- Dontaudit attempts by sosreport to read shadow_t
- Allow browser sandbox plugins to connect to cups to print - Add new label mpd_home_t - Label /srv/www/logs as httpd_log_t - Add support for /var/lib/php/wsdlcache - Add zarafa_setrlimit boolean - Allow fetchmail to send mails - Add labels for apache logs under miq package - Allow irc_t to use tcp sockets - fix labels in puppet.if - Allow tcsd to read utmp file - Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to - Define svirt_socket_t as a domain_type - Take away transition from init_t to initrc_t when executing - Fix label on pam_krb5 helper apps
This commit is contained in:
parent
fcf0156ca3
commit
3d49b27279
@ -3239,7 +3239,7 @@ index 7590165..19aaaed 100644
|
|||||||
+ fs_mounton_fusefs(seunshare_domain)
|
+ fs_mounton_fusefs(seunshare_domain)
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
|
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
|
||||||
index 644d4d7..f9bcd44 100644
|
index 644d4d7..6e7dd83 100644
|
||||||
--- a/policy/modules/kernel/corecommands.fc
|
--- a/policy/modules/kernel/corecommands.fc
|
||||||
+++ b/policy/modules/kernel/corecommands.fc
|
+++ b/policy/modules/kernel/corecommands.fc
|
||||||
@@ -1,9 +1,10 @@
|
@@ -1,9 +1,10 @@
|
||||||
@ -3423,7 +3423,7 @@ index 644d4d7..f9bcd44 100644
|
|||||||
/usr/lib/rpm/rpmq -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib/rpm/rpmq -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib/rpm/rpmv -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib/rpm/rpmv -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
+/usr/lib/tumbler-[^/]*/tumblerd -- gen_context(system_u:object_r:bin_t,s0)
|
+/usr/lib/tumbler-[^/]*/tumblerd -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
+/usr/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
|
+/usr/lib/security/pam_krb5(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib/sftp-server -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib/sftp-server -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
-/usr/lib/vte/gnome-pty-helper -- gen_context(system_u:object_r:bin_t,s0)
|
-/usr/lib/vte/gnome-pty-helper -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
+/usr/lib/systemd/system-sleep(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
+/usr/lib/systemd/system-sleep(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||||
@ -27646,7 +27646,7 @@ index 24e7804..c4155c7 100644
|
|||||||
+ files_etc_filetrans($1, machineid_t, file, "machine-id" )
|
+ files_etc_filetrans($1, machineid_t, file, "machine-id" )
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
||||||
index dd3be8d..729cc4f 100644
|
index dd3be8d..c56175f 100644
|
||||||
--- a/policy/modules/system/init.te
|
--- a/policy/modules/system/init.te
|
||||||
+++ b/policy/modules/system/init.te
|
+++ b/policy/modules/system/init.te
|
||||||
@@ -11,10 +11,24 @@ gen_require(`
|
@@ -11,10 +11,24 @@ gen_require(`
|
||||||
@ -27735,16 +27735,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
type initrc_exec_t, init_script_file_type;
|
type initrc_exec_t, init_script_file_type;
|
||||||
domain_type(initrc_t)
|
domain_type(initrc_t)
|
||||||
domain_entry_file(initrc_t, initrc_exec_t)
|
domain_entry_file(initrc_t, initrc_exec_t)
|
||||||
@@ -66,6 +99,8 @@ role system_r types initrc_t;
|
@@ -98,7 +131,8 @@ ifdef(`enable_mls',`
|
||||||
# of the below init_upstart tunable
|
|
||||||
# but this has a typeattribute in it
|
|
||||||
corecmd_shell_entry_type(initrc_t)
|
|
||||||
+corecmd_bin_entry_type(initrc_t)
|
|
||||||
+corecmd_bin_domtrans(init_t, initrc_t)
|
|
||||||
|
|
||||||
type initrc_devpts_t;
|
|
||||||
term_pty(initrc_devpts_t)
|
|
||||||
@@ -98,7 +133,8 @@ ifdef(`enable_mls',`
|
|
||||||
#
|
#
|
||||||
|
|
||||||
# Use capabilities. old rule:
|
# Use capabilities. old rule:
|
||||||
@ -27754,7 +27745,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
# is ~sys_module really needed? observed:
|
# is ~sys_module really needed? observed:
|
||||||
# sys_boot
|
# sys_boot
|
||||||
# sys_tty_config
|
# sys_tty_config
|
||||||
@@ -110,12 +146,33 @@ allow init_t self:fifo_file rw_fifo_file_perms;
|
@@ -110,12 +144,33 @@ allow init_t self:fifo_file rw_fifo_file_perms;
|
||||||
|
|
||||||
# Re-exec itself
|
# Re-exec itself
|
||||||
can_exec(init_t, init_exec_t)
|
can_exec(init_t, init_exec_t)
|
||||||
@ -27794,7 +27785,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
allow init_t initctl_t:fifo_file manage_fifo_file_perms;
|
allow init_t initctl_t:fifo_file manage_fifo_file_perms;
|
||||||
dev_filetrans(init_t, initctl_t, fifo_file)
|
dev_filetrans(init_t, initctl_t, fifo_file)
|
||||||
@@ -125,13 +182,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr };
|
@@ -125,13 +180,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr };
|
||||||
|
|
||||||
kernel_read_system_state(init_t)
|
kernel_read_system_state(init_t)
|
||||||
kernel_share_state(init_t)
|
kernel_share_state(init_t)
|
||||||
@ -27813,7 +27804,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
domain_getpgid_all_domains(init_t)
|
domain_getpgid_all_domains(init_t)
|
||||||
domain_kill_all_domains(init_t)
|
domain_kill_all_domains(init_t)
|
||||||
@@ -139,14 +200,20 @@ domain_signal_all_domains(init_t)
|
@@ -139,14 +198,20 @@ domain_signal_all_domains(init_t)
|
||||||
domain_signull_all_domains(init_t)
|
domain_signull_all_domains(init_t)
|
||||||
domain_sigstop_all_domains(init_t)
|
domain_sigstop_all_domains(init_t)
|
||||||
domain_sigchld_all_domains(init_t)
|
domain_sigchld_all_domains(init_t)
|
||||||
@ -27834,7 +27825,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
# file descriptors inherited from the rootfs:
|
# file descriptors inherited from the rootfs:
|
||||||
files_dontaudit_rw_root_files(init_t)
|
files_dontaudit_rw_root_files(init_t)
|
||||||
files_dontaudit_rw_root_chr_files(init_t)
|
files_dontaudit_rw_root_chr_files(init_t)
|
||||||
@@ -156,28 +223,49 @@ fs_list_inotifyfs(init_t)
|
@@ -156,28 +221,49 @@ fs_list_inotifyfs(init_t)
|
||||||
fs_write_ramfs_sockets(init_t)
|
fs_write_ramfs_sockets(init_t)
|
||||||
|
|
||||||
mcs_process_set_categories(init_t)
|
mcs_process_set_categories(init_t)
|
||||||
@ -27887,7 +27878,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
ifdef(`distro_gentoo',`
|
ifdef(`distro_gentoo',`
|
||||||
allow init_t self:process { getcap setcap };
|
allow init_t self:process { getcap setcap };
|
||||||
@@ -186,29 +274,186 @@ ifdef(`distro_gentoo',`
|
@@ -186,29 +272,187 @@ ifdef(`distro_gentoo',`
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
@ -28051,6 +28042,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
+
|
+
|
||||||
+auth_use_nsswitch(init_t)
|
+auth_use_nsswitch(init_t)
|
||||||
+auth_rw_login_records(init_t)
|
+auth_rw_login_records(init_t)
|
||||||
|
+auth_domtrans_chk_passwd(init_t)
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ lvm_rw_pipes(init_t)
|
+ lvm_rw_pipes(init_t)
|
||||||
@ -28082,7 +28074,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -216,7 +461,29 @@ optional_policy(`
|
@@ -216,7 +460,29 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28112,7 +28104,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -225,8 +492,9 @@ optional_policy(`
|
@@ -225,8 +491,9 @@ optional_policy(`
|
||||||
#
|
#
|
||||||
|
|
||||||
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
|
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
|
||||||
@ -28124,7 +28116,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
allow initrc_t self:passwd rootok;
|
allow initrc_t self:passwd rootok;
|
||||||
allow initrc_t self:key manage_key_perms;
|
allow initrc_t self:key manage_key_perms;
|
||||||
|
|
||||||
@@ -257,12 +525,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
|
@@ -257,12 +524,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
|
||||||
|
|
||||||
allow initrc_t initrc_var_run_t:file manage_file_perms;
|
allow initrc_t initrc_var_run_t:file manage_file_perms;
|
||||||
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
|
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
|
||||||
@ -28141,7 +28133,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
|
manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
