770,7 +26782,7 @@ index 8b40377..635442b 100644
corenet_all_recvfrom_netlabel(xserver_t) corenet_all_recvfrom_netlabel(xserver_t)
corenet_tcp_sendrecv_generic_if(xserver_t) corenet_tcp_sendrecv_generic_if(xserver_t)
corenet_udp_sendrecv_generic_if(xserver_t) corenet_udp_sendrecv_generic_if(xserver_t)
@@ -677,23 +1150,28 @@ dev_rw_apm_bios(xserver_t) @@ -677,23 +1161,28 @@ dev_rw_apm_bios(xserver_t)
dev_rw_agp(xserver_t) dev_rw_agp(xserver_t)
dev_rw_framebuffer(xserver_t) dev_rw_framebuffer(xserver_t)
dev_manage_dri_dev(xserver_t) dev_manage_dri_dev(xserver_t)
@ -26802,7 +26814,7 @@ index 8b40377..635442b 100644
# brought on by rhgb # brought on by rhgb
files_search_mnt(xserver_t) files_search_mnt(xserver_t)
@@ -705,6 +1183,14 @@ fs_search_nfs(xserver_t) @@ -705,6 +1194,14 @@ fs_search_nfs(xserver_t)
fs_search_auto_mountpoints(xserver_t) fs_search_auto_mountpoints(xserver_t)
fs_search_ramfs(xserver_t) fs_search_ramfs(xserver_t)
@ -26817,7 +26829,7 @@ index 8b40377..635442b 100644
mls_xwin_read_to_clearance(xserver_t) mls_xwin_read_to_clearance(xserver_t)
selinux_validate_context(xserver_t) selinux_validate_context(xserver_t)
@@ -718,20 +1204,18 @@ init_getpgid(xserver_t) @@ -718,20 +1215,18 @@ init_getpgid(xserver_t)
term_setattr_unallocated_ttys(xserver_t) term_setattr_unallocated_ttys(xserver_t)
term_use_unallocated_ttys(xserver_t) term_use_unallocated_ttys(xserver_t)
@ -26841,7 +26853,7 @@ index 8b40377..635442b 100644
userdom_search_user_home_dirs(xserver_t) userdom_search_user_home_dirs(xserver_t)
userdom_use_user_ttys(xserver_t) userdom_use_user_ttys(xserver_t)
@@ -739,8 +1223,6 @@ userdom_setattr_user_ttys(xserver_t) @@ -739,8 +1234,6 @@ userdom_setattr_user_ttys(xserver_t)
userdom_read_user_tmp_files(xserver_t) userdom_read_user_tmp_files(xserver_t)
userdom_rw_user_tmpfs_files(xserver_t) userdom_rw_user_tmpfs_files(xserver_t)
@ -26850,7 +26862,7 @@ index 8b40377..635442b 100644
ifndef(`distro_redhat',` ifndef(`distro_redhat',`
allow xserver_t self:process { execmem execheap execstack }; allow xserver_t self:process { execmem execheap execstack };
domain_mmap_low_uncond(xserver_t) domain_mmap_low_uncond(xserver_t)
@@ -785,17 +1267,50 @@ optional_policy(` @@ -785,17 +1278,50 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -26903,7 +26915,7 @@ index 8b40377..635442b 100644
') ')
optional_policy(` optional_policy(`
@@ -803,6 +1318,10 @@ optional_policy(` @@ -803,6 +1329,10 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -26914,7 +26926,7 @@ index 8b40377..635442b 100644
xfs_stream_connect(xserver_t) xfs_stream_connect(xserver_t)
') ')
@@ -818,18 +1337,17 @@ allow xserver_t xdm_t:shm rw_shm_perms; @@ -818,18 +1348,17 @@ allow xserver_t xdm_t:shm rw_shm_perms;
# NB we do NOT allow xserver_t xdm_var_lib_t:dir, only access to an open # NB we do NOT allow xserver_t xdm_var_lib_t:dir, only access to an open
