* Fri Nov 14 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-93
- Allow bumblebee to use nsswitch. BZ(1155339) - Allow openvpn to stream connect to networkmanager. BZ(1164182) - Allow smbd to create HOMEDIRS is pam_oddjob_mkhomedir in MLS. - Allow cpuplug rw virtual memory sysctl. BZ (1077831) - Docker needs to write to sysfs, needs back port to F20,F21, RHEL7
This commit is contained in:
parent
b6161d4177
commit
24d43eb10d
@ -10820,7 +10820,7 @@ index 0000000..de66654
|
|||||||
+')
|
+')
|
||||||
diff --git a/bumblebee.te b/bumblebee.te
|
diff --git a/bumblebee.te b/bumblebee.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..cccf2f7
|
index 0000000..23a4606
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/bumblebee.te
|
+++ b/bumblebee.te
|
||||||
@@ -0,0 +1,61 @@
|
@@ -0,0 +1,61 @@
|
||||||
@ -10867,7 +10867,7 @@ index 0000000..cccf2f7
|
|||||||
+
|
+
|
||||||
+dev_read_sysfs(bumblebee_t)
|
+dev_read_sysfs(bumblebee_t)
|
||||||
+
|
+
|
||||||
+auth_read_passwd(bumblebee_t)
|
+auth_use_nsswitch(bumblebee_t)
|
||||||
+
|
+
|
||||||
+logging_send_syslog_msg(bumblebee_t)
|
+logging_send_syslog_msg(bumblebee_t)
|
||||||
+
|
+
|
||||||
@ -16738,10 +16738,10 @@ index 0000000..c68d1d3
|
|||||||
+')
|
+')
|
||||||
diff --git a/cpuplug.te b/cpuplug.te
|
diff --git a/cpuplug.te b/cpuplug.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..11361fc
|
index 0000000..074f3e0
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/cpuplug.te
|
+++ b/cpuplug.te
|
||||||
@@ -0,0 +1,39 @@
|
@@ -0,0 +1,40 @@
|
||||||
+policy_module(cpuplug, 1.0.0)
|
+policy_module(cpuplug, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -16776,6 +16776,7 @@ index 0000000..11361fc
|
|||||||
+files_pid_filetrans(cpuplug_t, cpuplug_var_run_t, { file })
|
+files_pid_filetrans(cpuplug_t, cpuplug_var_run_t, { file })
|
||||||
+
|
+
|
||||||
+kernel_read_system_state(cpuplug_t)
|
+kernel_read_system_state(cpuplug_t)
|
||||||
|
+kernel_rw_vm_sysctls(cpuplug_t)
|
||||||
+
|
+
|
||||||
+dev_rw_sysfs(cpuplug_t)
|
+dev_rw_sysfs(cpuplug_t)
|
||||||
+
|
+
|
||||||
@ -25061,7 +25062,7 @@ index 0000000..2a614ed
|
|||||||
+')
|
+')
|
||||||
diff --git a/docker.te b/docker.te
|
diff --git a/docker.te b/docker.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..a1ed007
|
index 0000000..17a2829
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/docker.te
|
+++ b/docker.te
|
||||||
@@ -0,0 +1,285 @@
|
@@ -0,0 +1,285 @@
|
||||||
@ -25269,7 +25270,7 @@ index 0000000..a1ed007
|
|||||||
+dev_getattr_sysfs_fs(docker_t)
|
+dev_getattr_sysfs_fs(docker_t)
|
||||||
+dev_read_urand(docker_t)
|
+dev_read_urand(docker_t)
|
||||||
+dev_read_lvm_control(docker_t)
|
+dev_read_lvm_control(docker_t)
|
||||||
+dev_read_sysfs(docker_t)
|
+dev_rw_sysfs(docker_t)
|
||||||
+dev_rw_loop_control(docker_t)
|
+dev_rw_loop_control(docker_t)
|
||||||
+dev_rw_lvm_control(docker_t)
|
+dev_rw_lvm_control(docker_t)
|
||||||
+
|
+
|
||||||
@ -61914,7 +61915,7 @@ index 6837e9a..21e6dae 100644
|
|||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
role_transition $2 openvpn_initrc_exec_t system_r;
|
role_transition $2 openvpn_initrc_exec_t system_r;