|
||||||
manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
|
manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
|
||||||
@@ -278,23 +550,36 @@ kernel_change_ring_buffer_level(initrc_t)
|
@@ -278,23 +549,36 @@ kernel_change_ring_buffer_level(initrc_t)
|
||||||
kernel_clear_ring_buffer(initrc_t)
|
kernel_clear_ring_buffer(initrc_t)
|
||||||
kernel_get_sysvipc_info(initrc_t)
|
kernel_get_sysvipc_info(initrc_t)
|
||||||
kernel_read_all_sysctls(initrc_t)
|
kernel_read_all_sysctls(initrc_t)
|
||||||
@ -28184,7 +28176,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
corenet_tcp_sendrecv_all_ports(initrc_t)
|
corenet_tcp_sendrecv_all_ports(initrc_t)
|
||||||
corenet_udp_sendrecv_all_ports(initrc_t)
|
corenet_udp_sendrecv_all_ports(initrc_t)
|
||||||
corenet_tcp_connect_all_ports(initrc_t)
|
corenet_tcp_connect_all_ports(initrc_t)
|
||||||
@@ -302,9 +587,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
|
@@ -302,9 +586,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
|
||||||
|
|
||||||
dev_read_rand(initrc_t)
|
dev_read_rand(initrc_t)
|
||||||
dev_read_urand(initrc_t)
|
dev_read_urand(initrc_t)
|
||||||
@ -28196,7 +28188,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
dev_rw_sysfs(initrc_t)
|
dev_rw_sysfs(initrc_t)
|
||||||
dev_list_usbfs(initrc_t)
|
dev_list_usbfs(initrc_t)
|
||||||
dev_read_framebuffer(initrc_t)
|
dev_read_framebuffer(initrc_t)
|
||||||
@@ -312,8 +599,10 @@ dev_write_framebuffer(initrc_t)
|
@@ -312,8 +598,10 @@ dev_write_framebuffer(initrc_t)
|
||||||
dev_read_realtime_clock(initrc_t)
|
dev_read_realtime_clock(initrc_t)
|
||||||
dev_read_sound_mixer(initrc_t)
|
dev_read_sound_mixer(initrc_t)
|
||||||
dev_write_sound_mixer(initrc_t)
|
dev_write_sound_mixer(initrc_t)
|
||||||
@ -28207,7 +28199,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
dev_delete_lvm_control_dev(initrc_t)
|
dev_delete_lvm_control_dev(initrc_t)
|
||||||
dev_manage_generic_symlinks(initrc_t)
|
dev_manage_generic_symlinks(initrc_t)
|
||||||
dev_manage_generic_files(initrc_t)
|
dev_manage_generic_files(initrc_t)
|
||||||
@@ -321,8 +610,7 @@ dev_manage_generic_files(initrc_t)
|
@@ -321,8 +609,7 @@ dev_manage_generic_files(initrc_t)
|
||||||
dev_delete_generic_symlinks(initrc_t)
|
dev_delete_generic_symlinks(initrc_t)
|
||||||
dev_getattr_all_blk_files(initrc_t)
|
dev_getattr_all_blk_files(initrc_t)
|
||||||
dev_getattr_all_chr_files(initrc_t)
|
dev_getattr_all_chr_files(initrc_t)
|
||||||
@ -28217,7 +28209,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
domain_kill_all_domains(initrc_t)
|
domain_kill_all_domains(initrc_t)
|
||||||
domain_signal_all_domains(initrc_t)
|
domain_signal_all_domains(initrc_t)
|
||||||
@@ -331,7 +619,6 @@ domain_sigstop_all_domains(initrc_t)
|
@@ -331,7 +618,6 @@ domain_sigstop_all_domains(initrc_t)
|
||||||
domain_sigchld_all_domains(initrc_t)
|
domain_sigchld_all_domains(initrc_t)
|
||||||
domain_read_all_domains_state(initrc_t)
|
domain_read_all_domains_state(initrc_t)
|
||||||
domain_getattr_all_domains(initrc_t)
|
domain_getattr_all_domains(initrc_t)
|
||||||
@ -28225,7 +28217,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
domain_getsession_all_domains(initrc_t)
|
domain_getsession_all_domains(initrc_t)
|
||||||
domain_use_interactive_fds(initrc_t)
|
domain_use_interactive_fds(initrc_t)
|
||||||
# for lsof which is used by alsa shutdown:
|
# for lsof which is used by alsa shutdown:
|
||||||
@@ -339,6 +626,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
|
@@ -339,6 +625,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
|
||||||
domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
|
domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
|
||||||
domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
|
domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
|
||||||
domain_dontaudit_getattr_all_pipes(initrc_t)
|
domain_dontaudit_getattr_all_pipes(initrc_t)
|
||||||
@ -28233,7 +28225,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
files_getattr_all_dirs(initrc_t)
|
files_getattr_all_dirs(initrc_t)
|
||||||
files_getattr_all_files(initrc_t)
|
files_getattr_all_files(initrc_t)
|
||||||
@@ -346,14 +634,15 @@ files_getattr_all_symlinks(initrc_t)
|
@@ -346,14 +633,15 @@ files_getattr_all_symlinks(initrc_t)
|
||||||
files_getattr_all_pipes(initrc_t)
|
files_getattr_all_pipes(initrc_t)
|
||||||
files_getattr_all_sockets(initrc_t)
|
files_getattr_all_sockets(initrc_t)
|
||||||
files_purge_tmp(initrc_t)
|
files_purge_tmp(initrc_t)
|
||||||
@ -28251,7 +28243,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
files_read_usr_files(initrc_t)
|
files_read_usr_files(initrc_t)
|
||||||
files_manage_urandom_seed(initrc_t)
|
files_manage_urandom_seed(initrc_t)
|
||||||
files_manage_generic_spool(initrc_t)
|
files_manage_generic_spool(initrc_t)
|
||||||
@@ -363,8 +652,12 @@ files_list_isid_type_dirs(initrc_t)
|
@@ -363,8 +651,12 @@ files_list_isid_type_dirs(initrc_t)
|
||||||
files_mounton_isid_type_dirs(initrc_t)
|
files_mounton_isid_type_dirs(initrc_t)
|
||||||
files_list_default(initrc_t)
|
files_list_default(initrc_t)
|
||||||
files_mounton_default(initrc_t)
|
files_mounton_default(initrc_t)
|
||||||
@ -28265,7 +28257,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
fs_list_inotifyfs(initrc_t)
|
fs_list_inotifyfs(initrc_t)
|
||||||
fs_register_binary_executable_type(initrc_t)
|
fs_register_binary_executable_type(initrc_t)
|
||||||
# rhgb-console writes to ramfs
|
# rhgb-console writes to ramfs
|
||||||
@@ -374,10 +667,11 @@ fs_mount_all_fs(initrc_t)
|
@@ -374,10 +666,11 @@ fs_mount_all_fs(initrc_t)
|
||||||
fs_unmount_all_fs(initrc_t)
|
fs_unmount_all_fs(initrc_t)
|
||||||
fs_remount_all_fs(initrc_t)
|
fs_remount_all_fs(initrc_t)
|
||||||
fs_getattr_all_fs(initrc_t)
|
fs_getattr_all_fs(initrc_t)
|
||||||
@ -28279,7 +28271,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
mcs_process_set_categories(initrc_t)
|
mcs_process_set_categories(initrc_t)
|
||||||
|
|
||||||
mls_file_read_all_levels(initrc_t)
|
mls_file_read_all_levels(initrc_t)
|
||||||
@@ -386,6 +680,7 @@ mls_process_read_up(initrc_t)
|
@@ -386,6 +679,7 @@ mls_process_read_up(initrc_t)
|
||||||
mls_process_write_down(initrc_t)
|
mls_process_write_down(initrc_t)
|
||||||
mls_rangetrans_source(initrc_t)
|
mls_rangetrans_source(initrc_t)
|
||||||
mls_fd_share_all_levels(initrc_t)
|
mls_fd_share_all_levels(initrc_t)
|
||||||
@ -28287,7 +28279,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
selinux_get_enforce_mode(initrc_t)
|
selinux_get_enforce_mode(initrc_t)
|
||||||
|
|
||||||
@@ -397,6 +692,7 @@ term_use_all_terms(initrc_t)
|
@@ -397,6 +691,7 @@ term_use_all_terms(initrc_t)
|
||||||
term_reset_tty_labels(initrc_t)
|
term_reset_tty_labels(initrc_t)
|
||||||
|
|
||||||
auth_rw_login_records(initrc_t)
|
auth_rw_login_records(initrc_t)
|
||||||
@ -28295,7 +28287,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
auth_setattr_login_records(initrc_t)
|
auth_setattr_login_records(initrc_t)
|
||||||
auth_rw_lastlog(initrc_t)
|
auth_rw_lastlog(initrc_t)
|
||||||
auth_read_pam_pid(initrc_t)
|
auth_read_pam_pid(initrc_t)
|
||||||
@@ -415,20 +711,18 @@ logging_read_all_logs(initrc_t)
|
@@ -415,20 +710,18 @@ logging_read_all_logs(initrc_t)
|
||||||
logging_append_all_logs(initrc_t)
|
logging_append_all_logs(initrc_t)
|
||||||
logging_read_audit_config(initrc_t)
|
logging_read_audit_config(initrc_t)
|
||||||
|
|
||||||
@ -28319,7 +28311,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
ifdef(`distro_debian',`
|
ifdef(`distro_debian',`
|
||||||
dev_setattr_generic_dirs(initrc_t)
|
dev_setattr_generic_dirs(initrc_t)
|
||||||
@@ -450,7 +744,6 @@ ifdef(`distro_gentoo',`
|
@@ -450,7 +743,6 @@ ifdef(`distro_gentoo',`
|
||||||
allow initrc_t self:process setfscreate;
|
allow initrc_t self:process setfscreate;
|
||||||
dev_create_null_dev(initrc_t)
|
dev_create_null_dev(initrc_t)
|
||||||
dev_create_zero_dev(initrc_t)
|
dev_create_zero_dev(initrc_t)
|
||||||
@ -28327,7 +28319,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
term_create_console_dev(initrc_t)
|
term_create_console_dev(initrc_t)
|
||||||
|
|
||||||
# unfortunately /sbin/rc does stupid tricks
|
# unfortunately /sbin/rc does stupid tricks
|
