* Tue Aug 26 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-76
- Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t - Add a port definition for shellinaboxd - Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories - Allow thumb_t to read/write video devices - fail2ban 0.9 reads the journal by default. - Allow sandbox net domains to bind to rawip socket
This commit is contained in:
parent
f9cc8e052f
commit
45b429ef46
@ -5461,7 +5461,7 @@ index 8e0f9cd..b9f45b9 100644
|
|||||||
|
|
||||||
define(`create_packet_interfaces',``
|
define(`create_packet_interfaces',``
|
||||||
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
|
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
|
||||||
index b191055..9ae3918 100644
|
index b191055..68b9da6 100644
|
||||||
--- a/policy/modules/kernel/corenetwork.te.in
|
--- a/policy/modules/kernel/corenetwork.te.in
|
||||||
+++ b/policy/modules/kernel/corenetwork.te.in
|
+++ b/policy/modules/kernel/corenetwork.te.in
|
||||||
@@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2)
|
@@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2)
|
||||||
@ -5721,7 +5721,7 @@ index b191055..9ae3918 100644
|
|||||||
network_port(portmap, udp,111,s0, tcp,111,s0)
|
network_port(portmap, udp,111,s0, tcp,111,s0)
|
||||||
network_port(postfix_policyd, tcp,10031,s0)
|
network_port(postfix_policyd, tcp,10031,s0)
|
||||||
network_port(postgresql, tcp,5432,s0)
|
network_port(postgresql, tcp,5432,s0)
|
||||||
@@ -213,68 +267,78 @@ network_port(postgrey, tcp,60000,s0)
|
@@ -213,68 +267,79 @@ network_port(postgrey, tcp,60000,s0)
|
||||||
network_port(pptp, tcp,1723,s0, udp,1723,s0)
|
network_port(pptp, tcp,1723,s0, udp,1723,s0)
|
||||||
network_port(prelude, tcp,4690,s0, udp,4690,s0)
|
network_port(prelude, tcp,4690,s0, udp,4690,s0)
|
||||||
network_port(presence, tcp,5298-5299,s0, udp,5298-5299,s0)
|
network_port(presence, tcp,5298-5299,s0, udp,5298-5299,s0)
|
||||||
@ -5758,6 +5758,7 @@ index b191055..9ae3918 100644
|
|||||||
+network_port(saphostctrl, tcp,1128,s0, tcp,1129,s0)
|
+network_port(saphostctrl, tcp,1128,s0, tcp,1129,s0)
|
||||||
network_port(servistaitsm, tcp,3636,s0, udp,3636,s0)
|
network_port(servistaitsm, tcp,3636,s0, udp,3636,s0)
|
||||||
+network_port(sge, tcp,6444,s0, tcp,6445,s0)
|
+network_port(sge, tcp,6444,s0, tcp,6445,s0)
|
||||||
|
+network_port(shellinaboxd, tcp,4200,s0)
|
||||||
network_port(sieve, tcp,4190,s0)
|
network_port(sieve, tcp,4190,s0)
|
||||||
network_port(sip, tcp,5060,s0, udp,5060,s0, tcp,5061,s0, udp,5061,s0)
|
network_port(sip, tcp,5060,s0, udp,5060,s0, tcp,5061,s0, udp,5061,s0)
|
||||||
network_port(sixxsconfig, tcp,3874,s0, udp,3874,s0)
|
network_port(sixxsconfig, tcp,3874,s0, udp,3874,s0)
|
||||||
@ -5811,7 +5812,7 @@ index b191055..9ae3918 100644
|
|||||||
network_port(winshadow, tcp,3161,s0, udp,3261,s0)
|
network_port(winshadow, tcp,3161,s0, udp,3261,s0)
|
||||||
network_port(wsdapi, tcp,5357,s0, udp,5357,s0)
|
network_port(wsdapi, tcp,5357,s0, udp,5357,s0)
|
||||||
network_port(wsicopy, tcp,3378,s0, udp,3378,s0)
|
network_port(wsicopy, tcp,3378,s0, udp,3378,s0)
|
||||||
@@ -288,19 +352,23 @@ network_port(zabbix_agent, tcp,10050,s0)
|
@@ -288,19 +353,23 @@ network_port(zabbix_agent, tcp,10050,s0)
|
||||||
network_port(zookeeper_client, tcp,2181,s0)
|
network_port(zookeeper_client, tcp,2181,s0)
|
||||||
network_port(zookeeper_election, tcp,3888,s0)
|
network_port(zookeeper_election, tcp,3888,s0)
|
||||||
network_port(zookeeper_leader, tcp,2888,s0)
|
