* Tue Sep 30 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-84
- Allow all domains to read fonts - Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. BZ (#1147028) - Allow pki-tomcat to change SELinux object identity. - Allow radious to connect to apache ports to do OCSP check - Allow git cgi scripts to create content in /tmp - Allow cockpit-session to do GSSAPI logins.
This commit is contained in:
parent
3430335564
commit
245c83ebf9
@ -8827,7 +8827,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
||||||
index cf04cb5..8fd98fc 100644
|
index cf04cb5..16c88de 100644
|
||||||
--- a/policy/modules/kernel/domain.te
|
--- a/policy/modules/kernel/domain.te
|
||||||
+++ b/policy/modules/kernel/domain.te
|
+++ b/policy/modules/kernel/domain.te
|
||||||
@@ -4,17 +4,41 @@ policy_module(domain, 1.11.0)
|
@@ -4,17 +4,41 @@ policy_module(domain, 1.11.0)
|
||||||
@ -8926,7 +8926,7 @@ index cf04cb5..8fd98fc 100644
|
|||||||
|
|
||||||
ifdef(`hide_broken_symptoms',`
|
ifdef(`hide_broken_symptoms',`
|
||||||
# This check is in the general socket
|
# This check is in the general socket
|
||||||
@@ -121,8 +173,18 @@ tunable_policy(`global_ssp',`
|
@@ -121,8 +173,19 @@ tunable_policy(`global_ssp',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -8942,10 +8942,11 @@ index cf04cb5..8fd98fc 100644
|
|||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ miscfiles_read_localization(domain)
|
+ miscfiles_read_localization(domain)
|
||||||
+ miscfiles_read_man_pages(domain)
|
+ miscfiles_read_man_pages(domain)
|
||||||
|
+ miscfiles_read_fonts(domain)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -133,6 +195,9 @@ optional_policy(`
|
@@ -133,6 +196,9 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
xserver_dontaudit_use_xdm_fds(domain)
|
xserver_dontaudit_use_xdm_fds(domain)
|
||||||
xserver_dontaudit_rw_xdm_pipes(domain)
|
xserver_dontaudit_rw_xdm_pipes(domain)
|
||||||
@ -8955,7 +8956,7 @@ index cf04cb5..8fd98fc 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -147,12 +212,18 @@ optional_policy(`
|
@@ -147,12 +213,18 @@ optional_policy(`
|
||||||
# Use/sendto/connectto sockets created by any domain.
|
# Use/sendto/connectto sockets created by any domain.
|
||||||
allow unconfined_domain_type domain:{ socket_class_set socket key_socket } *;
|
allow unconfined_domain_type domain:{ socket_class_set socket key_socket } *;
|
||||||
|
|
||||||
@ -8975,7 +8976,7 @@ index cf04cb5..8fd98fc 100644
|
|||||||
|
|
||||||
# Create/access any System V IPC objects.
|
# Create/access any System V IPC objects.
|
||||||
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
||||||
@@ -166,5 +237,348 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
@@ -166,5 +238,348 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
||||||
# act on all domains keys
|
# act on all domains keys
|
||||||
allow unconfined_domain_type domain:key *;
|
allow unconfined_domain_type domain:key *;
|
||||||
|
|
||||||
|
@ -3623,7 +3623,7 @@ index 7caefc3..7e70f67 100644
|
|||||||
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
diff --git a/apache.if b/apache.if
|
diff --git a/apache.if b/apache.if
|
||||||
index f6eb485..918ae86 100644
|
index f6eb485..f6d065e 100644
|
||||||
--- a/apache.if
|
--- a/apache.if
|
||||||
+++ b/apache.if
|
+++ b/apache.if
|
||||||