|
||||||
diff --git a/openvpn.te b/openvpn.te
|
diff --git a/openvpn.te b/openvpn.te
|
||||||
index 63957a3..e059df5 100644
|
index 63957a3..3eb9dc1 100644
|
||||||
--- a/openvpn.te
|
--- a/openvpn.te
|
||||||
+++ b/openvpn.te
|
+++ b/openvpn.te
|
||||||
@@ -6,6 +6,13 @@ policy_module(openvpn, 1.12.2)
|
@@ -6,6 +6,13 @@ policy_module(openvpn, 1.12.2)
|
||||||
@ -62050,8 +62051,11 @@ index 63957a3..e059df5 100644
|
|||||||
daemontools_service_domain(openvpn_t, openvpn_exec_t)
|
daemontools_service_domain(openvpn_t, openvpn_exec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -175,3 +203,27 @@ optional_policy(`
|
@@ -173,5 +201,30 @@ optional_policy(`
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
networkmanager_dbus_chat(openvpn_t)
|
networkmanager_dbus_chat(openvpn_t)
|
||||||
|
+ networkmanager_stream_connect(openvpn_t)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
+
|
+
|
||||||
@ -88291,7 +88295,7 @@ index 50d07fb..bada62f 100644
|
|||||||
+ allow $1 samba_unit_file_t:service all_service_perms;
|
+ allow $1 samba_unit_file_t:service all_service_perms;
|
||||||
')
|
')
|
||||||
diff --git a/samba.te b/samba.te
|
diff --git a/samba.te b/samba.te
|
||||||
index 2b7c441..fdfd40f 100644
|
index 2b7c441..3fb8192 100644
|
||||||
--- a/samba.te
|
--- a/samba.te
|
||||||
+++ b/samba.te
|
+++ b/samba.te
|
||||||
@@ -6,100 +6,80 @@ policy_module(samba, 1.16.3)
|
@@ -6,100 +6,80 @@ policy_module(samba, 1.16.3)
|
||||||
@ -88863,7 +88867,21 @@ index 2b7c441..fdfd40f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -479,6 +484,11 @@ optional_policy(`
|
@@ -474,11 +479,25 @@ optional_policy(`
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
+ dbus_system_bus_client(smbd_t)
|
||||||
|
+
|
||||||
|
+ optional_policy(`
|
||||||
|
+ oddjob_dbus_chat(smbd_t)
|
||||||
|
+ oddjob_domtrans_mkhomedir(smbd_t)
|
||||||
|
+ ')
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
kerberos_read_keytab(smbd_t)
|
||||||
|
kerberos_use(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -88875,7 +88893,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
lpd_exec_lpr(smbd_t)
|
lpd_exec_lpr(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -488,6 +498,10 @@ optional_policy(`
|
@@ -488,6 +507,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -88886,7 +88904,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
rpc_search_nfs_state_data(smbd_t)
|
rpc_search_nfs_state_data(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -499,9 +513,44 @@ optional_policy(`
|
@@ -499,9 +522,44 @@ optional_policy(`
|
||||||
udev_read_db(smbd_t)
|
udev_read_db(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -88932,7 +88950,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
#
|
#
|
||||||
|
|
||||||
dontaudit nmbd_t self:capability sys_tty_config;
|
dontaudit nmbd_t self:capability sys_tty_config;
|
||||||
@@ -512,9 +561,11 @@ allow nmbd_t self:msg { send receive };
|
@@ -512,9 +570,11 @@ allow nmbd_t self:msg { send receive };
|
||||||
allow nmbd_t self:msgq create_msgq_perms;
|
allow nmbd_t self:msgq create_msgq_perms;
|
||||||
allow nmbd_t self:sem create_sem_perms;
|
allow nmbd_t self:sem create_sem_perms;