network_port(zookeeper_leader, tcp,2888,s0)
|
||||||
@ -5838,7 +5839,7 @@ index b191055..9ae3918 100644
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@@ -333,6 +401,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh)
|
@@ -333,6 +402,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh)
|
||||||
|
|
||||||
build_option(`enable_mls',`
|
build_option(`enable_mls',`
|
||||||
network_interface(lo, lo, s0 - mls_systemhigh)
|
network_interface(lo, lo, s0 - mls_systemhigh)
|
||||||
@ -5847,7 +5848,7 @@ index b191055..9ae3918 100644
|
|||||||
',`
|
',`
|
||||||
typealias netif_t alias { lo_netif_t netif_lo_t };
|
typealias netif_t alias { lo_netif_t netif_lo_t };
|
||||||
')
|
')
|
||||||
@@ -345,9 +415,28 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
|
@@ -345,9 +416,28 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
|
||||||
allow corenet_unconfined_type node_type:node *;
|
allow corenet_unconfined_type node_type:node *;
|
||||||
allow corenet_unconfined_type netif_type:netif *;
|
allow corenet_unconfined_type netif_type:netif *;
|
||||||
allow corenet_unconfined_type packet_type:packet *;
|
allow corenet_unconfined_type packet_type:packet *;
|
||||||
@ -44850,10 +44851,10 @@ index 5fe902d..fcc9efe 100644
|
|||||||
+ rpm_transition_script(unconfined_service_t, system_r)
|
+ rpm_transition_script(unconfined_service_t, system_r)
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/system/userdomain.fc b/policy/modules/system/userdomain.fc
|
diff --git a/policy/modules/system/userdomain.fc b/policy/modules/system/userdomain.fc
|
||||||
index db75976..8f5380f 100644
|
index db75976..1ee08ec 100644
|
||||||
--- a/policy/modules/system/userdomain.fc
|
--- a/policy/modules/system/userdomain.fc
|
||||||
+++ b/policy/modules/system/userdomain.fc
|
+++ b/policy/modules/system/userdomain.fc
|
||||||
@@ -1,4 +1,34 @@
|
@@ -1,4 +1,36 @@
|
||||||
HOME_DIR -d gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
|
HOME_DIR -d gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
|
||||||
+HOME_DIR -l gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
|
+HOME_DIR -l gen_context(system_u:object_r:user_home_dir_t,s0-mls_systemhigh)
|
||||||
HOME_DIR/.+ gen_context(system_u:object_r:user_home_t,s0)
|
HOME_DIR/.+ gen_context(system_u:object_r:user_home_t,s0)
|
||||||
@ -44877,6 +44878,8 @@ index db75976..8f5380f 100644
|
|||||||
+HOME_DIR/\.texlive2012(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
+HOME_DIR/\.texlive2012(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
||||||
+HOME_DIR/\.texlive2013(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
+HOME_DIR/\.texlive2013(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
||||||
+HOME_DIR/\.texlive2014(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
+HOME_DIR/\.texlive2014(/.*)? gen_context(system_u:object_r:texlive_home_t,s0)
|
||||||
|
+HOME_DIR/\.tmp -d gen_context(system_u:object_r:user_tmp_t,s0)
|
||||||
|
+HOME_DIR/tmp -d gen_context(system_u:object_r:user_tmp_t,s0)
|
||||||
+
|
+
|
||||||
+/tmp/\.X0-lock -- gen_context(system_u:object_r:user_tmp_t,s0)
|
+/tmp/\.X0-lock -- gen_context(system_u:object_r:user_tmp_t,s0)
|
||||||
+/tmp/\.X11-unix(/.*)? gen_context(system_u:object_r:user_tmp_t,s0)
|
+/tmp/\.X11-unix(/.*)? gen_context(system_u:object_r:user_tmp_t,s0)
|
||||||
@ -44890,7 +44893,7 @@ index db75976..8f5380f 100644
|
|||||||
+/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0)
|
+/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0)