@@ -1,9 +1,9 @@
|
@@ -1,9 +1,9 @@
|
||||||
@ -3772,7 +3772,7 @@ index f6eb485..918ae86 100644
|
|||||||
+ manage_fifo_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
+ manage_fifo_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||||||
+ manage_sock_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
+ manage_sock_files_pattern($1_script_t, $1_rw_content_t, $1_rw_content_t)
|
||||||
+
|
+
|
||||||
+ allow $1_script_t httpd_t:unix_stream_socket { accept getattr read write };
|
+ allow $1_script_t httpd_t:unix_stream_socket { ioctl accept getattr read write };
|
||||||
+
|
+
|
||||||
+ # Allow the web server to run scripts and serve pages
|
+ # Allow the web server to run scripts and serve pages
|
||||||
tunable_policy(`httpd_builtin_scripting',`
|
tunable_policy(`httpd_builtin_scripting',`
|
||||||
@ -13887,10 +13887,10 @@ index 0000000..573dcae
|
|||||||
+')
|
+')
|
||||||
diff --git a/cockpit.te b/cockpit.te
|
diff --git a/cockpit.te b/cockpit.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..2b8cac8
|
index 0000000..4d89495
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/cockpit.te
|
+++ b/cockpit.te
|
||||||
@@ -0,0 +1,91 @@
|
@@ -0,0 +1,98 @@
|
||||||
+policy_module(cockpit, 1.0.0)
|
+policy_module(cockpit, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -13946,6 +13946,8 @@ index 0000000..2b8cac8
|
|||||||
+
|
+
|
||||||
+auth_use_nsswitch(cockpit_ws_t)
|
+auth_use_nsswitch(cockpit_ws_t)
|
||||||
+
|
+
|
||||||
|
+init_stream_connect(cockpit_ws_t)
|
||||||
|
+
|
||||||
+logging_send_syslog_msg(cockpit_ws_t)
|
+logging_send_syslog_msg(cockpit_ws_t)
|
||||||
+
|
+
|
||||||
+# cockpit-ws launches cockpit-session
|
+# cockpit-ws launches cockpit-session
|
||||||
@ -13956,6 +13958,11 @@ index 0000000..2b8cac8
|
|||||||
+allow cockpit_session_t cockpit_ws_t:unix_stream_socket rw_stream_socket_perms;
|
+allow cockpit_session_t cockpit_ws_t:unix_stream_socket rw_stream_socket_perms;
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
|
+ kerberos_use(cockpit_ws_t)
|
||||||
|
+ kerberos_etc_filetrans_keytab(cockpit_ws_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ ssh_read_user_home_files(cockpit_ws_t)
|
+ ssh_read_user_home_files(cockpit_ws_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
@ -29646,7 +29653,7 @@ index 1e29af1..6c64f55 100644
|
|||||||
+ userdom_user_home_dir_filetrans($1, git_user_content_t, dir, "public_git")
|
+ userdom_user_home_dir_filetrans($1, git_user_content_t, dir, "public_git")
|
||||||
+')
|
+')
|
||||||
diff --git a/git.te b/git.te
|
diff --git a/git.te b/git.te
|
||||||
index dc49c71..3ef1e93 100644
|
index dc49c71..54df5e3 100644
|
||||||
--- a/git.te
|
--- a/git.te
|
||||||
+++ b/git.te
|
+++ b/git.te
|
||||||
@@ -49,14 +49,6 @@ gen_tunable(git_session_users, false)
|
@@ -49,14 +49,6 @@ gen_tunable(git_session_users, false)
|
||||||
@ -29672,7 +29679,7 @@ index dc49c71..3ef1e93 100644
|
|||||||
|
|
||||||
type git_system_t, git_daemon;
|
type git_system_t, git_daemon;
|
||||||
type gitd_exec_t;
|
type gitd_exec_t;
|
||||||
@@ -93,10 +86,10 @@ type git_session_t, git_daemon;
|
@@ -93,12 +86,15 @@ type git_session_t, git_daemon;
|
||||||
userdom_user_application_domain(git_session_t, gitd_exec_t)
|
userdom_user_application_domain(git_session_t, gitd_exec_t)
|
||||||