# handle of a file inside the dir!!! # handle of a file inside the dir!!!
@ -26939,7 +26951,7 @@ index 8b40377..635442b 100644
can_exec(xserver_t, xkb_var_lib_t) can_exec(xserver_t, xkb_var_lib_t)
# VNC v4 module in X server # VNC v4 module in X server
@@ -842,26 +1360,21 @@ init_use_fds(xserver_t) @@ -842,26 +1371,21 @@ init_use_fds(xserver_t)
# to read ROLE_home_t - examine this in more detail # to read ROLE_home_t - examine this in more detail
# (xauth?) # (xauth?)
userdom_read_user_home_content_files(xserver_t) userdom_read_user_home_content_files(xserver_t)
@ -26974,7 +26986,7 @@ index 8b40377..635442b 100644
') ')
optional_policy(` optional_policy(`
@@ -912,7 +1425,7 @@ allow x_domain xproperty_t:x_property { getattr create read write append destroy @@ -912,7 +1436,7 @@ allow x_domain xproperty_t:x_property { getattr create read write append destroy
allow x_domain root_xdrawable_t:x_drawable { getattr setattr list_child add_child remove_child send receive hide show }; allow x_domain root_xdrawable_t:x_drawable { getattr setattr list_child add_child remove_child send receive hide show };
# operations allowed on my windows # operations allowed on my windows
allow x_domain self:x_drawable { create destroy getattr setattr read write show hide list_child add_child remove_child manage send receive }; allow x_domain self:x_drawable { create destroy getattr setattr read write show hide list_child add_child remove_child manage send receive };
@ -26983,7 +26995,7 @@ index 8b40377..635442b 100644
# operations allowed on all windows # operations allowed on all windows
allow x_domain x_domain:x_drawable { getattr get_property set_property remove_child }; allow x_domain x_domain:x_drawable { getattr get_property set_property remove_child };
@@ -966,11 +1479,31 @@ allow x_domain self:x_resource { read write }; @@ -966,11 +1490,31 @@ allow x_domain self:x_resource { read write };
# can mess with the screensaver # can mess with the screensaver
allow x_domain xserver_t:x_screen { getattr saver_getattr }; allow x_domain xserver_t:x_screen { getattr saver_getattr };
@ -27015,7 +27027,7 @@ index 8b40377..635442b 100644
tunable_policy(`! xserver_object_manager',` tunable_policy(`! xserver_object_manager',`
# should be xserver_unconfined(x_domain), # should be xserver_unconfined(x_domain),
# but typeattribute doesnt work in conditionals # but typeattribute doesnt work in conditionals
@@ -992,18 +1525,148 @@ tunable_policy(`! xserver_object_manager',` @@ -992,18 +1536,148 @@ tunable_policy(`! xserver_object_manager',`
allow x_domain xevent_type:{ x_event x_synthetic_event } *; allow x_domain xevent_type:{ x_event x_synthetic_event } *;
') ')
@ -30997,7 +31009,7 @@ index 79a45f6..b88e8a2 100644
+ init_pid_filetrans($1, systemd_unit_file_t, dir, "system") + init_pid_filetrans($1, systemd_unit_file_t, dir, "system")
+') +')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 17eda24..32af6e4 100644 index 17eda24..1381948 100644
--- a/policy/modules/system/init.te --- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te +++ b/policy/modules/system/init.te
@@ -11,10 +11,31 @@ gen_require(` @@ -11,10 +11,31 @@ gen_require(`
@ -31875,7 +31887,7 @@ index 17eda24..32af6e4 100644
+ sysnet_relabelfrom_dhcpc_state(initrc_t) + sysnet_relabelfrom_dhcpc_state(initrc_t)
+ sysnet_relabelfrom_net_conf(initrc_t) + sysnet_relabelfrom_net_conf(initrc_t)