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
|
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
|
||||||
index 9dc60c6..c198c77 100644
|
index 9dc60c6..ce8b28d 100644
|
||||||
--- a/policy/modules/system/userdomain.if
|
--- a/policy/modules/system/userdomain.if
|
||||||
+++ b/policy/modules/system/userdomain.if
|
+++ b/policy/modules/system/userdomain.if
|
||||||
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
|
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
|
||||||
@ -48183,7 +48186,7 @@ index 9dc60c6..c198c77 100644
|
|||||||
## Create keys for all user domains.
|
## Create keys for all user domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -3435,4 +4482,1684 @@ interface(`userdom_dbus_send_all_users',`
|
@@ -3435,4 +4482,1686 @@ interface(`userdom_dbus_send_all_users',`
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 userdomain:dbus send_msg;
|
allow $1 userdomain:dbus send_msg;
|
||||||
@ -48206,7 +48209,7 @@ index 9dc60c6..c198c77 100644
|
|||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ allow $1 userdomain:process rlimitinh;
|
+ allow $1 userdomain:process rlimitinh;
|
||||||
')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
+## <summary>
|
+## <summary>
|
||||||
@ -49669,6 +49672,7 @@ index 9dc60c6..c198c77 100644
|
|||||||
+ type home_bin_t;
|
+ type home_bin_t;
|
||||||
+ type audio_home_t;
|
+ type audio_home_t;
|
||||||
+ type home_cert_t;
|
+ type home_cert_t;
|
||||||
|
+ type user_tmp_t;
|
||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ userdom_user_home_dir_filetrans($1, home_bin_t, dir, "bin")
|
+ userdom_user_home_dir_filetrans($1, home_bin_t, dir, "bin")
|
||||||
@ -49677,6 +49681,8 @@ index 9dc60c6..c198c77 100644
|
|||||||
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, ".cert")
|
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, ".cert")
|
||||||
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, ".pki")
|
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, ".pki")
|
||||||
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, "certificates")
|
+ userdom_user_home_dir_filetrans($1, home_cert_t, dir, "certificates")
|
||||||
|
+ userdom_user_home_dir_filetrans($1, user_tmp_t, dir, "tmp")
|
||||||
|
+ userdom_user_home_dir_filetrans($1, user_tmp_t, dir, ".tmp")
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -49866,10 +49872,9 @@ index 9dc60c6..c198c77 100644
|
|||||||
+ optional_policy(`
|
+ optional_policy(`
|
||||||
+ samhain_run($1, $2)
|
+ samhain_run($1, $2)
|
||||||
+ ')
|
+ ')
|
||||||
+')
|
')
|
||||||
+
|
|
||||||
diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
|
diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
|
||||||
index f4ac38d..6c2695d 100644
|
index f4ac38d..7f49cde 100644
|
||||||
--- a/policy/modules/system/userdomain.te
|
--- a/policy/modules/system/userdomain.te
|
||||||
+++ b/policy/modules/system/userdomain.te
|
+++ b/policy/modules/system/userdomain.te
|
||||||
@@ -7,48 +7,43 @@ policy_module(userdomain, 4.9.1)
|
@@ -7,48 +7,43 @@ policy_module(userdomain, 4.9.1)
|
||||||
@ -49958,7 +49963,7 @@ index f4ac38d..6c2695d 100644
|
|||||||
type user_home_dir_t alias { staff_home_dir_t sysadm_home_dir_t secadm_home_dir_t auditadm_home_dir_t unconfined_home_dir_t };
|
type user_home_dir_t alias { staff_home_dir_t sysadm_home_dir_t secadm_home_dir_t auditadm_home_dir_t unconfined_home_dir_t };
|
||||||
fs_associate_tmpfs(user_home_dir_t)
|
fs_associate_tmpfs(user_home_dir_t)
|
||||||
files_type(user_home_dir_t)
|
files_type(user_home_dir_t)
|
||||||
@@ -70,26 +83,392 @@ ubac_constrained(user_home_dir_t)
|
@@ -70,26 +83,394 @@ ubac_constrained(user_home_dir_t)
|
||||||
|
|
||||||
type user_home_t alias { staff_home_t sysadm_home_t secadm_home_t auditadm_home_t unconfined_home_t };
|