||||||
@@ -485,6 +778,10 @@ ifdef(`distro_gentoo',`
|
@@ -485,6 +777,10 @@ ifdef(`distro_gentoo',`
|
||||||
sysnet_setattr_config(initrc_t)
|
sysnet_setattr_config(initrc_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28338,7 +28330,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
alsa_read_lib(initrc_t)
|
alsa_read_lib(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -505,7 +802,7 @@ ifdef(`distro_redhat',`
|
@@ -505,7 +801,7 @@ ifdef(`distro_redhat',`
|
||||||
|
|
||||||
# Red Hat systems seem to have a stray
|
# Red Hat systems seem to have a stray
|
||||||
# fd open from the initrd
|
# fd open from the initrd
|
||||||
@ -28347,7 +28339,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
files_dontaudit_read_root_files(initrc_t)
|
files_dontaudit_read_root_files(initrc_t)
|
||||||
|
|
||||||
# These seem to be from the initrd
|
# These seem to be from the initrd
|
||||||
@@ -520,6 +817,7 @@ ifdef(`distro_redhat',`
|
@@ -520,6 +816,7 @@ ifdef(`distro_redhat',`
|
||||||
files_create_boot_dirs(initrc_t)
|
files_create_boot_dirs(initrc_t)
|
||||||
files_create_boot_flag(initrc_t)
|
files_create_boot_flag(initrc_t)
|
||||||
files_rw_boot_symlinks(initrc_t)
|
files_rw_boot_symlinks(initrc_t)
|
||||||
@ -28355,7 +28347,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
# wants to read /.fonts directory
|
# wants to read /.fonts directory
|
||||||
files_read_default_files(initrc_t)
|
files_read_default_files(initrc_t)
|
||||||
files_mountpoint(initrc_tmp_t)
|
files_mountpoint(initrc_tmp_t)
|
||||||
@@ -540,6 +838,7 @@ ifdef(`distro_redhat',`
|
@@ -540,6 +837,7 @@ ifdef(`distro_redhat',`
|
||||||
miscfiles_rw_localization(initrc_t)
|
miscfiles_rw_localization(initrc_t)
|
||||||
miscfiles_setattr_localization(initrc_t)
|
miscfiles_setattr_localization(initrc_t)
|
||||||
miscfiles_relabel_localization(initrc_t)
|
miscfiles_relabel_localization(initrc_t)
|
||||||
@ -28363,7 +28355,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
miscfiles_read_fonts(initrc_t)
|
miscfiles_read_fonts(initrc_t)
|
||||||
miscfiles_read_hwdata(initrc_t)
|
miscfiles_read_hwdata(initrc_t)
|
||||||
@@ -549,8 +848,44 @@ ifdef(`distro_redhat',`
|
@@ -549,8 +847,44 @@ ifdef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28408,7 +28400,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -558,14 +893,31 @@ ifdef(`distro_redhat',`
|
@@ -558,14 +892,31 @@ ifdef(`distro_redhat',`
|
||||||
rpc_write_exports(initrc_t)
|
rpc_write_exports(initrc_t)
|
||||||
rpc_manage_nfs_state_data(initrc_t)
|
rpc_manage_nfs_state_data(initrc_t)
|
||||||
')
|
')
|
||||||
@ -28440,7 +28432,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -576,6 +928,39 @@ ifdef(`distro_suse',`
|
@@ -576,6 +927,39 @@ ifdef(`distro_suse',`
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -28480,7 +28472,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
amavis_search_lib(initrc_t)
|
amavis_search_lib(initrc_t)
|
||||||
amavis_setattr_pid_files(initrc_t)
|
amavis_setattr_pid_files(initrc_t)
|
||||||
@@ -588,6 +973,8 @@ optional_policy(`
|
@@ -588,6 +972,8 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
apache_read_config(initrc_t)
|
apache_read_config(initrc_t)
|
||||||
apache_list_modules(initrc_t)
|
apache_list_modules(initrc_t)
|
||||||
@ -28489,7 +28481,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -609,6 +996,7 @@ optional_policy(`
|
@@ -609,6 +995,7 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
cgroup_stream_connect_cgred(initrc_t)
|
cgroup_stream_connect_cgred(initrc_t)
|
||||||
@ -28497,7 +28489,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -625,6 +1013,17 @@ optional_policy(`
|
@@ -625,6 +1012,17 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28515,7 +28507,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
dev_getattr_printer_dev(initrc_t)
|
dev_getattr_printer_dev(initrc_t)
|
||||||
|
|
||||||
cups_read_log(initrc_t)
|
cups_read_log(initrc_t)
|
||||||
@@ -641,9 +1040,13 @@ optional_policy(`
|
@@ -641,9 +1039,13 @@ optional_policy(`
|
||||||
dbus_connect_system_bus(initrc_t)
|
dbus_connect_system_bus(initrc_t)
|
||||||
dbus_system_bus_client(initrc_t)
|
dbus_system_bus_client(initrc_t)
|
||||||
dbus_read_config(initrc_t)
|
dbus_read_config(initrc_t)
|
||||||
@ -28529,7 +28521,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -656,15 +1059,11 @@ optional_policy(`
|
@@ -656,15 +1058,11 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28547,7 +28539,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -685,6 +1084,15 @@ optional_policy(`
|
@@ -685,6 +1083,15 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28563,7 +28555,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
inn_exec_config(initrc_t)
|
inn_exec_config(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -725,6 +1133,7 @@ optional_policy(`
|
@@ -725,6 +1132,7 @@ optional_policy(`
|
||||||
lpd_list_spool(initrc_t)
|
lpd_list_spool(initrc_t)
|
||||||
|
|
||||||
lpd_read_config(initrc_t)
|
lpd_read_config(initrc_t)
|
||||||
@ -28571,7 +28563,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -742,7 +1151,13 @@ optional_policy(`
|
@@ -742,7 +1150,13 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28586,7 +28578,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
mta_dontaudit_read_spool_symlinks(initrc_t)
|
mta_dontaudit_read_spool_symlinks(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -765,6 +1180,10 @@ optional_policy(`
|
@@ -765,6 +1179,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28597,7 +28589,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
postgresql_manage_db(initrc_t)
|
postgresql_manage_db(initrc_t)
|
||||||
postgresql_read_config(initrc_t)
|
postgresql_read_config(initrc_t)
|
||||||
')
|
')
|
||||||
@@ -774,10 +1193,20 @@ optional_policy(`
|
@@ -774,10 +1192,20 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28618,7 +28610,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
quota_manage_flags(initrc_t)
|
quota_manage_flags(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -786,6 +1215,10 @@ optional_policy(`
|
@@ -786,6 +1214,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28629,7 +28621,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
fs_write_ramfs_sockets(initrc_t)
|
fs_write_ramfs_sockets(initrc_t)
|
||||||
fs_search_ramfs(initrc_t)
|
fs_search_ramfs(initrc_t)
|
||||||
|
|
||||||
@@ -807,8 +1240,6 @@ optional_policy(`
|
@@ -807,8 +1239,6 @@ optional_policy(`
|
||||||
# bash tries ioctl for some reason
|
# bash tries ioctl for some reason
|
||||||
files_dontaudit_ioctl_all_pids(initrc_t)
|
files_dontaudit_ioctl_all_pids(initrc_t)
|
||||||
|
|
||||||
@ -28638,7 +28630,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -817,6 +1248,10 @@ optional_policy(`
|
@@ -817,6 +1247,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28649,7 +28641,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
# shorewall-init script run /var/lib/shorewall/firewall
|
# shorewall-init script run /var/lib/shorewall/firewall
|
||||||
shorewall_lib_domtrans(initrc_t)
|
shorewall_lib_domtrans(initrc_t)
|
||||||
')
|
')
|
||||||
@@ -826,10 +1261,12 @@ optional_policy(`
|
@@ -826,10 +1260,12 @@ optional_policy(`
|
||||||
squid_manage_logs(initrc_t)
|
squid_manage_logs(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -28662,7 +28654,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
ssh_dontaudit_read_server_keys(initrc_t)
|
ssh_dontaudit_read_server_keys(initrc_t)
|
||||||
@@ -856,12 +1293,28 @@ optional_policy(`
|
@@ -856,12 +1292,28 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28692,7 +28684,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
# system-config-services causes avc messages that should be dontaudited
|
# system-config-services causes avc messages that should be dontaudited
|
||||||
@@ -871,6 +1324,18 @@ optional_policy(`
|
@@ -871,6 +1323,18 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
mono_domtrans(initrc_t)
|
mono_domtrans(initrc_t)
|
||||||
')
|
')
|
||||||
@ -28711,7 +28703,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -886,6 +1351,10 @@ optional_policy(`
|
@@ -886,6 +1350,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -28722,7 +28714,7 @@ index dd3be8d..729cc4f 100644