+ sysnet_relabelto_net_conf(initrc_t) + sysnet_relabelto_net_conf(initrc_t)
+ sysnet_filetrans_named_content(initrc_t) + #sysnet_filetrans_named_content(initrc_t)
+ ') + ')
+ +
+ optional_policy(` + optional_policy(`
@ -39130,10 +39142,10 @@ index 1447687..d5e6fb9 100644
seutil_read_config(setrans_t) seutil_read_config(setrans_t)
diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
index 40edc18..bdc6d52 100644 index 40edc18..963b974 100644
--- a/policy/modules/system/sysnetwork.fc --- a/policy/modules/system/sysnetwork.fc
+++ b/policy/modules/system/sysnetwork.fc +++ b/policy/modules/system/sysnetwork.fc
@@ -17,23 +17,28 @@ ifdef(`distro_debian',` @@ -17,23 +17,27 @@ ifdef(`distro_debian',`
/etc/dhclient.*conf -- gen_context(system_u:object_r:dhcp_etc_t,s0) /etc/dhclient.*conf -- gen_context(system_u:object_r:dhcp_etc_t,s0)
/etc/dhclient-script -- gen_context(system_u:object_r:dhcp_etc_t,s0) /etc/dhclient-script -- gen_context(system_u:object_r:dhcp_etc_t,s0)
/etc/dhcpc.* gen_context(system_u:object_r:dhcp_etc_t,s0) /etc/dhcpc.* gen_context(system_u:object_r:dhcp_etc_t,s0)
@ -39146,10 +39158,10 @@ index 40edc18..bdc6d52 100644
+/etc/hosts[^/]* -- gen_context(system_u:object_r:net_conf_t,s0) +/etc/hosts[^/]* -- gen_context(system_u:object_r:net_conf_t,s0)
/etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0) /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0)
/etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0) /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0)
/etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) -/etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
+/etc/resolv\.conf.* gen_context(system_u:object_r:net_conf_t,s0)
/etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
+/etc/ntp\.conf -- gen_context(system_u:object_r:net_conf_t,s0) +/etc/ntp\.conf -- gen_context(system_u:object_r:net_conf_t,s0)
+/etc/\.resolv\.conf\.NetworkManager gen_context(system_u:object_r:net_conf_t,s0)
-/etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0) -/etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0)
+/etc/dhcp3?(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0) +/etc/dhcp3?(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0)
@ -39162,11 +39174,11 @@ index 40edc18..bdc6d52 100644
+/var/run/systemd/network(/.*)? gen_context(system_u:object_r:net_conf_t,s0) +/var/run/systemd/network(/.*)? gen_context(system_u:object_r:net_conf_t,s0)
+/var/run/systemd/resolve/resolv\.conf -- gen_context(system_u:object_r:net_conf_t,s0) +/var/run/systemd/resolve/resolv\.conf -- gen_context(system_u:object_r:net_conf_t,s0)
') ')
+/var/run/NetworkManager/resolve/resolv\.conf -- gen_context(system_u:object_r:net_conf_t,s0) +/var/run/NetworkManager/resolv\.conf -- gen_context(system_u:object_r:net_conf_t,s0)
# #
# /sbin # /sbin
@@ -44,6 +49,7 @@ ifdef(`distro_redhat',` @@ -44,6 +48,7 @@ ifdef(`distro_redhat',`
/sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
/sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
/sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
@ -39174,7 +39186,7 @@ index 40edc18..bdc6d52 100644
/sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
/sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
/sbin/ipx_internal_net -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /sbin/ipx_internal_net -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
@@ -55,6 +61,21 @@ ifdef(`distro_redhat',` @@ -55,6 +60,21 @@ ifdef(`distro_redhat',`