type user_home_t alias { staff_home_t sysadm_home_t secadm_home_t auditadm_home_t unconfined_home_t };
|
||||||
typealias user_home_t alias { staff_untrusted_content_t sysadm_untrusted_content_t secadm_untrusted_content_t auditadm_untrusted_content_t unconfined_untrusted_content_t };
|
typealias user_home_t alias { staff_untrusted_content_t sysadm_untrusted_content_t secadm_untrusted_content_t auditadm_untrusted_content_t unconfined_untrusted_content_t };
|
||||||
@ -50131,6 +50136,8 @@ index f4ac38d..6c2695d 100644
|
|||||||
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2012")
|
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2012")
|
||||||
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2013")
|
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2013")
|
||||||
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2014")
|
+userdom_user_home_dir_filetrans(userdom_filetrans_type, texlive_home_t, dir, ".texlive2014")
|
||||||
|
+userdom_user_home_dir_filetrans(userdom_filetrans_type, user_tmp_t, dir, ".tmp")
|
||||||
|
+userdom_user_home_dir_filetrans(userdom_filetrans_type, user_tmp_t, dir, "tmp")
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ gnome_config_filetrans(userdom_filetrans_type, home_cert_t, dir, "certificates")
|
+ gnome_config_filetrans(userdom_filetrans_type, home_cert_t, dir, "certificates")
|
||||||
|
@ -26998,7 +26998,7 @@ index 50d0084..94e1936 100644
|
|||||||
|
|
||||||
fail2ban_run_client($1, $2)
|
fail2ban_run_client($1, $2)
|
||||||
diff --git a/fail2ban.te b/fail2ban.te
|
diff --git a/fail2ban.te b/fail2ban.te
|
||||||
index cf0e567..a743483 100644
|
index cf0e567..9ebb247 100644
|
||||||
--- a/fail2ban.te
|
--- a/fail2ban.te
|
||||||
+++ b/fail2ban.te
|
+++ b/fail2ban.te
|
||||||
@@ -37,7 +37,7 @@ role fail2ban_client_roles types fail2ban_client_t;
|
@@ -37,7 +37,7 @@ role fail2ban_client_roles types fail2ban_client_t;
|
||||||
@ -27026,12 +27026,13 @@ index cf0e567..a743483 100644
|
|||||||
files_list_var(fail2ban_t)
|
files_list_var(fail2ban_t)
|
||||||
files_dontaudit_list_tmp(fail2ban_t)
|
files_dontaudit_list_tmp(fail2ban_t)
|
||||||
|
|
||||||
@@ -92,24 +90,37 @@ fs_getattr_all_fs(fail2ban_t)
|
@@ -92,24 +90,38 @@ fs_getattr_all_fs(fail2ban_t)
|
||||||
auth_use_nsswitch(fail2ban_t)
|
auth_use_nsswitch(fail2ban_t)
|
||||||
|
|
||||||
logging_read_all_logs(fail2ban_t)
|
logging_read_all_logs(fail2ban_t)
|
||||||
+logging_read_audit_log(fail2ban_t)
|
+logging_read_audit_log(fail2ban_t)
|
||||||
logging_send_syslog_msg(fail2ban_t)
|
logging_send_syslog_msg(fail2ban_t)
|
||||||
|
+logging_read_syslog_pid(fail2ban_t)
|
||||||
+logging_dontaudit_search_audit_logs(fail2ban_t)
|
+logging_dontaudit_search_audit_logs(fail2ban_t)
|
||||||
|
|
||||||
-miscfiles_read_localization(fail2ban_t)
|
-miscfiles_read_localization(fail2ban_t)
|
||||||
@ -27068,7 +27069,7 @@ index cf0e567..a743483 100644
|
|||||||
iptables_domtrans(fail2ban_t)
|
iptables_domtrans(fail2ban_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -118,6 +129,10 @@ optional_policy(`
|
@@ -118,6 +130,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -27079,7 +27080,7 @@ index cf0e567..a743483 100644
|
|||||||
shorewall_domtrans(fail2ban_t)
|
shorewall_domtrans(fail2ban_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -131,22 +146,30 @@ allow fail2ban_client_t self:unix_stream_socket { create connect write read };
|
@@ -131,22 +147,30 @@ allow fail2ban_client_t self:unix_stream_socket { create connect write read };
|
||||||
|
|
||||||
domtrans_pattern(fail2ban_client_t, fail2ban_exec_t, fail2ban_t)
|
domtrans_pattern(fail2ban_client_t, fail2ban_exec_t, fail2ban_t)
|
||||||
|
|
||||||
@ -98911,10 +98912,10 @@ index 0000000..c1fd8b4
|
|||||||
+')
|
+')
|
||||||
diff --git a/thumb.te b/thumb.te
|
diff --git a/thumb.te b/thumb.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..ebb001b
|