|
|||||||
# Set device ownerships/modes.
|
# Set device ownerships/modes.
|
||||||
xserver_setattr_console_pipes(initrc_t)
|
xserver_setattr_console_pipes(initrc_t)
|
||||||
|
|
||||||
@@ -896,3 +1365,196 @@ optional_policy(`
|
@@ -896,3 +1364,196 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
zebra_read_config(initrc_t)
|
zebra_read_config(initrc_t)
|
||||||
')
|
')
|
||||||
|
@ -2957,10 +2957,10 @@ index 0000000..fd48ed9
|
|||||||
+ spamassassin_read_pid_files(antivirus_domain)
|
+ spamassassin_read_pid_files(antivirus_domain)
|
||||||
+')
|
+')
|
||||||
diff --git a/apache.fc b/apache.fc
|
diff --git a/apache.fc b/apache.fc
|
||||||
index 550a69e..53e5708 100644
|
index 550a69e..842225c 100644
|
||||||
--- a/apache.fc
|
--- a/apache.fc
|
||||||
+++ b/apache.fc
|
+++ b/apache.fc
|
||||||
@@ -1,161 +1,196 @@
|
@@ -1,161 +1,199 @@
|
||||||
-HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
|
-HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
|
||||||
-HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
|
-HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
|
||||||
+HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
|
+HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
|
||||||
@ -3024,6 +3024,7 @@ index 550a69e..53e5708 100644
|
|||||||
|
|
||||||
-/usr/.*\.cgi -- gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
-/usr/.*\.cgi -- gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
||||||
+/srv/([^/]*/)?www(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
+/srv/([^/]*/)?www(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
||||||
|
+/srv/([^/]*/)?www/logs(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
|
||||||
+/srv/gallery2(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
+/srv/gallery2(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
||||||
|
|
||||||
-/usr/bin/htsslpass -- gen_context(system_u:object_r:httpd_helper_exec_t,s0)
|
-/usr/bin/htsslpass -- gen_context(system_u:object_r:httpd_helper_exec_t,s0)
|
||||||
@ -3166,6 +3167,8 @@ index 550a69e..53e5708 100644
|
|||||||
+/var/lib/mod_security(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
|
+/var/lib/mod_security(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
|
||||||
+/var/lib/nginx(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
|
+/var/lib/nginx(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0)
|
||||||
+/var/lib/php/session(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
+/var/lib/php/session(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
|
+/var/lib/php/wsdlcache(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
|
+
|
||||||
/var/lib/squirrelmail/prefs(/.*)? gen_context(system_u:object_r:httpd_squirrelmail_t,s0)
|
/var/lib/squirrelmail/prefs(/.*)? gen_context(system_u:object_r:httpd_squirrelmail_t,s0)
|
||||||
-/var/lib/stickshift/.httpd.d(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
|
-/var/lib/stickshift/.httpd.d(/.*)? gen_context(system_u:object_r:httpd_config_t,s0)
|
||||||
-/var/lib/svn(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
|
-/var/lib/svn(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
|
||||||
@ -3230,6 +3233,7 @@ index 550a69e..53e5708 100644
|
|||||||
+/var/www/[^/]*/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
+/var/www/[^/]*/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
||||||
+/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
+/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
||||||
+/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
+/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
||||||
|
+/var/www/miq/vmdb/log(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
|
||||||
+/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
+/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
|
||||||
|
|
||||||
-/var/run/apache.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
-/var/run/apache.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
@ -3292,7 +3296,6 @@ index 550a69e..53e5708 100644
|
|||||||
+/var/www/svn/conf(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
+/var/www/svn/conf(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
|
||||||
+
|
+
|
||||||
+/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
|
+/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
|
||||||
+
|
|
||||||
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
|
||||||
diff --git a/apache.if b/apache.if
|
diff --git a/apache.if b/apache.if
|
||||||
@ -10778,10 +10781,10 @@ index 0000000..5977d96
|
|||||||
+')
|
+')
|
||||||
diff --git a/chrome.te b/chrome.te
|
diff --git a/chrome.te b/chrome.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..25f2d55
|
index 0000000..406f3a0
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/chrome.te
|
+++ b/chrome.te
|
||||||
@@ -0,0 +1,238 @@
|
@@ -0,0 +1,242 @@
|
||||||
+policy_module(chrome,1.0.0)
|
+policy_module(chrome,1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -10958,6 +10961,10 @@ index 0000000..25f2d55
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
|
+ cups_stream_connect(chrome_sandbox_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ sandbox_use_ptys(chrome_sandbox_t)
|
+ sandbox_use_ptys(chrome_sandbox_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
@ -23744,7 +23751,7 @@ index c3f7916..cab3954 100644
|
|||||||
admin_pattern($1, fetchmail_etc_t)
|
admin_pattern($1, fetchmail_etc_t)
|
||||||
|
|
||||||
diff --git a/fetchmail.te b/fetchmail.te
|
diff --git a/fetchmail.te b/fetchmail.te
|
||||||
index f0388cb..8e7f99e 100644
|
index f0388cb..2e94f0e 100644
|
||||||
--- a/fetchmail.te
|
--- a/fetchmail.te
|
||||||
+++ b/fetchmail.te
|
+++ b/fetchmail.te
|
||||||
@@ -32,15 +32,13 @@ files_type(fetchmail_uidl_cache_t)
|
@@ -32,15 +32,13 @@ files_type(fetchmail_uidl_cache_t)
|
||||||
@ -23786,7 +23793,7 @@ index f0388cb..8e7f99e 100644
|
|||||||
corenet_all_recvfrom_netlabel(fetchmail_t)
|
corenet_all_recvfrom_netlabel(fetchmail_t)
|
||||||
corenet_tcp_sendrecv_generic_if(fetchmail_t)
|
corenet_tcp_sendrecv_generic_if(fetchmail_t)
|
||||||
corenet_tcp_sendrecv_generic_node(fetchmail_t)
|
corenet_tcp_sendrecv_generic_node(fetchmail_t)
|
||||||
@@ -84,15 +86,19 @@ fs_search_auto_mountpoints(fetchmail_t)
|
@@ -84,15 +86,23 @@ fs_search_auto_mountpoints(fetchmail_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(fetchmail_t)
|
domain_use_interactive_fds(fetchmail_t)
|
||||||
|
|
||||||
@ -23804,6 +23811,10 @@ index f0388cb..8e7f99e 100644
|
|||||||
-userdom_search_user_home_dirs(fetchmail_t)
|
-userdom_search_user_home_dirs(fetchmail_t)
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
|
+ mta_send_mail(fetchmail_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ kerberos_use(fetchmail_t)
|
+ kerberos_use(fetchmail_t)
|
||||||
+')
|
+')
|
||||||
|
|
||||||
@ -30375,7 +30386,7 @@ index ac00fb0..36ef2e5 100644
|
|||||||
+ userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs")
|
+ userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs")
|
||||||
')
|
')
|
||||||
diff --git a/irc.te b/irc.te
|
diff --git a/irc.te b/irc.te
|
||||||
index ecad9c7..86d790f 100644
|
index ecad9c7..e413e5a 100644
|
||||||
--- a/irc.te
|
--- a/irc.te
|
||||||
+++ b/irc.te
|
+++ b/irc.te
|
||||||
@@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t
|
@@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t
|
||||||
@ -30449,7 +30460,7 @@ index ecad9c7..86d790f 100644
|
|||||||
|
|
||||||
fs_getattr_all_fs(irc_t)
|
fs_getattr_all_fs(irc_t)
|
||||||
fs_search_auto_mountpoints(irc_t)
|
fs_search_auto_mountpoints(irc_t)
|
||||||
@@ -106,13 +120,15 @@ auth_use_nsswitch(irc_t)
|
@@ -106,15 +120,18 @@ auth_use_nsswitch(irc_t)
|
||||||
init_read_utmp(irc_t)
|
init_read_utmp(irc_t)
|
||||||
init_dontaudit_lock_utmp(irc_t)
|
init_dontaudit_lock_utmp(irc_t)
|
||||||
|
|
||||||
@ -30466,8 +30477,11 @@ index ecad9c7..86d790f 100644
|
|||||||
+userdom_use_inherited_user_terminals(irc_t)
|
+userdom_use_inherited_user_terminals(irc_t)
|
||||||
|
|
||||||
tunable_policy(`irc_use_any_tcp_ports',`
|
tunable_policy(`irc_use_any_tcp_ports',`
|
||||||
|
+ allow irc_t self:tcp_socket create_stream_socket_perms;
|
||||||
corenet_sendrecv_all_server_packets(irc_t)