role git_session_roles types git_session_t;
|
role git_session_roles types git_session_t;
|
||||||
|
|
||||||
@ -29684,8 +29691,13 @@ index dc49c71..3ef1e93 100644
|
|||||||
+type git_user_content_t alias git_session_content_t;
|
+type git_user_content_t alias git_session_content_t;
|
||||||
userdom_user_home_content(git_user_content_t)
|
userdom_user_home_content(git_user_content_t)
|
||||||
|
|
||||||
|
+type git_script_tmp_t;
|
||||||
|
+files_tmp_file(git_script_tmp_t)
|
||||||
|
+
|
||||||
########################################
|
########################################
|
||||||
@@ -110,6 +103,8 @@ list_dirs_pattern(git_session_t, git_user_content_t, git_user_content_t)
|
#
|
||||||
|
# Session policy
|
||||||
|
@@ -110,6 +106,8 @@ list_dirs_pattern(git_session_t, git_user_content_t, git_user_content_t)
|
||||||
read_files_pattern(git_session_t, git_user_content_t, git_user_content_t)
|
read_files_pattern(git_session_t, git_user_content_t, git_user_content_t)
|
||||||
userdom_search_user_home_dirs(git_session_t)
|
userdom_search_user_home_dirs(git_session_t)
|
||||||
|
|
||||||
@ -29694,7 +29706,7 @@ index dc49c71..3ef1e93 100644
|
|||||||
corenet_all_recvfrom_netlabel(git_session_t)
|
corenet_all_recvfrom_netlabel(git_session_t)
|
||||||
corenet_all_recvfrom_unlabeled(git_session_t)
|
corenet_all_recvfrom_unlabeled(git_session_t)
|
||||||
corenet_tcp_bind_generic_node(git_session_t)
|
corenet_tcp_bind_generic_node(git_session_t)
|
||||||
@@ -130,9 +125,7 @@ tunable_policy(`git_session_bind_all_unreserved_ports',`
|
@@ -130,9 +128,7 @@ tunable_policy(`git_session_bind_all_unreserved_ports',`
|
||||||
corenet_tcp_sendrecv_all_ports(git_session_t)
|
corenet_tcp_sendrecv_all_ports(git_session_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -29705,7 +29717,7 @@ index dc49c71..3ef1e93 100644
|
|||||||
|
|
||||||
tunable_policy(`use_nfs_home_dirs',`
|
tunable_policy(`use_nfs_home_dirs',`
|
||||||
fs_getattr_nfs(git_session_t)
|
fs_getattr_nfs(git_session_t)
|
||||||
@@ -158,6 +151,9 @@ tunable_policy(`use_samba_home_dirs',`
|
@@ -158,6 +154,9 @@ tunable_policy(`use_samba_home_dirs',`
|
||||||
list_dirs_pattern(git_system_t, git_sys_content_t, git_sys_content_t)
|
list_dirs_pattern(git_system_t, git_sys_content_t, git_sys_content_t)
|
||||||
read_files_pattern(git_system_t, git_sys_content_t, git_sys_content_t)
|
read_files_pattern(git_system_t, git_sys_content_t, git_sys_content_t)
|
||||||
|
|
||||||
@ -29715,31 +29727,34 @@ index dc49c71..3ef1e93 100644
|
|||||||
corenet_all_recvfrom_unlabeled(git_system_t)
|
corenet_all_recvfrom_unlabeled(git_system_t)
|
||||||
corenet_all_recvfrom_netlabel(git_system_t)
|
corenet_all_recvfrom_netlabel(git_system_t)
|
||||||
corenet_tcp_sendrecv_generic_if(git_system_t)
|
corenet_tcp_sendrecv_generic_if(git_system_t)
|
||||||
@@ -176,6 +172,10 @@ logging_send_syslog_msg(git_system_t)
|
@@ -176,6 +175,10 @@ logging_send_syslog_msg(git_system_t)
|
||||||
|
|
||||||
tunable_policy(`git_system_enable_homedirs',`
|
tunable_policy(`git_system_enable_homedirs',`
|
||||||
userdom_search_user_home_dirs(git_system_t)
|
userdom_search_user_home_dirs(git_system_t)
|
||||||
+ list_dirs_pattern(httpd_git_script_t, git_user_content_t, git_user_content_t)
|
+ list_dirs_pattern(git_script_t, git_user_content_t, git_user_content_t)
|