|
||||||
allow nmbd_t self:shm create_shm_perms;
|
allow nmbd_t self:shm create_shm_perms;
|
||||||
@ -88947,7 +88965,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
manage_dirs_pattern(nmbd_t, { smbd_var_run_t nmbd_var_run_t }, nmbd_var_run_t)
|
manage_dirs_pattern(nmbd_t, { smbd_var_run_t nmbd_var_run_t }, nmbd_var_run_t)
|
||||||
manage_files_pattern(nmbd_t, nmbd_var_run_t, nmbd_var_run_t)
|
manage_files_pattern(nmbd_t, nmbd_var_run_t, nmbd_var_run_t)
|
||||||
@@ -526,20 +577,15 @@ read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
|
@@ -526,20 +586,15 @@ read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
|
||||||
read_lnk_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
|
read_lnk_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
|
||||||
|
|
||||||
manage_dirs_pattern(nmbd_t, samba_log_t, samba_log_t)
|
manage_dirs_pattern(nmbd_t, samba_log_t, samba_log_t)
|
||||||
@ -88971,7 +88989,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
kernel_getattr_core_if(nmbd_t)
|
kernel_getattr_core_if(nmbd_t)
|
||||||
kernel_getattr_message_if(nmbd_t)
|
kernel_getattr_message_if(nmbd_t)
|
||||||
@@ -547,53 +593,44 @@ kernel_read_kernel_sysctls(nmbd_t)
|
@@ -547,53 +602,44 @@ kernel_read_kernel_sysctls(nmbd_t)
|
||||||
kernel_read_network_state(nmbd_t)
|
kernel_read_network_state(nmbd_t)
|
||||||
kernel_read_software_raid_state(nmbd_t)
|
kernel_read_software_raid_state(nmbd_t)
|
||||||
kernel_read_system_state(nmbd_t)
|
kernel_read_system_state(nmbd_t)
|
||||||
@ -89022,14 +89040,14 @@ index 2b7c441..fdfd40f 100644
|
|||||||
-
|
-
|
||||||
userdom_use_unpriv_users_fds(nmbd_t)
|
userdom_use_unpriv_users_fds(nmbd_t)
|
||||||
-userdom_user_home_dir_filetrans_user_home_content(nmbd_t, { file dir })
|
-userdom_user_home_dir_filetrans_user_home_content(nmbd_t, { file dir })
|
||||||
+userdom_dontaudit_search_user_home_dirs(nmbd_t)
|
-
|
||||||
|
|
||||||
-tunable_policy(`samba_export_all_ro',`
|
-tunable_policy(`samba_export_all_ro',`
|
||||||
- fs_read_noxattr_fs_files(nmbd_t)
|
- fs_read_noxattr_fs_files(nmbd_t)
|
||||||
- files_list_non_auth_dirs(nmbd_t)
|
- files_list_non_auth_dirs(nmbd_t)
|
||||||
- files_read_non_auth_files(nmbd_t)
|
- files_read_non_auth_files(nmbd_t)
|
||||||
-')
|
-')
|
||||||
-
|
+userdom_dontaudit_search_user_home_dirs(nmbd_t)
|
||||||
|
|
||||||
-tunable_policy(`samba_export_all_rw',`
|
-tunable_policy(`samba_export_all_rw',`
|
||||||
- fs_read_noxattr_fs_files(nmbd_t)
|
- fs_read_noxattr_fs_files(nmbd_t)
|
||||||
- files_manage_non_auth_files(nmbd_t)
|
- files_manage_non_auth_files(nmbd_t)
|
||||||
@ -89040,7 +89058,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -606,16 +643,22 @@ optional_policy(`
|
@@ -606,16 +652,22 @@ optional_policy(`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -89067,7 +89085,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
manage_files_pattern(smbcontrol_t, samba_var_t, samba_var_t)
|
manage_files_pattern(smbcontrol_t, samba_var_t, samba_var_t)
|
||||||
|
|
||||||
@@ -627,16 +670,11 @@ domain_use_interactive_fds(smbcontrol_t)
|
@@ -627,16 +679,11 @@ domain_use_interactive_fds(smbcontrol_t)