# #
# /usr # /usr
# #
@ -39196,7 +39208,7 @@ index 40edc18..bdc6d52 100644
/usr/sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0) /usr/sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
# #
@@ -77,3 +98,6 @@ ifdef(`distro_debian',` @@ -77,3 +97,6 @@ ifdef(`distro_debian',`
/var/run/network(/.*)? gen_context(system_u:object_r:net_conf_t,s0) /var/run/network(/.*)? gen_context(system_u:object_r:net_conf_t,s0)
') ')
@ -39204,7 +39216,7 @@ index 40edc18..bdc6d52 100644
+/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0) +/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0)
+ +
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
index 2cea692..b52919c 100644 index 2cea692..fcd75c1 100644
--- a/policy/modules/system/sysnetwork.if --- a/policy/modules/system/sysnetwork.if
+++ b/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if
@@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',` @@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',`
@ -39355,10 +39367,14 @@ index 2cea692..b52919c 100644
read_files_pattern($1, net_conf_t, net_conf_t) read_files_pattern($1, net_conf_t, net_conf_t)
') ')
') ')
@@ -440,6 +538,40 @@ interface(`sysnet_etc_filetrans_config',` @@ -438,6 +536,42 @@ interface(`sysnet_etc_filetrans_config',`
files_etc_filetrans($1, net_conf_t, file, $2)
') ')
files_etc_filetrans($1, net_conf_t, file, $2)
+ files_etc_filetrans($1, net_conf_t, lnk_file, $2)
+
+')
+
+######################################## +########################################
+## <summary> +## <summary>
+## Transition content to the type used for +## Transition content to the type used for
@ -39391,12 +39407,19 @@ index 2cea692..b52919c 100644
+ ') + ')
+ +
+ filetrans_pattern($1, $2, net_conf_t, $3, $4) + filetrans_pattern($1, $2, net_conf_t, $3, $4)
+') ')
+
####################################### #######################################
## <summary> @@ -453,7 +587,7 @@ interface(`sysnet_etc_filetrans_config',`
## Create, read, write, and delete network config files. interface(`sysnet_manage_config',`
@@ -463,12 +595,45 @@ interface(`sysnet_manage_config',` gen_require(`
type net_conf_t;
- ')
+ ')
allow $1 net_conf_t:file manage_file_perms;
@@ -463,7 +597,42 @@ interface(`sysnet_manage_config',`
') ')
ifdef(`distro_redhat',` ifdef(`distro_redhat',`
@ -39404,11 +39427,13 @@ index 2cea692..b52919c 100644
+ init_search_pid_dirs($1) + init_search_pid_dirs($1)
+ allow $1 net_conf_t:dir list_dir_perms; + allow $1 net_conf_t:dir list_dir_perms;
manage_files_pattern($1, net_conf_t, net_conf_t) manage_files_pattern($1, net_conf_t, net_conf_t)
') + manage_lnk_files_pattern($1, net_conf_t, net_conf_t)
') + ')
+ sysnet_filetrans_named_content($1)
####################################### +')
## <summary> +
+#######################################
+## <summary>
+## Create, read, write, and delete network config dirs. +## Create, read, write, and delete network config dirs.
+## </summary> +## </summary>
+## <param name="domain"> +## <param name="domain">
@ -39434,15 +39459,10 @@ index 2cea692..b52919c 100644
+ init_search_pid_dirs($1) + init_search_pid_dirs($1)
+ allow $1 net_conf_t:dir list_dir_perms; + allow $1 net_conf_t:dir list_dir_perms;
+ manage_dirs_pattern($1, net_conf_t, net_conf_t) + manage_dirs_pattern($1, net_conf_t, net_conf_t)
+ ') ')
+') ')
+
+####################################### @@ -501,6 +670,7 @@ interface(`sysnet_delete_dhcpc_pid',`