||||||
+ list_dirs_pattern(git_system_t, git_user_content_t, git_user_content_t)
|
+ list_dirs_pattern(git_system_t, git_user_content_t, git_user_content_t)
|
||||||
+ read_files_pattern(git_system_t, git_user_content_t, git_user_content_t)
|
+ read_files_pattern(git_system_t, git_user_content_t, git_user_content_t)
|
||||||
+
|
+
|
||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`git_system_enable_homedirs && use_nfs_home_dirs',`
|
tunable_policy(`git_system_enable_homedirs && use_nfs_home_dirs',`
|
||||||
@@ -215,48 +215,48 @@ tunable_policy(`git_system_use_nfs',`
|
@@ -215,48 +218,52 @@ tunable_policy(`git_system_use_nfs',`
|
||||||
# CGI policy
|
# CGI policy
|
||||||
#
|
#
|
||||||
|
|
||||||
-list_dirs_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
-list_dirs_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||||||
-read_files_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
-read_files_pattern(httpd_git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||||||
-files_search_var_lib(httpd_git_script_t)
|
-files_search_var_lib(httpd_git_script_t)
|
||||||
|
+manage_dirs_pattern(git_script_t, git_script_tmp_t, git_script_tmp_t)
|
||||||
|
+manage_files_pattern(git_script_t, git_script_tmp_t, git_script_tmp_t)
|
||||||
|
+manage_lnk_files_pattern(git_script_t, git_script_tmp_t, git_script_tmp_t)
|
||||||
|
+files_tmp_filetrans(git_script_t, git_script_tmp_t, { file dir })
|
||||||
|
|
||||||
|
-files_dontaudit_getattr_tmp_dirs(httpd_git_script_t)
|
||||||
+list_dirs_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
+list_dirs_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||||||
+read_files_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
+read_files_pattern(git_script_t, { git_sys_content_t git_user_content_t }, { git_sys_content_t git_user_content_t })
|
||||||
+files_search_var_lib(git_script_t)
|
+files_search_var_lib(git_script_t)
|
||||||
|
|
||||||
-files_dontaudit_getattr_tmp_dirs(httpd_git_script_t)
|
|
||||||
+files_dontaudit_getattr_tmp_dirs(git_script_t)
|
|
||||||
|
|
||||||
-auth_use_nsswitch(httpd_git_script_t)
|
-auth_use_nsswitch(httpd_git_script_t)
|
||||||
+auth_use_nsswitch(git_script_t)
|
+auth_use_nsswitch(git_script_t)
|
||||||
|
|
||||||
@ -29748,6 +29763,7 @@ index dc49c71..3ef1e93 100644
|
|||||||
+ userdom_search_user_home_dirs(git_script_t)
|
+ userdom_search_user_home_dirs(git_script_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
+fs_getattr_tmpfs(git_script_t)
|
||||||
tunable_policy(`git_cgi_enable_homedirs && use_nfs_home_dirs',`
|
tunable_policy(`git_cgi_enable_homedirs && use_nfs_home_dirs',`
|
||||||
- fs_getattr_nfs(httpd_git_script_t)
|
- fs_getattr_nfs(httpd_git_script_t)
|
||||||
- fs_list_nfs(httpd_git_script_t)
|
- fs_list_nfs(httpd_git_script_t)
|
||||||
@ -29797,7 +29813,7 @@ index dc49c71..3ef1e93 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -266,12 +266,9 @@ tunable_policy(`git_cgi_use_nfs',`
|
@@ -266,12 +273,9 @@ tunable_policy(`git_cgi_use_nfs',`
|
||||||
|
|
||||||
allow git_daemon self:fifo_file rw_fifo_file_perms;
|
allow git_daemon self:fifo_file rw_fifo_file_perms;
|
||||||
|
|
||||||
@ -65027,10 +65043,10 @@ index 0000000..798efb6
|
|||||||
+')
|
+')
|
||||||
diff --git a/pki.te b/pki.te
|
diff --git a/pki.te b/pki.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..0cb8f0a