|
corenet_sendrecv_all_server_packets(irc_t)
|
||||||
@@ -122,18 +138,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
|
corenet_tcp_bind_all_unreserved_ports(irc_t)
|
||||||
|
corenet_sendrecv_all_client_packets(irc_t)
|
||||||
|
@@ -122,18 +139,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
|
||||||
corenet_tcp_sendrecv_all_ports(irc_t)
|
corenet_tcp_sendrecv_all_ports(irc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -39971,7 +39985,7 @@ index 6194b80..bb32d40 100644
|
|||||||
')
|
')
|
||||||
+
|
+
|
||||||
diff --git a/mozilla.te b/mozilla.te
|
diff --git a/mozilla.te b/mozilla.te
|
||||||
index 6a306ee..2108bc7 100644
|
index 6a306ee..a74ab9d 100644
|
||||||
--- a/mozilla.te
|
--- a/mozilla.te
|
||||||
+++ b/mozilla.te
|
+++ b/mozilla.te
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,4 +1,4 @@
|
||||||
@ -40242,11 +40256,11 @@ index 6a306ee..2108bc7 100644
|
|||||||
miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
|
miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
|
||||||
|
|
||||||
-userdom_use_user_ptys(mozilla_t)
|
-userdom_use_user_ptys(mozilla_t)
|
||||||
+userdom_use_inherited_user_ptys(mozilla_t)
|
-
|
||||||
|
|
||||||
-userdom_manage_user_tmp_dirs(mozilla_t)
|
-userdom_manage_user_tmp_dirs(mozilla_t)
|
||||||
-userdom_manage_user_tmp_files(mozilla_t)
|
-userdom_manage_user_tmp_files(mozilla_t)
|
||||||
-
|
+userdom_use_inherited_user_ptys(mozilla_t)
|
||||||
|
|
||||||
-userdom_manage_user_home_content_dirs(mozilla_t)
|
-userdom_manage_user_home_content_dirs(mozilla_t)
|
||||||
-userdom_manage_user_home_content_files(mozilla_t)
|
-userdom_manage_user_home_content_files(mozilla_t)
|
||||||
-userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
|
-userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
|
||||||
@ -40415,7 +40429,7 @@ index 6a306ee..2108bc7 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -300,221 +324,184 @@ optional_policy(`
|
@@ -300,259 +324,234 @@ optional_policy(`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -40498,12 +40512,12 @@ index 6a306ee..2108bc7 100644
|
|||||||
allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms;
|
allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms;
|
||||||
-allow mozilla_plugin_t mozilla_plugin_rw_t:file read_file_perms;
|
-allow mozilla_plugin_t mozilla_plugin_rw_t:file read_file_perms;
|
||||||
-allow mozilla_plugin_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
|
-allow mozilla_plugin_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
|
||||||
-
|
|
||||||
-dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
|
|
||||||
-stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
|
|
||||||
+read_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
|
+read_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
|
||||||
+read_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
|
+read_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
|
||||||
|
|
||||||
|
-dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
|
||||||
|
-stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t)
|
||||||
|
-
|
||||||
-can_exec(mozilla_plugin_t, { mozilla_exec_t mozilla_plugin_home_t mozilla_plugin_tmp_t })
|
-can_exec(mozilla_plugin_t, { mozilla_exec_t mozilla_plugin_home_t mozilla_plugin_tmp_t })
|
||||||
+can_exec(mozilla_plugin_t, mozilla_exec_t)
|
+can_exec(mozilla_plugin_t, mozilla_exec_t)
|
||||||
|
|
||||||
@ -40673,12 +40687,12 @@ index 6a306ee..2108bc7 100644
|
|||||||
|
|
||||||
-userdom_manage_user_tmp_dirs(mozilla_plugin_t)
|
-userdom_manage_user_tmp_dirs(mozilla_plugin_t)
|
||||||
-userdom_manage_user_tmp_files(mozilla_plugin_t)
|
-userdom_manage_user_tmp_files(mozilla_plugin_t)
|
||||||
-
|
+systemd_read_logind_sessions_files(mozilla_plugin_t)
|
||||||
|
|
||||||
-userdom_manage_user_home_content_dirs(mozilla_plugin_t)
|
-userdom_manage_user_home_content_dirs(mozilla_plugin_t)
|
||||||
-userdom_manage_user_home_content_files(mozilla_plugin_t)
|
-userdom_manage_user_home_content_files(mozilla_plugin_t)
|
||||||
-userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
|
-userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
|
||||||
+systemd_read_logind_sessions_files(mozilla_plugin_t)
|
-
|
||||||
|
|
||||||
-userdom_write_user_tmp_sockets(mozilla_plugin_t)
|
-userdom_write_user_tmp_sockets(mozilla_plugin_t)
|
||||||
+term_getattr_all_ttys(mozilla_plugin_t)
|
+term_getattr_all_ttys(mozilla_plugin_t)
|
||||||
+term_getattr_all_ptys(mozilla_plugin_t)
|
+term_getattr_all_ptys(mozilla_plugin_t)
|
||||||
@ -40702,14 +40716,22 @@ index 6a306ee..2108bc7 100644
|
|||||||
-ifndef(`enable_mls',`
|
-ifndef(`enable_mls',`
|
||||||
- fs_list_dos(mozilla_plugin_t)
|
- fs_list_dos(mozilla_plugin_t)
|
||||||
- fs_read_dos_files(mozilla_plugin_t)
|
- fs_read_dos_files(mozilla_plugin_t)
|
||||||
-
|
+userdom_read_user_home_content_files(mozilla_plugin_t)
|
||||||
|
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
|
||||||
|
+userdom_read_home_certs(mozilla_plugin_t)
|
||||||
|
+userdom_read_home_audio_files(mozilla_plugin_t)
|
||||||
|
+userdom_exec_user_tmp_files(mozilla_plugin_t)
|
||||||
|
|
||||||
- fs_search_removable(mozilla_plugin_t)
|
- fs_search_removable(mozilla_plugin_t)
|
||||||
- fs_read_removable_files(mozilla_plugin_t)
|
- fs_read_removable_files(mozilla_plugin_t)
|
||||||
- fs_read_removable_symlinks(mozilla_plugin_t)
|
- fs_read_removable_symlinks(mozilla_plugin_t)
|
||||||
-
|
+userdom_home_manager(mozilla_plugin_t)
|
||||||
|
|
||||||
- fs_read_iso9660_files(mozilla_plugin_t)
|
- fs_read_iso9660_files(mozilla_plugin_t)
|
||||||
-')
|
+tunable_policy(`mozilla_plugin_can_network_connect',`
|
||||||
-
|
+ corenet_tcp_connect_all_ports(mozilla_plugin_t)
|
||||||
|
')
|
||||||
|
|
||||||
-tunable_policy(`allow_execmem',`
|
-tunable_policy(`allow_execmem',`
|
||||||
- allow mozilla_plugin_t self:process execmem;
|
- allow mozilla_plugin_t self:process execmem;
|
||||||
-')
|
-')
|
||||||
@ -40717,43 +40739,46 @@ index 6a306ee..2108bc7 100644
|
|||||||
-tunable_policy(`mozilla_execstack',`
|
-tunable_policy(`mozilla_execstack',`
|
||||||
- allow mozilla_plugin_t self:process { execmem execstack };
|
- allow mozilla_plugin_t self:process { execmem execstack };
|
||||||
-')
|
-')
|
||||||
+userdom_read_user_home_content_files(mozilla_plugin_t)
|
-
|
||||||
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
|
|
||||||
+userdom_read_home_certs(mozilla_plugin_t)
|
|
||||||
+userdom_read_home_audio_files(mozilla_plugin_t)
|
|
||||||
+userdom_exec_user_tmp_files(mozilla_plugin_t)
|
|
||||||
|
|
||||||
-tunable_policy(`use_nfs_home_dirs',`
|
-tunable_policy(`use_nfs_home_dirs',`
|
||||||
- fs_manage_nfs_dirs(mozilla_plugin_t)
|
- fs_manage_nfs_dirs(mozilla_plugin_t)
|
||||||
- fs_manage_nfs_files(mozilla_plugin_t)
|
- fs_manage_nfs_files(mozilla_plugin_t)
|
||||||
- fs_manage_nfs_symlinks(mozilla_plugin_t)
|
- fs_manage_nfs_symlinks(mozilla_plugin_t)
|
||||||
-')
|
+optional_policy(`
|
||||||
+userdom_home_manager(mozilla_plugin_t)
|
+ alsa_read_rw_config(mozilla_plugin_t)
|
||||||
|
+ alsa_read_home_files(mozilla_plugin_t)
|
||||||
|
')
|
||||||
|
|
||||||
-tunable_policy(`use_samba_home_dirs',`
|
-tunable_policy(`use_samba_home_dirs',`
|
||||||
- fs_manage_cifs_dirs(mozilla_plugin_t)
|
- fs_manage_cifs_dirs(mozilla_plugin_t)
|
||||||
- fs_manage_cifs_files(mozilla_plugin_t)
|
- fs_manage_cifs_files(mozilla_plugin_t)
|
||||||
- fs_manage_cifs_symlinks(mozilla_plugin_t)
|
- fs_manage_cifs_symlinks(mozilla_plugin_t)
|
||||||
+tunable_policy(`mozilla_plugin_can_network_connect',`
|
+optional_policy(`
|
||||||
+ corenet_tcp_connect_all_ports(mozilla_plugin_t)
|
+ apache_list_modules(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -523,36 +510,44 @@ optional_policy(`
|
- alsa_read_rw_config(mozilla_plugin_t)
|
||||||
|
- alsa_read_home_files(mozilla_plugin_t)
|
||||||
|
+ cups_stream_connect(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
- automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_t)
|
- automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_t)
|
||||||
+ apache_list_modules(mozilla_plugin_t)
|
+ dbus_system_bus_client(mozilla_plugin_t)