+## <summary>
## Read the dhcp client pid file.
## </summary>
## <param name="domain">
@@ -501,6 +666,7 @@ interface(`sysnet_delete_dhcpc_pid',`
type dhcpc_var_run_t; type dhcpc_var_run_t;
') ')
@ -39450,7 +39470,7 @@ index 2cea692..b52919c 100644
allow $1 dhcpc_var_run_t:file unlink; allow $1 dhcpc_var_run_t:file unlink;
') ')
@@ -610,6 +776,25 @@ interface(`sysnet_signull_ifconfig',` @@ -610,6 +780,25 @@ interface(`sysnet_signull_ifconfig',`
######################################## ########################################
## <summary> ## <summary>
@ -39476,7 +39496,7 @@ index 2cea692..b52919c 100644
## Read the DHCP configuration files. ## Read the DHCP configuration files.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
@@ -626,6 +811,7 @@ interface(`sysnet_read_dhcp_config',` @@ -626,6 +815,7 @@ interface(`sysnet_read_dhcp_config',`
files_search_etc($1) files_search_etc($1)
allow $1 dhcp_etc_t:dir list_dir_perms; allow $1 dhcp_etc_t:dir list_dir_perms;
read_files_pattern($1, dhcp_etc_t, dhcp_etc_t) read_files_pattern($1, dhcp_etc_t, dhcp_etc_t)
@ -39484,7 +39504,7 @@ index 2cea692..b52919c 100644
') ')
######################################## ########################################
@@ -647,6 +833,26 @@ interface(`sysnet_search_dhcp_state',` @@ -647,6 +837,26 @@ interface(`sysnet_search_dhcp_state',`
allow $1 dhcp_state_t:dir search_dir_perms; allow $1 dhcp_state_t:dir search_dir_perms;
') ')
@ -39511,7 +39531,7 @@ index 2cea692..b52919c 100644
######################################## ########################################
## <summary> ## <summary>
## Create DHCP state data. ## Create DHCP state data.
@@ -711,8 +917,6 @@ interface(`sysnet_dns_name_resolve',` @@ -711,8 +921,6 @@ interface(`sysnet_dns_name_resolve',`
allow $1 self:udp_socket create_socket_perms; allow $1 self:udp_socket create_socket_perms;
allow $1 self:netlink_route_socket r_netlink_socket_perms; allow $1 self:netlink_route_socket r_netlink_socket_perms;
@ -39520,7 +39540,7 @@ index 2cea692..b52919c 100644
corenet_tcp_sendrecv_generic_if($1) corenet_tcp_sendrecv_generic_if($1)
corenet_udp_sendrecv_generic_if($1) corenet_udp_sendrecv_generic_if($1)
corenet_tcp_sendrecv_generic_node($1) corenet_tcp_sendrecv_generic_node($1)
@@ -720,8 +924,11 @@ interface(`sysnet_dns_name_resolve',` @@ -720,8 +928,11 @@ interface(`sysnet_dns_name_resolve',`
corenet_tcp_sendrecv_dns_port($1) corenet_tcp_sendrecv_dns_port($1)
corenet_udp_sendrecv_dns_port($1) corenet_udp_sendrecv_dns_port($1)
corenet_tcp_connect_dns_port($1) corenet_tcp_connect_dns_port($1)
@ -39532,7 +39552,7 @@ index 2cea692..b52919c 100644
sysnet_read_config($1) sysnet_read_config($1)
optional_policy(` optional_policy(`
@@ -750,8 +957,6 @@ interface(`sysnet_use_ldap',` @@ -750,8 +961,6 @@ interface(`sysnet_use_ldap',`
allow $1 self:tcp_socket create_socket_perms; allow $1 self:tcp_socket create_socket_perms;
@ -39541,7 +39561,7 @@ index 2cea692..b52919c 100644
corenet_tcp_sendrecv_generic_if($1) corenet_tcp_sendrecv_generic_if($1)
corenet_tcp_sendrecv_generic_node($1) corenet_tcp_sendrecv_generic_node($1)
corenet_tcp_sendrecv_ldap_port($1) corenet_tcp_sendrecv_ldap_port($1)
@@ -760,9 +965,14 @@ interface(`sysnet_use_ldap',` @@ -760,9 +969,14 @@ interface(`sysnet_use_ldap',`