index 0000000..bc96302
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/thumb.te
|
+++ b/thumb.te
|
||||||
@@ -0,0 +1,158 @@
|
@@ -0,0 +1,160 @@
|
||||||
+policy_module(thumb, 1.0.0)
|
+policy_module(thumb, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -98990,6 +98991,8 @@ index 0000000..ebb001b
|
|||||||
+dev_read_urand(thumb_t)
|
+dev_read_urand(thumb_t)
|
||||||
+dev_dontaudit_rw_dri(thumb_t)
|
+dev_dontaudit_rw_dri(thumb_t)
|
||||||
+dev_rw_xserver_misc(thumb_t)
|
+dev_rw_xserver_misc(thumb_t)
|
||||||
|
+dev_read_video_dev(thumb_t)
|
||||||
|
+dev_write_video_dev(thumb_t)
|
||||||
+
|
+
|
||||||
+domain_use_interactive_fds(thumb_t)
|
+domain_use_interactive_fds(thumb_t)
|
||||||
+domain_dontaudit_read_all_domains_state(thumb_t)
|
+domain_dontaudit_read_all_domains_state(thumb_t)
|
||||||
@ -103604,7 +103607,7 @@ index facdee8..c43ef2e 100644
|
|||||||
+ typeattribute $1 sandbox_caps_domain;
|
+ typeattribute $1 sandbox_caps_domain;
|
||||||
')
|
')
|
||||||
diff --git a/virt.te b/virt.te
|
diff --git a/virt.te b/virt.te
|
||||||
index f03dcf5..eef3cb7 100644
|
index f03dcf5..329e056 100644
|
||||||
--- a/virt.te
|
--- a/virt.te
|
||||||
+++ b/virt.te
|
+++ b/virt.te
|
||||||
@@ -1,150 +1,227 @@
|
@@ -1,150 +1,227 @@
|
||||||
@ -105568,7 +105571,7 @@ index f03dcf5..eef3cb7 100644
|
|||||||
allow virt_bridgehelper_t self:process { setcap getcap };
|
allow virt_bridgehelper_t self:process { setcap getcap };
|
||||||
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
|
allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin };
|
||||||
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
|
allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms;
|
||||||
@@ -1207,5 +1508,218 @@ kernel_read_network_state(virt_bridgehelper_t)
|
@@ -1207,5 +1508,219 @@ kernel_read_network_state(virt_bridgehelper_t)
|
||||||
|
|
||||||
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
|
corenet_rw_tun_tap_dev(virt_bridgehelper_t)
|
||||||
|
|
||||||
@ -105774,6 +105777,7 @@ index f03dcf5..eef3cb7 100644
|
|||||||
+
|
+
|
||||||
+corenet_tcp_bind_generic_node(sandbox_net_domain)
|
+corenet_tcp_bind_generic_node(sandbox_net_domain)
|
||||||
+corenet_udp_bind_generic_node(sandbox_net_domain)
|
+corenet_udp_bind_generic_node(sandbox_net_domain)
|
||||||
|
+corenet_raw_bind_generic_node(sandbox_net_domain)
|
||||||
+corenet_tcp_sendrecv_all_ports(sandbox_net_domain)
|
+corenet_tcp_sendrecv_all_ports(sandbox_net_domain)
|
||||||
+corenet_udp_sendrecv_all_ports(sandbox_net_domain)
|
+corenet_udp_sendrecv_all_ports(sandbox_net_domain)
|
||||||
+corenet_udp_bind_all_ports(sandbox_net_domain)
|
+corenet_udp_bind_all_ports(sandbox_net_domain)
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 75%{?dist}
|
Release: 76%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -602,6 +602,14 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Aug 26 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-76
|
||||||
|
- Label ~/tmp and ~/.tmp directories in user tmp dirs as user_tmp_t
|
||||||
|
- Add a port definition for shellinaboxd
|
||||||
|
- Fix labeling for HOME_DIR/tmp and HOME_DIR/.tmp directories
|
||||||
|
- Allow thumb_t to read/write video devices
|
||||||
|
- fail2ban 0.9 reads the journal by default.
|
||||||
|
- Allow sandbox net domains to bind to rawip socket
|
||||||
|
|
||||||
* Fri Aug 22 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-75
|
* Fri Aug 22 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-75
|
||||||
- Allow haproxy to read /dev/random and /dev/urandom.
|
- Allow haproxy to read /dev/random and /dev/urandom.
|
||||||
- Allow mdadm to seng signull kernel_t which is proces type of mdadm on early boot.
|
- Allow mdadm to seng signull kernel_t which is proces type of mdadm on early boot.
|
||||||
|
Loading…
Reference in New Issue
Block a user