|
||||||
|
|
||||||
dev_read_urand(smbcontrol_t)
|
dev_read_urand(smbcontrol_t)
|
||||||
|
|
||||||
@ -89085,7 +89103,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
ctdbd_stream_connect(smbcontrol_t)
|
ctdbd_stream_connect(smbcontrol_t)
|
||||||
@@ -644,22 +682,23 @@ optional_policy(`
|
@@ -644,22 +691,23 @@ optional_policy(`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -89117,7 +89135,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
allow smbmount_t samba_secrets_t:file manage_file_perms;
|
allow smbmount_t samba_secrets_t:file manage_file_perms;
|
||||||
|
|
||||||
@@ -668,26 +707,22 @@ manage_files_pattern(smbmount_t, samba_var_t, samba_var_t)
|
@@ -668,26 +716,22 @@ manage_files_pattern(smbmount_t, samba_var_t, samba_var_t)
|
||||||
manage_lnk_files_pattern(smbmount_t, samba_var_t, samba_var_t)
|
manage_lnk_files_pattern(smbmount_t, samba_var_t, samba_var_t)
|
||||||
files_var_filetrans(smbmount_t, samba_var_t, dir, "samba")
|
files_var_filetrans(smbmount_t, samba_var_t, dir, "samba")
|
||||||
|
|
||||||
@ -89153,19 +89171,19 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
fs_getattr_cifs(smbmount_t)
|
fs_getattr_cifs(smbmount_t)
|
||||||
fs_mount_cifs(smbmount_t)
|
fs_mount_cifs(smbmount_t)
|
||||||
@@ -699,58 +734,77 @@ fs_read_cifs_files(smbmount_t)
|
@@ -699,58 +743,77 @@ fs_read_cifs_files(smbmount_t)
|
||||||
storage_raw_read_fixed_disk(smbmount_t)
|
storage_raw_read_fixed_disk(smbmount_t)
|
||||||
storage_raw_write_fixed_disk(smbmount_t)
|
storage_raw_write_fixed_disk(smbmount_t)
|
||||||
|
|
||||||
-auth_use_nsswitch(smbmount_t)
|
-auth_use_nsswitch(smbmount_t)
|
||||||
+corecmd_list_bin(smbmount_t)
|
+corecmd_list_bin(smbmount_t)
|
||||||
|
+
|
||||||
-miscfiles_read_localization(smbmount_t)
|
|
||||||
+files_list_mnt(smbmount_t)
|
+files_list_mnt(smbmount_t)
|
||||||
+files_mounton_mnt(smbmount_t)
|
+files_mounton_mnt(smbmount_t)
|
||||||
+files_manage_etc_runtime_files(smbmount_t)
|
+files_manage_etc_runtime_files(smbmount_t)
|
||||||
+files_etc_filetrans_etc_runtime(smbmount_t, file)
|
+files_etc_filetrans_etc_runtime(smbmount_t, file)
|
||||||
+
|
|
||||||
|
-miscfiles_read_localization(smbmount_t)
|
||||||
+auth_use_nsswitch(smbmount_t)
|
+auth_use_nsswitch(smbmount_t)
|
||||||
|
|
||||||
-mount_use_fds(smbmount_t)
|
-mount_use_fds(smbmount_t)
|
||||||
@ -89205,13 +89223,13 @@ index 2b7c441..fdfd40f 100644
|
|||||||
-allow swat_t { nmbd_t smbd_t }:process { signal signull };
|
-allow swat_t { nmbd_t smbd_t }:process { signal signull };
|
||||||
+samba_domtrans_smbd(swat_t)
|
+samba_domtrans_smbd(swat_t)
|
||||||
+allow swat_t smbd_t:process { signal signull };
|
+allow swat_t smbd_t:process { signal signull };
|
||||||
+
|
|
||||||
+samba_domtrans_nmbd(swat_t)
|
|
||||||
+allow swat_t nmbd_t:process { signal signull };
|
|
||||||
+allow nmbd_t swat_t:process signal;
|
|
||||||
|
|
||||||
-allow swat_t smbd_var_run_t:file read_file_perms;
|
-allow swat_t smbd_var_run_t:file read_file_perms;
|
||||||
-allow swat_t smbd_var_run_t:file { lock delete_file_perms };
|
-allow swat_t smbd_var_run_t:file { lock delete_file_perms };
|
||||||
|
+samba_domtrans_nmbd(swat_t)