# Support for LDAPS # Support for LDAPS
dev_read_rand($1) dev_read_rand($1)
@ -39556,7 +39576,7 @@ index 2cea692..b52919c 100644
') ')
######################################## ########################################
@@ -784,7 +994,6 @@ interface(`sysnet_use_portmap',` @@ -784,7 +998,6 @@ interface(`sysnet_use_portmap',`
allow $1 self:udp_socket create_socket_perms; allow $1 self:udp_socket create_socket_perms;
corenet_all_recvfrom_unlabeled($1) corenet_all_recvfrom_unlabeled($1)
@ -39564,7 +39584,7 @@ index 2cea692..b52919c 100644
corenet_tcp_sendrecv_generic_if($1) corenet_tcp_sendrecv_generic_if($1)
corenet_udp_sendrecv_generic_if($1) corenet_udp_sendrecv_generic_if($1)
corenet_tcp_sendrecv_generic_node($1) corenet_tcp_sendrecv_generic_node($1)
@@ -796,3 +1005,120 @@ interface(`sysnet_use_portmap',` @@ -796,3 +1009,122 @@ interface(`sysnet_use_portmap',`
sysnet_read_config($1) sysnet_read_config($1)
') ')
@ -39634,6 +39654,7 @@ index 2cea692..b52919c 100644
+ files_etc_filetrans($1, net_conf_t, file, "resolv.conf.tmp") + files_etc_filetrans($1, net_conf_t, file, "resolv.conf.tmp")
+ files_etc_filetrans($1, net_conf_t, file, "resolv.conf.fp-tmp") + files_etc_filetrans($1, net_conf_t, file, "resolv.conf.fp-tmp")
+ files_etc_filetrans($1, net_conf_t, file, "resolv.conf.fp-saved") + files_etc_filetrans($1, net_conf_t, file, "resolv.conf.fp-saved")
+ files_etc_filetrans($1, net_conf_t, lnk_file, ".resolv.conf")
+ files_etc_filetrans($1, net_conf_t, lnk_file, ".resolv.conf.NetworkManager") + files_etc_filetrans($1, net_conf_t, lnk_file, ".resolv.conf.NetworkManager")
+ files_etc_filetrans($1, net_conf_t, file, "denyhosts") + files_etc_filetrans($1, net_conf_t, file, "denyhosts")
+ files_etc_filetrans($1, net_conf_t, file, "hosts") + files_etc_filetrans($1, net_conf_t, file, "hosts")
@ -39645,6 +39666,7 @@ index 2cea692..b52919c 100644
+ +
+ optional_policy(` + optional_policy(`
+ networkmanager_pid_filetrans($1, net_conf_t, file, "resolv.conf") + networkmanager_pid_filetrans($1, net_conf_t, file, "resolv.conf")
+ networkmanager_pid_filetrans($1, net_conf_t, file, "resolv.conf.tmp")
+ ') + ')
+') +')
+ +
@ -41601,10 +41623,10 @@ index 0000000..d2a8fc7
+') +')
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
new file mode 100644 new file mode 100644
index 0000000..db531dc index 0000000..3ebbad0
--- /dev/null --- /dev/null
+++ b/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te
@@ -0,0 +1,707 @@ @@ -0,0 +1,706 @@
+policy_module(systemd, 1.0.0) +policy_module(systemd, 1.0.0)
+ +
+####################################### +#######################################
@ -41863,7 +41885,6 @@ index 0000000..db531dc
+ +
+auth_read_passwd(systemd_networkd_t) +auth_read_passwd(systemd_networkd_t)
+ +
+sysnet_filetrans_named_content(systemd_networkd_t)
+sysnet_manage_config(systemd_networkd_t) +sysnet_manage_config(systemd_networkd_t)
+sysnet_manage_config_dirs(systemd_networkd_t) +sysnet_manage_config_dirs(systemd_networkd_t)
+ +
@ -42610,7 +42631,7 @@ index 9a1650d..d7e8a01 100644
######################################## ########################################
diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
index 39f185f..880b174 100644 index 39f185f..a253f3f 100644
--- a/policy/modules/system/udev.te --- a/policy/modules/system/udev.te