|
index 0000000..995cc23
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/pki.te
|
+++ b/pki.te
|
||||||
@@ -0,0 +1,280 @@
|
@@ -0,0 +1,281 @@
|
||||||
+policy_module(pki,10.0.11)
|
+policy_module(pki,10.0.11)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -65063,6 +65079,7 @@ index 0000000..0cb8f0a
|
|||||||
+miscfiles_cert_type(pki_tomcat_cert_t)
|
+miscfiles_cert_type(pki_tomcat_cert_t)
|
||||||
+
|
+
|
||||||
+tomcat_domain_template(pki_tomcat)
|
+tomcat_domain_template(pki_tomcat)
|
||||||
|
+domain_obj_id_change_exemption(pki_tomcat_t)
|
||||||
+
|
+
|
||||||
+type pki_tomcat_unit_file_t;
|
+type pki_tomcat_unit_file_t;
|
||||||
+systemd_unit_file(pki_tomcat_unit_file_t)
|
+systemd_unit_file(pki_tomcat_unit_file_t)
|
||||||
@ -76560,7 +76577,7 @@ index 2c3d338..7d49554 100644
|
|||||||
init_labeled_script_domtrans($1, rabbitmq_initrc_exec_t)
|
init_labeled_script_domtrans($1, rabbitmq_initrc_exec_t)
|
||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
diff --git a/rabbitmq.te b/rabbitmq.te
|
diff --git a/rabbitmq.te b/rabbitmq.te
|
||||||
index dc3b0ed..8c4255e 100644
|
index dc3b0ed..42203ed 100644
|
||||||
--- a/rabbitmq.te
|
--- a/rabbitmq.te
|
||||||
+++ b/rabbitmq.te
|
+++ b/rabbitmq.te
|
||||||
@@ -5,13 +5,14 @@ policy_module(rabbitmq, 1.0.2)
|
@@ -5,13 +5,14 @@ policy_module(rabbitmq, 1.0.2)
|
||||||
@ -76594,7 +76611,7 @@ index dc3b0ed..8c4255e 100644
|
|||||||
type rabbitmq_var_log_t;
|
type rabbitmq_var_log_t;
|
||||||
logging_log_file(rabbitmq_var_log_t)
|
logging_log_file(rabbitmq_var_log_t)
|
||||||
|
|
||||||
@@ -27,98 +31,81 @@ files_pid_file(rabbitmq_var_run_t)
|
@@ -27,98 +31,82 @@ files_pid_file(rabbitmq_var_run_t)
|
||||||
|
|
||||||
######################################
|
######################################
|
||||||
#
|
#
|
||||||
@ -76700,6 +76717,7 @@ index dc3b0ed..8c4255e 100644
|
|||||||
+
|
+
|
||||||
+manage_dirs_pattern(rabbitmq_t, rabbitmq_var_lib_t, rabbitmq_var_lib_t)
|
+manage_dirs_pattern(rabbitmq_t, rabbitmq_var_lib_t, rabbitmq_var_lib_t)
|
||||||
+manage_files_pattern(rabbitmq_t, rabbitmq_var_lib_t, rabbitmq_var_lib_t)
|
+manage_files_pattern(rabbitmq_t, rabbitmq_var_lib_t, rabbitmq_var_lib_t)
|
||||||
|
+manage_lnk_files_pattern(rabbitmq_t, rabbitmq_var_lib_t, rabbitmq_var_lib_t)
|
||||||
+files_var_lib_filetrans(rabbitmq_t, rabbitmq_var_lib_t, { dir file })
|
+files_var_lib_filetrans(rabbitmq_t, rabbitmq_var_lib_t, { dir file })
|
||||||
+
|
+
|
||||||
+manage_dirs_pattern(rabbitmq_t, rabbitmq_var_log_t, rabbitmq_var_log_t)
|
+manage_dirs_pattern(rabbitmq_t, rabbitmq_var_log_t, rabbitmq_var_log_t)
|
||||||
@ -76845,7 +76863,7 @@ index 4460582..60cf556 100644
|
|||||||
+
|
+
|
||||||
')
|
')
|
||||||
diff --git a/radius.te b/radius.te
|
diff --git a/radius.te b/radius.te
|
||||||
index 403a4fe..de6f803 100644
|
index 403a4fe..8fc3712 100644
|
||||||
--- a/radius.te
|
--- a/radius.te
|
||||||
+++ b/radius.te
|
+++ b/radius.te
|
||||||
@@ -27,6 +27,9 @@ files_type(radiusd_var_lib_t)
|
@@ -27,6 +27,9 @@ files_type(radiusd_var_lib_t)
|
||||||
@ -76871,16 +76889,17 @@ index 403a4fe..de6f803 100644
|
|||||||
corenet_all_recvfrom_netlabel(radiusd_t)
|
corenet_all_recvfrom_netlabel(radiusd_t)
|
||||||
corenet_tcp_sendrecv_generic_if(radiusd_t)
|