|
||||||
|
+allow swat_t nmbd_t:process { signal signull };
|
||||||
|
+allow nmbd_t swat_t:process signal;
|
||||||
|
+
|
||||||
+read_files_pattern(swat_t, nmbd_var_run_t, nmbd_var_run_t)
|
+read_files_pattern(swat_t, nmbd_var_run_t, nmbd_var_run_t)
|
||||||
+stream_connect_pattern(swat_t, nmbd_var_run_t, nmbd_var_run_t, nmbd_t)
|
+stream_connect_pattern(swat_t, nmbd_var_run_t, nmbd_var_run_t, nmbd_t)
|
||||||
+
|
+
|
||||||
@ -89245,7 +89263,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
manage_dirs_pattern(swat_t, swat_tmp_t, swat_tmp_t)
|
manage_dirs_pattern(swat_t, swat_tmp_t, swat_tmp_t)
|
||||||
manage_files_pattern(swat_t, swat_tmp_t, swat_tmp_t)
|
manage_files_pattern(swat_t, swat_tmp_t, swat_tmp_t)
|
||||||
@@ -759,17 +813,13 @@ files_tmp_filetrans(swat_t, swat_tmp_t, { file dir })
|
@@ -759,17 +822,13 @@ files_tmp_filetrans(swat_t, swat_tmp_t, { file dir })
|
||||||
manage_files_pattern(swat_t, swat_var_run_t, swat_var_run_t)
|
manage_files_pattern(swat_t, swat_var_run_t, swat_var_run_t)
|
||||||
files_pid_filetrans(swat_t, swat_var_run_t, file)
|
files_pid_filetrans(swat_t, swat_var_run_t, file)
|
||||||
|
|
||||||
@ -89269,7 +89287,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
kernel_read_kernel_sysctls(swat_t)
|
kernel_read_kernel_sysctls(swat_t)
|
||||||
kernel_read_system_state(swat_t)
|
kernel_read_system_state(swat_t)
|
||||||
@@ -777,36 +827,25 @@ kernel_read_network_state(swat_t)
|
@@ -777,36 +836,25 @@ kernel_read_network_state(swat_t)
|
||||||
|
|
||||||
corecmd_search_bin(swat_t)
|
corecmd_search_bin(swat_t)
|
||||||
|
|
||||||
@ -89312,7 +89330,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
auth_domtrans_chk_passwd(swat_t)
|
auth_domtrans_chk_passwd(swat_t)
|
||||||
auth_use_nsswitch(swat_t)
|
auth_use_nsswitch(swat_t)
|
||||||
@@ -818,10 +857,11 @@ logging_send_syslog_msg(swat_t)
|
@@ -818,10 +866,11 @@ logging_send_syslog_msg(swat_t)
|
||||||
logging_send_audit_msgs(swat_t)
|
logging_send_audit_msgs(swat_t)
|
||||||
logging_search_logs(swat_t)
|
logging_search_logs(swat_t)
|
||||||
|
|
||||||
@ -89326,7 +89344,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
cups_read_rw_config(swat_t)
|
cups_read_rw_config(swat_t)
|
||||||
cups_stream_connect(swat_t)
|
cups_stream_connect(swat_t)
|
||||||
@@ -840,17 +880,20 @@ optional_policy(`
|
@@ -840,17 +889,20 @@ optional_policy(`
|
||||||
# Winbind local policy
|
# Winbind local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -89352,7 +89370,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
allow winbind_t samba_etc_t:dir list_dir_perms;
|
allow winbind_t samba_etc_t:dir list_dir_perms;
|
||||||
read_files_pattern(winbind_t, samba_etc_t, samba_etc_t)
|
read_files_pattern(winbind_t, samba_etc_t, samba_etc_t)
|
||||||
@@ -860,9 +903,7 @@ manage_files_pattern(winbind_t, samba_etc_t, samba_secrets_t)
|
@@ -860,9 +912,7 @@ manage_files_pattern(winbind_t, samba_etc_t, samba_secrets_t)
|
||||||
filetrans_pattern(winbind_t, samba_etc_t, samba_secrets_t, file)
|
filetrans_pattern(winbind_t, samba_etc_t, samba_secrets_t, file)
|
||||||
|
|
||||||
manage_dirs_pattern(winbind_t, samba_log_t, samba_log_t)