+++ b/policy/modules/system/udev.te +++ b/policy/modules/system/udev.te
@@ -17,16 +17,17 @@ init_daemon_domain(udev_t, udev_exec_t) @@ -17,16 +17,17 @@ init_daemon_domain(udev_t, udev_exec_t)
@ -42769,12 +42790,11 @@ index 39f185f..880b174 100644
seutil_read_config(udev_t) seutil_read_config(udev_t)
seutil_read_default_contexts(udev_t) seutil_read_default_contexts(udev_t)
@@ -169,7 +191,11 @@ sysnet_read_dhcpc_pid(udev_t) @@ -169,7 +191,10 @@ sysnet_read_dhcpc_pid(udev_t)
sysnet_delete_dhcpc_pid(udev_t) sysnet_delete_dhcpc_pid(udev_t)
sysnet_signal_dhcpc(udev_t) sysnet_signal_dhcpc(udev_t)
sysnet_manage_config(udev_t) sysnet_manage_config(udev_t)
-sysnet_etc_filetrans_config(udev_t) -sysnet_etc_filetrans_config(udev_t)
+sysnet_filetrans_named_content(udev_t)
+#sysnet_etc_filetrans_config(udev_t) +#sysnet_etc_filetrans_config(udev_t)
+ +
+systemd_login_read_pid_files(udev_t) +systemd_login_read_pid_files(udev_t)
@ -42782,7 +42802,7 @@ index 39f185f..880b174 100644
userdom_dontaudit_search_user_home_content(udev_t) userdom_dontaudit_search_user_home_content(udev_t)
@@ -195,16 +221,9 @@ ifdef(`distro_gentoo',` @@ -195,16 +220,9 @@ ifdef(`distro_gentoo',`
') ')
ifdef(`distro_redhat',` ifdef(`distro_redhat',`
@ -42801,7 +42821,7 @@ index 39f185f..880b174 100644
# for arping used for static IP addresses on PCMCIA ethernet # for arping used for static IP addresses on PCMCIA ethernet
netutils_domtrans(udev_t) netutils_domtrans(udev_t)
@@ -242,6 +261,7 @@ optional_policy(` @@ -242,6 +260,7 @@ optional_policy(`
optional_policy(` optional_policy(`
cups_domtrans_config(udev_t) cups_domtrans_config(udev_t)
@ -42809,7 +42829,7 @@ index 39f185f..880b174 100644
') ')
optional_policy(` optional_policy(`
@@ -249,17 +269,31 @@ optional_policy(` @@ -249,17 +268,31 @@ optional_policy(`
dbus_use_system_bus_fds(udev_t) dbus_use_system_bus_fds(udev_t)
optional_policy(` optional_policy(`
@ -42843,7 +42863,7 @@ index 39f185f..880b174 100644
') ')
optional_policy(` optional_policy(`
@@ -289,6 +323,10 @@ optional_policy(` @@ -289,6 +322,10 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -42854,7 +42874,7 @@ index 39f185f..880b174 100644
openct_read_pid_files(udev_t) openct_read_pid_files(udev_t)
openct_domtrans(udev_t) openct_domtrans(udev_t)
') ')
@@ -303,6 +341,15 @@ optional_policy(` @@ -303,6 +340,15 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -42870,7 +42890,7 @@ index 39f185f..880b174 100644
unconfined_signal(udev_t) unconfined_signal(udev_t)
') ')
@@ -315,6 +362,7 @@ optional_policy(` @@ -315,6 +361,7 @@ optional_policy(`
kernel_read_xen_state(udev_t) kernel_read_xen_state(udev_t)
xen_manage_log(udev_t) xen_manage_log(udev_t)
xen_read_image_files(udev_t) xen_read_image_files(udev_t)

View File

@ -27741,7 +27741,7 @@ index 50d0084..94e1936 100644
fail2ban_run_client($1, $2) fail2ban_run_client($1, $2)
diff --git a/fail2ban.te b/fail2ban.te diff --git a/fail2ban.te b/fail2ban.te
index cf0e567..9ebb247 100644 index cf0e567..6c3ce35 100644
--- a/fail2ban.te --- a/fail2ban.te
+++ b/fail2ban.te +++ b/fail2ban.te
@@ -37,7 +37,7 @@ role fail2ban_client_roles types fail2ban_client_t; @@ -37,7 +37,7 @@ role fail2ban_client_roles types fail2ban_client_t;
@ -27769,7 +27769,7 @@ index cf0e567..9ebb247 100644