corenet_tcp_sendrecv_generic_if(radiusd_t)
|
||||||
corenet_udp_sendrecv_generic_if(radiusd_t)
|
corenet_udp_sendrecv_generic_if(radiusd_t)
|
||||||
@@ -74,6 +77,8 @@ corenet_tcp_sendrecv_all_ports(radiusd_t)
|
@@ -74,6 +77,9 @@ corenet_tcp_sendrecv_all_ports(radiusd_t)
|
||||||
corenet_udp_sendrecv_all_ports(radiusd_t)
|
corenet_udp_sendrecv_all_ports(radiusd_t)
|
||||||
corenet_udp_bind_generic_node(radiusd_t)
|
corenet_udp_bind_generic_node(radiusd_t)
|
||||||
|
|
||||||
+corenet_tcp_connect_postgresql_port(radiusd_t)
|
+corenet_tcp_connect_postgresql_port(radiusd_t)
|
||||||
|
+corenet_tcp_connect_http_port(radiusd_t)
|
||||||
+
|
+
|
||||||
corenet_sendrecv_radacct_server_packets(radiusd_t)
|
corenet_sendrecv_radacct_server_packets(radiusd_t)
|
||||||
corenet_udp_bind_radacct_port(radiusd_t)
|
corenet_udp_bind_radacct_port(radiusd_t)
|
||||||
|
|
||||||
@@ -97,7 +102,6 @@ domain_use_interactive_fds(radiusd_t)
|
@@ -97,7 +103,6 @@ domain_use_interactive_fds(radiusd_t)
|
||||||
fs_getattr_all_fs(radiusd_t)
|
fs_getattr_all_fs(radiusd_t)
|
||||||
fs_search_auto_mountpoints(radiusd_t)
|
fs_search_auto_mountpoints(radiusd_t)
|
||||||
|
|
||||||
@ -76888,7 +76907,7 @@ index 403a4fe..de6f803 100644
|
|||||||
files_read_etc_runtime_files(radiusd_t)
|
files_read_etc_runtime_files(radiusd_t)
|
||||||
files_dontaudit_list_tmp(radiusd_t)
|
files_dontaudit_list_tmp(radiusd_t)
|
||||||
|
|
||||||
@@ -109,7 +113,6 @@ libs_exec_lib_files(radiusd_t)
|
@@ -109,7 +114,6 @@ libs_exec_lib_files(radiusd_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(radiusd_t)
|
logging_send_syslog_msg(radiusd_t)
|
||||||
|
|
||||||
@ -76896,7 +76915,7 @@ index 403a4fe..de6f803 100644
|
|||||||
miscfiles_read_generic_certs(radiusd_t)
|
miscfiles_read_generic_certs(radiusd_t)
|
||||||
|
|
||||||
sysnet_use_ldap(radiusd_t)
|
sysnet_use_ldap(radiusd_t)
|
||||||
@@ -122,6 +125,11 @@ optional_policy(`
|
@@ -122,6 +126,11 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -76908,7 +76927,7 @@ index 403a4fe..de6f803 100644
|
|||||||
logrotate_exec(radiusd_t)
|
logrotate_exec(radiusd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -140,5 +148,10 @@ optional_policy(`
|
@@ -140,5 +149,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 83%{?dist}
|
Release: 84%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -602,6 +602,14 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Sep 30 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-84
|
||||||
|
- Allow all domains to read fonts
|
||||||
|
- Allow rabbitmq_t read rabbitmq_var_lib_t lnk files. BZ (#1147028)
|
||||||
|
- Allow pki-tomcat to change SELinux object identity.
|
||||||
|
- Allow radious to connect to apache ports to do OCSP check
|
||||||
|
- Allow git cgi scripts to create content in /tmp
|
||||||
|
- Allow cockpit-session to do GSSAPI logins.
|
||||||
|
|
||||||
* Mon Sep 22 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-83
|
* Mon Sep 22 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-83
|
||||||
- Make sure /run/systemd/generator and system is labeled correctly on creation.
|
- Make sure /run/systemd/generator and system is labeled correctly on creation.
|
||||||
- Additional access required by usbmuxd
|
- Additional access required by usbmuxd
|
||||||
|
Loading…
Reference in New Issue
Block a user