|
||||||
|
+ dbus_session_bus_client(mozilla_plugin_t)
|
||||||
|
+ dbus_connect_session_bus(mozilla_plugin_t)
|
||||||
|
+ dbus_read_lib_files(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
- dbus_all_session_bus_client(mozilla_plugin_t)
|
- dbus_all_session_bus_client(mozilla_plugin_t)
|
||||||
- dbus_connect_all_session_bus(mozilla_plugin_t)
|
- dbus_connect_all_session_bus(mozilla_plugin_t)
|
||||||
dbus_system_bus_client(mozilla_plugin_t)
|
- dbus_system_bus_client(mozilla_plugin_t)
|
||||||
+ dbus_session_bus_client(mozilla_plugin_t)
|
+ gnome_manage_config(mozilla_plugin_t)
|
||||||
+ dbus_connect_session_bus(mozilla_plugin_t)
|
+ gnome_read_usr_config(mozilla_plugin_t)
|
||||||
+ dbus_read_lib_files(mozilla_plugin_t)
|
+ gnome_filetrans_home_content(mozilla_plugin_t)
|
||||||
|
+ gnome_exec_gstreamer_home_files(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -40761,13 +40786,6 @@ index 6a306ee..2108bc7 100644
|
|||||||
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome")
|
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome")
|
||||||
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2")
|
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2")
|
||||||
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2_private")
|
- gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2_private")
|
||||||
+ gnome_manage_config(mozilla_plugin_t)
|
|
||||||
+ gnome_read_usr_config(mozilla_plugin_t)
|
|
||||||
+ gnome_filetrans_home_content(mozilla_plugin_t)
|
|
||||||
+ gnome_exec_gstreamer_home_files(mozilla_plugin_t)
|
|
||||||
+')
|
|
||||||
+
|
|
||||||
+optional_policy(`
|
|
||||||
+ gpm_dontaudit_getattr_gpmctl(mozilla_plugin_t)
|
+ gpm_dontaudit_getattr_gpmctl(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -40797,7 +40815,7 @@ index 6a306ee..2108bc7 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -560,7 +555,7 @@ optional_policy(`
|
@@ -560,7 +559,7 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -40806,7 +40824,7 @@ index 6a306ee..2108bc7 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -568,108 +563,128 @@ optional_policy(`
|
@@ -568,108 +567,128 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -40993,10 +41011,16 @@ index 6a306ee..2108bc7 100644
|
|||||||
+ fs_manage_dos_files(mozilla_plugin_t)
|
+ fs_manage_dos_files(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
diff --git a/mpd.fc b/mpd.fc
|
diff --git a/mpd.fc b/mpd.fc
|
||||||
index 313ce52..6aa46d2 100644
|
index 313ce52..ae93e07 100644
|
||||||
--- a/mpd.fc
|
--- a/mpd.fc
|
||||||
+++ b/mpd.fc
|
+++ b/mpd.fc
|
||||||
@@ -9,3 +9,5 @@
|
@@ -1,3 +1,5 @@
|
||||||
|
+HOME_DIR/\.mpd(/.*)? gen_context(system_u:object_r:mpd_home_t,s0)
|
||||||
|
+
|
||||||
|
/etc/mpd\.conf -- gen_context(system_u:object_r:mpd_etc_t,s0)
|
||||||
|
|
||||||
|
/etc/rc\.d/init\.d/mpd -- gen_context(system_u:object_r:mpd_initrc_exec_t,s0)
|
||||||
|
@@ -9,3 +11,5 @@
|
||||||
/var/lib/mpd/playlists(/.*)? gen_context(system_u:object_r:mpd_data_t,s0)
|
/var/lib/mpd/playlists(/.*)? gen_context(system_u:object_r:mpd_data_t,s0)
|
||||||
|
|
||||||
/var/log/mpd(/.*)? gen_context(system_u:object_r:mpd_log_t,s0)
|
/var/log/mpd(/.*)? gen_context(system_u:object_r:mpd_log_t,s0)
|
||||||
@ -41048,13 +41072,16 @@ index 5fa77c7..2e01c7d 100644
|
|||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
role_transition $2 mpd_initrc_exec_t system_r;
|
role_transition $2 mpd_initrc_exec_t system_r;
|
||||||
diff --git a/mpd.te b/mpd.te
|
diff --git a/mpd.te b/mpd.te
|
||||||
index 7c8afcc..29d8881 100644
|
index 7c8afcc..41f4352 100644
|
||||||
--- a/mpd.te
|
--- a/mpd.te
|
||||||
+++ b/mpd.te
|
+++ b/mpd.te
|
||||||
@@ -62,18 +62,22 @@ files_type(mpd_var_lib_t)
|
@@ -62,18 +62,25 @@ files_type(mpd_var_lib_t)
|
||||||
type mpd_user_data_t;
|
type mpd_user_data_t;
|
||||||
userdom_user_home_content(mpd_user_data_t) # customizable
|
userdom_user_home_content(mpd_user_data_t) # customizable
|
||||||
|
|
||||||
|
+type mpd_home_t;
|
||||||
|
+userdom_user_home_content(mpd_home_t)
|
||||||
|
+
|
||||||
+type mpd_var_run_t;
|
+type mpd_var_run_t;
|
||||||
+files_pid_file(mpd_var_run_t)
|
+files_pid_file(mpd_var_run_t)
|
||||||
+
|
+
|
||||||
@ -41075,7 +41102,7 @@ index 7c8afcc..29d8881 100644
|
|||||||
|
|
||||||
allow mpd_t mpd_data_t:dir manage_dir_perms;
|
allow mpd_t mpd_data_t:dir manage_dir_perms;
|
||||||
allow mpd_t mpd_data_t:file manage_file_perms;
|
allow mpd_t mpd_data_t:file manage_file_perms;
|
||||||
@@ -104,13 +108,18 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
|
@@ -104,13 +111,22 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
|
||||||
manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
|
manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
|
||||||
files_var_lib_filetrans(mpd_t, mpd_var_lib_t, dir)
|
files_var_lib_filetrans(mpd_t, mpd_var_lib_t, dir)
|
||||||
|
|
||||||
@ -41084,6 +41111,10 @@ index 7c8afcc..29d8881 100644
|
|||||||
+manage_sock_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
|
+manage_sock_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
|
||||||
+manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
|
+manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
|
||||||
+files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file })
|
+files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file })
|
||||||
|
+
|
||||||
|
+manage_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
|
||||||
|
+manage_dirs_pattern(mpd_t, mpd_home_t, mpd_home_t)
|
||||||
|
+manage_lnk_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
|
||||||
+
|
+
|
||||||
kernel_getattr_proc(mpd_t)
|
kernel_getattr_proc(mpd_t)
|
||||||
kernel_read_system_state(mpd_t)
|
kernel_read_system_state(mpd_t)
|
||||||
@ -41095,7 +41126,7 @@ index 7c8afcc..29d8881 100644
|
|||||||
corenet_all_recvfrom_netlabel(mpd_t)
|
corenet_all_recvfrom_netlabel(mpd_t)
|
||||||
corenet_tcp_sendrecv_generic_if(mpd_t)
|
corenet_tcp_sendrecv_generic_if(mpd_t)
|
||||||
corenet_tcp_sendrecv_generic_node(mpd_t)
|
corenet_tcp_sendrecv_generic_node(mpd_t)
|
||||||
@@ -139,9 +148,9 @@ dev_read_sound(mpd_t)
|
@@ -139,9 +155,9 @@ dev_read_sound(mpd_t)
|
||||||
dev_write_sound(mpd_t)
|
dev_write_sound(mpd_t)
|
||||||
dev_read_sysfs(mpd_t)
|
dev_read_sysfs(mpd_t)
|
||||||
|
|
||||||
@ -41106,7 +41137,7 @@ index 7c8afcc..29d8881 100644
|
|||||||
fs_list_inotifyfs(mpd_t)
|
fs_list_inotifyfs(mpd_t)
|
||||||
fs_rw_anon_inodefs_files(mpd_t)
|
fs_rw_anon_inodefs_files(mpd_t)
|
||||||
fs_search_auto_mountpoints(mpd_t)
|
fs_search_auto_mountpoints(mpd_t)
|
||||||
@@ -150,7 +159,9 @@ auth_use_nsswitch(mpd_t)
|
@@ -150,7 +166,9 @@ auth_use_nsswitch(mpd_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(mpd_t)
|
logging_send_syslog_msg(mpd_t)
|
||||||
|
|
||||||
@ -41117,7 +41148,7 @@ index 7c8afcc..29d8881 100644
|
|||||||
|
|
||||||
tunable_policy(`mpd_enable_homedirs',`
|
tunable_policy(`mpd_enable_homedirs',`
|
||||||
userdom_search_user_home_dirs(mpd_t)
|
userdom_search_user_home_dirs(mpd_t)
|
||||||
@@ -191,7 +202,7 @@ optional_policy(`
|
@@ -191,7 +209,7 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41126,7 +41157,7 @@ index 7c8afcc..29d8881 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -199,6 +210,16 @@ optional_policy(`
|
@@ -199,6 +217,16 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -51833,7 +51864,7 @@ index 0000000..fdc4a03
|
|||||||
+')
|
+')
|
||||||
diff --git a/openshift.te b/openshift.te
|
diff --git a/openshift.te b/openshift.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..9724884
|
index 0000000..55c843c
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/openshift.te
|
+++ b/openshift.te
|
||||||
@@ -0,0 +1,549 @@
|
@@ -0,0 +1,549 @@
|
||||||
@ -52383,7 +52414,7 @@ index 0000000..9724884
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ ssh_exec_keygen(openshift_cron_t)
|
+ ssh_domtrans_keygen(openshift_cron_t)
|
||||||
+ ssh_dontaudit_read_server_keys(openshift_cron_t)
|
+ ssh_dontaudit_read_server_keys(openshift_cron_t)
|
||||||
+')
|
+')
|
||||||
diff --git a/openvpn.fc b/openvpn.fc
|
diff --git a/openvpn.fc b/openvpn.fc
|
||||||
@ -53732,7 +53763,7 @@ index bf59ef7..c050b37 100644
|
|||||||