files_list_var(fail2ban_t) files_list_var(fail2ban_t)
files_dontaudit_list_tmp(fail2ban_t) files_dontaudit_list_tmp(fail2ban_t)
@@ -92,24 +90,38 @@ fs_getattr_all_fs(fail2ban_t) @@ -92,24 +90,37 @@ fs_getattr_all_fs(fail2ban_t)
auth_use_nsswitch(fail2ban_t) auth_use_nsswitch(fail2ban_t)
logging_read_all_logs(fail2ban_t) logging_read_all_logs(fail2ban_t)
@ -27785,7 +27785,6 @@ index cf0e567..9ebb247 100644
-sysnet_etc_filetrans_config(fail2ban_t) -sysnet_etc_filetrans_config(fail2ban_t)
- -
-mta_send_mail(fail2ban_t) -mta_send_mail(fail2ban_t)
+sysnet_filetrans_named_content(fail2ban_t)
optional_policy(` optional_policy(`
apache_read_log(fail2ban_t) apache_read_log(fail2ban_t)
@ -27812,7 +27811,7 @@ index cf0e567..9ebb247 100644
iptables_domtrans(fail2ban_t) iptables_domtrans(fail2ban_t)
') ')
@@ -118,6 +130,10 @@ optional_policy(` @@ -118,6 +129,10 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -27823,7 +27822,7 @@ index cf0e567..9ebb247 100644
shorewall_domtrans(fail2ban_t) shorewall_domtrans(fail2ban_t)
') ')
@@ -131,22 +147,30 @@ allow fail2ban_client_t self:unix_stream_socket { create connect write read }; @@ -131,22 +146,30 @@ allow fail2ban_client_t self:unix_stream_socket { create connect write read };
domtrans_pattern(fail2ban_client_t, fail2ban_exec_t, fail2ban_t) domtrans_pattern(fail2ban_client_t, fail2ban_exec_t, fail2ban_t)
@ -101816,10 +101815,10 @@ index 0000000..9524b50
+') +')
diff --git a/thumb.te b/thumb.te diff --git a/thumb.te b/thumb.te
new file mode 100644 new file mode 100644
index 0000000..02ed710 index 0000000..e80cde4
--- /dev/null --- /dev/null
+++ b/thumb.te +++ b/thumb.te
@@ -0,0 +1,161 @@ @@ -0,0 +1,162 @@
+policy_module(thumb, 1.0.0) +policy_module(thumb, 1.0.0)
+ +
+######################################## +########################################
@ -101891,6 +101890,7 @@ index 0000000..02ed710
+corecmd_exec_shell(thumb_t) +corecmd_exec_shell(thumb_t)
+ +
+corenet_tcp_connect_xserver_port(thumb_t) +corenet_tcp_connect_xserver_port(thumb_t)
+corenet_dontaudit_tcp_connect_all_ports(thumb_t)
+ +
+dev_read_sysfs(thumb_t) +dev_read_sysfs(thumb_t)
+dev_read_urand(thumb_t) +dev_read_urand(thumb_t)

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration Summary: SELinux policy configuration
Name: selinux-policy Name: selinux-policy
Version: 3.13.1 Version: 3.13.1
Release: 107%{?dist} Release: 108%{?dist}
License: GPLv2+ License: GPLv2+
Group: System Environment/Base Group: System Environment/Base
Source: serefpolicy-%{version}.tgz Source: serefpolicy-%{version}.tgz
@ -605,6 +605,12 @@ SELinux Reference policy mls base module.
%endif %endif
%changelog %changelog
* Wed Feb 04 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-108
- Fix labels, improve sysnet_manage_config interface.
- Label /var/run/NetworkManager/resolv.conf.tmp as net_conf_t.
- Dontaudit network connections related to thumb_t. BZ(1187981)
- Remove sysnet_filetrans_named_content from fail2ban
* Thu Feb 02 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-107 * Thu Feb 02 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-107
- Fix labels on new location of resolv.conf - Fix labels on new location of resolv.conf
- syslog is not writing to the audit socket - syslog is not writing to the audit socket