|
manage_dirs_pattern(winbind_t, samba_log_t, samba_log_t)
|
||||||
@ -89363,7 +89381,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
manage_lnk_files_pattern(winbind_t, samba_log_t, samba_log_t)
|
manage_lnk_files_pattern(winbind_t, samba_log_t, samba_log_t)
|
||||||
|
|
||||||
manage_dirs_pattern(winbind_t, samba_var_t, samba_var_t)
|
manage_dirs_pattern(winbind_t, samba_var_t, samba_var_t)
|
||||||
@@ -873,38 +914,41 @@ files_var_filetrans(winbind_t, samba_var_t, dir, "samba")
|
@@ -873,38 +923,41 @@ files_var_filetrans(winbind_t, samba_var_t, dir, "samba")
|
||||||
|
|
||||||
rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t)
|
rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t)
|
||||||
|
|
||||||
@ -89416,7 +89434,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
corenet_tcp_connect_smbd_port(winbind_t)
|
corenet_tcp_connect_smbd_port(winbind_t)
|
||||||
corenet_tcp_connect_epmap_port(winbind_t)
|
corenet_tcp_connect_epmap_port(winbind_t)
|
||||||
corenet_tcp_connect_all_unreserved_ports(winbind_t)
|
corenet_tcp_connect_all_unreserved_ports(winbind_t)
|
||||||
@@ -912,38 +956,52 @@ corenet_tcp_connect_all_unreserved_ports(winbind_t)
|
@@ -912,38 +965,52 @@ corenet_tcp_connect_all_unreserved_ports(winbind_t)
|
||||||
dev_read_sysfs(winbind_t)
|
dev_read_sysfs(winbind_t)
|
||||||
dev_read_urand(winbind_t)
|
dev_read_urand(winbind_t)
|
||||||
|
|
||||||
@ -89475,7 +89493,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -959,31 +1017,35 @@ optional_policy(`
|
@@ -959,31 +1026,35 @@ optional_policy(`
|
||||||
# Winbind helper local policy
|
# Winbind helper local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -89518,7 +89536,7 @@ index 2b7c441..fdfd40f 100644
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
apache_append_log(winbind_helper_t)
|
apache_append_log(winbind_helper_t)
|
||||||
@@ -997,25 +1059,38 @@ optional_policy(`
|
@@ -997,25 +1068,38 @@ optional_policy(`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 92%{?dist}
|
Release: 93%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -604,7 +604,14 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Mon Nov 10 2014 Lukas Vrabec <lvrabec@redhat.com> 3.12.1-92
|
* Fri Nov 14 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-93
|
||||||
|
- Allow bumblebee to use nsswitch. BZ(1155339)
|
||||||
|
- Allow openvpn to stream connect to networkmanager. BZ(1164182)
|
||||||
|
- Allow smbd to create HOMEDIRS is pam_oddjob_mkhomedir in MLS.
|
||||||
|
- Allow cpuplug rw virtual memory sysctl. BZ (1077831)
|
||||||
|
- Docker needs to write to sysfs, needs back port to F20,F21, RHEL7
|
||||||
|
|
||||||
|
* Mon Nov 10 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-92
|
||||||
- Add kdump_rw_inherited_kdumpctl_tmp_pipes()
|
- Add kdump_rw_inherited_kdumpctl_tmp_pipes()
|
||||||
- Added fixes related to linuxptp. BZ (1149693)
|
- Added fixes related to linuxptp. BZ (1149693)
|
||||||
- Label keystone cgi files as keystone_cgi_script_exec_t. BZ(1138424
|
- Label keystone cgi files as keystone_cgi_script_exec_t. BZ(1138424
|
||||||
|
Loading…
Reference in New Issue
Block a user