+ manage_dirs_pattern($1, passenger_tmp_t, passenger_tmp_t)
|
+ manage_dirs_pattern($1, passenger_tmp_t, passenger_tmp_t)
|
||||||
')
|
')
|
||||||
diff --git a/passenger.te b/passenger.te
|
diff --git a/passenger.te b/passenger.te
|
||||||
index 4e114ff..6691677 100644
|
index 4e114ff..1b1cb71 100644
|
||||||
--- a/passenger.te
|
--- a/passenger.te
|
||||||
+++ b/passenger.te
|
+++ b/passenger.te
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,4 +1,4 @@
|
||||||
@ -53783,7 +53814,7 @@ index 4e114ff..6691677 100644
|
|||||||
|
|
||||||
manage_dirs_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
manage_dirs_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
||||||
manage_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
manage_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
||||||
@@ -45,19 +50,20 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
@@ -45,19 +50,22 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
||||||
manage_sock_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
manage_sock_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t)
|
||||||
files_pid_filetrans(passenger_t, passenger_var_run_t, { file dir sock_file })
|
files_pid_filetrans(passenger_t, passenger_var_run_t, { file dir sock_file })
|
||||||
|
|
||||||
@ -53796,6 +53827,8 @@ index 4e114ff..6691677 100644
|
|||||||
|
|
||||||
kernel_read_system_state(passenger_t)
|
kernel_read_system_state(passenger_t)
|
||||||
kernel_read_kernel_sysctls(passenger_t)
|
kernel_read_kernel_sysctls(passenger_t)
|
||||||
|
+kernel_read_network_state(passenger_t)
|
||||||
|
+kernel_read_net_sysctls(passenger_t)
|
||||||
|
|
||||||
corenet_all_recvfrom_netlabel(passenger_t)
|
corenet_all_recvfrom_netlabel(passenger_t)
|
||||||
-corenet_all_recvfrom_unlabeled(passenger_t)
|
-corenet_all_recvfrom_unlabeled(passenger_t)
|
||||||
@ -53809,7 +53842,7 @@ index 4e114ff..6691677 100644
|
|||||||
|
|
||||||
corecmd_exec_bin(passenger_t)
|
corecmd_exec_bin(passenger_t)
|
||||||
corecmd_exec_shell(passenger_t)
|
corecmd_exec_shell(passenger_t)
|
||||||
@@ -66,8 +72,6 @@ dev_read_urand(passenger_t)
|
@@ -66,14 +74,14 @@ dev_read_urand(passenger_t)
|
||||||
|
|
||||||
domain_read_all_domains_state(passenger_t)
|
domain_read_all_domains_state(passenger_t)
|
||||||
|
|
||||||
@ -53818,7 +53851,15 @@ index 4e114ff..6691677 100644
|
|||||||
auth_use_nsswitch(passenger_t)
|
auth_use_nsswitch(passenger_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(passenger_t)
|
logging_send_syslog_msg(passenger_t)
|
||||||
@@ -90,14 +94,21 @@ optional_policy(`
|
|
||||||
|
miscfiles_read_localization(passenger_t)
|
||||||
|
|
||||||
|
+sysnet_exec_ifconfig(passenger_t)
|
||||||
|
+
|
||||||
|
userdom_dontaudit_use_user_terminals(passenger_t)
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
@@ -90,14 +98,21 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -63265,7 +63306,7 @@ index 4ecda09..8c0b242 100644
|
|||||||
+/var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0)
|
+/var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0)
|
||||||
+/var/run/puppet(/.*)? gen_context(system_u:object_r:puppet_var_run_t,s0)
|
+/var/run/puppet(/.*)? gen_context(system_u:object_r:puppet_var_run_t,s0)
|
||||||
diff --git a/puppet.if b/puppet.if
|
diff --git a/puppet.if b/puppet.if
|
||||||
index 7cb8b1f..46650f0 100644
|
index 7cb8b1f..9422c90 100644
|
||||||
--- a/puppet.if
|
--- a/puppet.if
|
||||||
+++ b/puppet.if
|
+++ b/puppet.if
|
||||||
@@ -1,4 +1,32 @@
|
@@ -1,4 +1,32 @@
|
||||||
@ -63293,11 +63334,11 @@ index 7cb8b1f..46650f0 100644
|
|||||||
+#
|
+#
|
||||||
+interface(`puppet_domtrans_master',`
|
+interface(`puppet_domtrans_master',`
|
||||||
+ gen_require(`
|
+ gen_require(`
|
||||||
+ type puppetmaster_t, puppetmaster_t_exec_t;
|
+ type puppetmaster_t, puppetmaster_exec_t;
|
||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ corecmd_search_bin($1)
|
+ corecmd_search_bin($1)
|
||||||
+ domtrans_pattern($1, puppetmaster_t_exec_t, puppetmaster_t)
|
+ domtrans_pattern($1, puppetmaster_exec_t, puppetmaster_t)
|
||||||
+')
|
+')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -63576,7 +63617,7 @@ index 7cb8b1f..46650f0 100644
|
|||||||
|
|
||||||
- files_search_var_lib($1)
|
- files_search_var_lib($1)
|
||||||
- admin_pattern($1, puppet_var_lib_t)
|
- admin_pattern($1, puppet_var_lib_t)
|
||||||
+ logging_search_logs($1)
|
+ files_search_etc($1)
|
||||||
+ list_dirs_pattern($1, puppet_etc_t, puppet_etc_t)
|
+ list_dirs_pattern($1, puppet_etc_t, puppet_etc_t)
|
||||||
+ read_files_pattern($1, puppet_etc_t, puppet_etc_t)
|
+ read_files_pattern($1, puppet_etc_t, puppet_etc_t)
|
||||||
+')
|
+')
|
||||||
@ -82749,7 +82790,7 @@ index 634c6b4..e1edfd9 100644
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
diff --git a/sosreport.te b/sosreport.te
|
diff --git a/sosreport.te b/sosreport.te
|
||||||
index 703efa3..f9d6ed6 100644
|
index 703efa3..9610be1 100644
|
||||||
--- a/sosreport.te
|
--- a/sosreport.te
|
||||||
+++ b/sosreport.te
|
+++ b/sosreport.te
|
||||||
@@ -19,6 +19,9 @@ files_tmp_file(sosreport_tmp_t)
|
@@ -19,6 +19,9 @@ files_tmp_file(sosreport_tmp_t)
|
||||||
@ -82814,7 +82855,7 @@ index 703efa3..f9d6ed6 100644
|
|||||||
files_read_var_lib_files(sosreport_t)
|
files_read_var_lib_files(sosreport_t)
|
||||||
files_read_var_symlinks(sosreport_t)
|
files_read_var_symlinks(sosreport_t)
|
||||||
files_read_kernel_modules(sosreport_t)
|
files_read_kernel_modules(sosreport_t)
|
||||||
@@ -79,27 +95,41 @@ files_manage_etc_runtime_files(sosreport_t)
|
@@ -79,27 +95,42 @@ files_manage_etc_runtime_files(sosreport_t)
|
||||||
files_etc_filetrans_etc_runtime(sosreport_t, file)
|
files_etc_filetrans_etc_runtime(sosreport_t, file)
|
||||||
|
|
||||||
fs_getattr_all_fs(sosreport_t)
|
fs_getattr_all_fs(sosreport_t)
|
||||||
@ -82833,6 +82874,7 @@ index 703efa3..f9d6ed6 100644
|
|||||||
+files_read_non_security_files(sosreport_t)
|
+files_read_non_security_files(sosreport_t)
|
||||||
+
|
+
|
||||||
auth_use_nsswitch(sosreport_t)
|
auth_use_nsswitch(sosreport_t)
|
||||||
|
+auth_dontaudit_read_shadow(sosreport_t)
|
||||||
|
|
||||||
init_domtrans_script(sosreport_t)
|
init_domtrans_script(sosreport_t)
|
||||||
+init_getattr_initctl(sosreport_t)
|
+init_getattr_initctl(sosreport_t)
|
||||||
@ -82858,7 +82900,7 @@ index 703efa3..f9d6ed6 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -111,6 +141,11 @@ optional_policy(`
|
@@ -111,6 +142,11 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -86063,10 +86105,10 @@ index b42ec1d..91b8f71 100644
|
|||||||
tcsd_initrc_domtrans($1)
|
tcsd_initrc_domtrans($1)
|
||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
diff --git a/tcsd.te b/tcsd.te
|
diff --git a/tcsd.te b/tcsd.te
|
||||||
index ac8213a..20fa71f 100644
|
index ac8213a..14da480 100644
|
||||||
--- a/tcsd.te
|
--- a/tcsd.te
|
||||||
+++ b/tcsd.te
|
+++ b/tcsd.te
|
||||||
@@ -41,10 +41,6 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t)
|
@@ -41,10 +41,8 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t)
|
||||||
dev_read_urand(tcsd_t)
|
dev_read_urand(tcsd_t)
|
||||||
dev_rw_tpm(tcsd_t)
|
dev_rw_tpm(tcsd_t)
|
||||||
|
|
||||||
@ -86074,9 +86116,11 @@ index ac8213a..20fa71f 100644
|
|||||||
-
|
-
|
||||||
auth_use_nsswitch(tcsd_t)
|
auth_use_nsswitch(tcsd_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(tcsd_t)
|
-logging_send_syslog_msg(tcsd_t)
|
||||||
-
|
+init_read_utmp(tcsd_t)
|
||||||
|
|
||||||
-miscfiles_read_localization(tcsd_t)
|
-miscfiles_read_localization(tcsd_t)
|
||||||
|
+logging_send_syslog_msg(tcsd_t)
|
||||||
diff --git a/telepathy.fc b/telepathy.fc
|
diff --git a/telepathy.fc b/telepathy.fc
|
||||||
index c7de0cf..03fc880 100644
|
index c7de0cf..03fc880 100644
|
||||||
--- a/telepathy.fc
|
--- a/telepathy.fc
|
||||||
@ -92543,7 +92587,7 @@ index 9dec06c..4e31afe 100644
|
|||||||
+ allow $1 svirt_image_t:chr_file rw_file_perms;
|
+ allow $1 svirt_image_t:chr_file rw_file_perms;
|
||||||
')
|
')
|
||||||
diff --git a/virt.te b/virt.te
|
diff --git a/virt.te b/virt.te
|
||||||
index 1f22fba..348df8f 100644
|
index 1f22fba..50f7cf9 100644
|
||||||
--- a/virt.te
|
--- a/virt.te
|
||||||
+++ b/virt.te
|
+++ b/virt.te
|
||||||
@@ -1,94 +1,104 @@
|
@@ -1,94 +1,104 @@
|
||||||
@ -94302,7 +94346,7 @@ index 1f22fba..348df8f 100644
|
|||||||
allow virt_bridgehelper_t self:process { setcap getcap };
|
allow virt_bridgehelper_t self:process { setcap getcap };
|
||||||
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
|
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
|
||||||
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
|
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
|
||||||
@@ -1198,5 +1352,122 @@ kernel_read_network_state(virt_bridgehelper_t)
|
@@ -1198,5 +1352,123 @@ kernel_read_network_state(virt_bridgehelper_t)
|
||||||
|
|
||||||
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
|
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
|
||||||
|
|
||||||
@ -94419,6 +94463,7 @@ index 1f22fba..348df8f 100644
|
|||||||
+#
|
+#
|
||||||
+
|
+
|
||||||
+type svirt_socket_t;
|
+type svirt_socket_t;
|
||||||
|
+domain_type(svirt_socket_t)
|
||||||
+role system_r types svirt_socket_t;
|
+role system_r types svirt_socket_t;
|
||||||
+allow virtd_t svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
|
+allow virtd_t svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
|
||||||
+allow virt_domain svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
|
+allow virt_domain svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms };
|
||||||
@ -97518,25 +97563,32 @@ index 36e32df..3d08962 100644
|
|||||||
+ manage_dirs_pattern($1, zarafa_var_lib_t, zarafa_var_lib_t)
|
+ manage_dirs_pattern($1, zarafa_var_lib_t, zarafa_var_lib_t)
|
||||||
')
|
')
|
||||||
diff --git a/zarafa.te b/zarafa.te
|
diff --git a/zarafa.te b/zarafa.te
|
||||||
index a4479b1..7a9f1b6 100644
|
index a4479b1..a40d580 100644
|
||||||
--- a/zarafa.te
|
--- a/zarafa.te
|
||||||
+++ b/zarafa.te
|
+++ b/zarafa.te
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,13 +1,18 @@
|
||||||
-policy_module(zarafa, 1.1.4)
|
-policy_module(zarafa, 1.1.4)
|
||||||
+policy_module(zarafa, 1.1.0)
|
+policy_module(zarafa, 1.1.0)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@@ -6,8 +6,6 @@ policy_module(zarafa, 1.1.4)
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
|
+## <desc>
|
||||||
|
+## <p>
|
||||||
|
+## Allow zarafa domains to setrlimit/sys_rouserce.
|
||||||
|
+## </p>
|
||||||
|
+## </desc>
|
||||||
|
+gen_tunable(zarafa_setrlimit, false)
|
||||||
|
+
|
||||||
attribute zarafa_domain;
|
attribute zarafa_domain;
|
||||||
-attribute zarafa_logfile;
|
-attribute zarafa_logfile;
|
||||||
-attribute zarafa_pidfile;
|
-attribute zarafa_pidfile;
|
||||||
|
|
||||||
zarafa_domain_template(deliver)
|
zarafa_domain_template(deliver)
|
||||||
|
|
||||||
@@ -17,9 +15,6 @@ files_tmp_file(zarafa_deliver_tmp_t)
|
@@ -17,9 +22,6 @@ files_tmp_file(zarafa_deliver_tmp_t)
|
||||||
type zarafa_etc_t;
|
type zarafa_etc_t;
|
||||||
files_config_file(zarafa_etc_t)
|
files_config_file(zarafa_etc_t)
|
||||||
|
|
||||||
@ -97546,7 +97598,7 @@ index a4479b1..7a9f1b6 100644
|
|||||||
zarafa_domain_template(gateway)
|
zarafa_domain_template(gateway)
|
||||||
zarafa_domain_template(ical)
|
zarafa_domain_template(ical)
|
||||||
zarafa_domain_template(indexer)
|
zarafa_domain_template(indexer)
|
||||||
@@ -43,61 +38,74 @@ files_tmp_file(zarafa_var_lib_t)
|
@@ -43,61 +45,74 @@ files_tmp_file(zarafa_var_lib_t)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -97641,7 +97693,7 @@ index a4479b1..7a9f1b6 100644
|
|||||||
manage_dirs_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
|
manage_dirs_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
|
||||||
manage_files_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
|
manage_files_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t)
|
||||||
files_tmp_filetrans(zarafa_server_t, zarafa_server_tmp_t, { file dir })
|
files_tmp_filetrans(zarafa_server_t, zarafa_server_tmp_t, { file dir })
|
||||||
@@ -109,70 +117,80 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file }
|
@@ -109,70 +124,85 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file }
|
||||||
|
|
||||||
stream_connect_pattern(zarafa_server_t, zarafa_indexer_var_run_t, zarafa_indexer_var_run_t, zarafa_indexer_t)
|
stream_connect_pattern(zarafa_server_t, zarafa_indexer_var_run_t, zarafa_indexer_var_run_t, zarafa_indexer_t)
|
||||||
|
|
||||||
@ -97703,14 +97755,14 @@ index a4479b1..7a9f1b6 100644
|
|||||||
#
|
#
|
||||||
-# Zarafa domain local policy
|
-# Zarafa domain local policy
|
||||||
+# zarafa_gateway local policy
|
+# zarafa_gateway local policy
|
||||||
+#
|
#
|
||||||
+corenet_tcp_bind_pop_port(zarafa_gateway_t)
|
+corenet_tcp_bind_pop_port(zarafa_gateway_t)
|
||||||
+
|
|
||||||
+#######################################
|
+#######################################
|
||||||
+#
|
+#
|
||||||
+# zarafa-ical local policy
|
+# zarafa-ical local policy
|
||||||
#
|
+#
|
||||||
|
+
|
||||||
+corenet_tcp_bind_http_cache_port(zarafa_ical_t)
|
+corenet_tcp_bind_http_cache_port(zarafa_ical_t)
|
||||||
+
|
+
|
||||||
+######################################
|
+######################################
|
||||||
@ -97727,12 +97779,17 @@ index a4479b1..7a9f1b6 100644
|
|||||||
+# bad permission on /etc/zarafa
|
+# bad permission on /etc/zarafa
|
||||||
allow zarafa_domain self:capability { kill dac_override chown setgid setuid };
|
allow zarafa_domain self:capability { kill dac_override chown setgid setuid };
|
||||||
-allow zarafa_domain self:process { setrlimit signal };
|
-allow zarafa_domain self:process { setrlimit signal };
|
||||||
+allow zarafa_domain self:process { signal_perms setrlimit };
|
+allow zarafa_domain self:process { signal_perms };
|
||||||
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
|
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
|
||||||
-allow zarafa_domain self:tcp_socket { accept listen };
|
-allow zarafa_domain self:tcp_socket { accept listen };
|
||||||
-allow zarafa_domain self:unix_stream_socket { accept listen };
|
-allow zarafa_domain self:unix_stream_socket { accept listen };
|
||||||
+allow zarafa_domain self:tcp_socket create_stream_socket_perms;
|
+allow zarafa_domain self:tcp_socket create_stream_socket_perms;
|
||||||
+allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
|
+allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
+
|
||||||
|
+tunable_policy(`zarafa_setrlimit',`
|
||||||
|
+ allow zarafa_domain self:capability sys_resource;
|
||||||
|
+ allow zarafa_domain self:process setrlimit;
|
||||||
|
+')
|
||||||
|
|
||||||
stream_connect_pattern(zarafa_domain, zarafa_server_var_run_t, zarafa_server_var_run_t, zarafa_server_t)
|
stream_connect_pattern(zarafa_domain, zarafa_server_var_run_t, zarafa_server_var_run_t, zarafa_server_t)
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.12.1
|
Version: 3.12.1
|
||||||
Release: 80%{?dist}
|
Release: 81%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -570,6 +570,23 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Sep 19 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-81
|
||||||
|
- Dontaudit attempts by sosreport to read shadow_t
|
||||||
|
- Allow browser sandbox plugins to connect to cups to print
|
||||||
|
- Add new label mpd_home_t
|
||||||
|
- Label /srv/www/logs as httpd_log_t
|
||||||
|
- Add support for /var/lib/php/wsdlcache
|
||||||
|
- Add zarafa_setrlimit boolean
|
||||||
|
- Allow fetchmail to send mails
|
||||||
|
- Add labels for apache logs under miq package
|
||||||
|
- Allow irc_t to use tcp sockets
|
||||||
|
- fix labels in puppet.if
|
||||||
|
- Allow tcsd to read utmp file
|
||||||
|
- Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys
|
||||||
|
- Define svirt_socket_t as a domain_type
|
||||||
|
- Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t
|
||||||
|
- Fix label on pam_krb5 helper apps
|
||||||
|
|
||||||
* Thu Sep 12 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-80
|
* Thu Sep 12 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-80
|
||||||
- Allow ldconfig to write to kdumpctl fifo files
|
- Allow ldconfig to write to kdumpctl fifo files
|
||||||
- allow neutron to connect to amqp ports
|
- allow neutron to connect to amqp ports
|
||||||
|
Loading…
Reference in New Issue
Block a user