patch from dan Fri, 27 Jan 2006 01:37:19 -0500
This commit is contained in:
parent
270d428a46
commit
51a89cc574
@ -14,8 +14,10 @@
|
|||||||
|
|
||||||
ifdef(`distro_redhat', `
|
ifdef(`distro_redhat', `
|
||||||
/usr/bin/fedora-rmdevelrpms -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/usr/bin/fedora-rmdevelrpms -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
/usr/sbin/up2date -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/usr/sbin/pirut -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
|
/usr/sbin/pup -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
/usr/sbin/rhn_check -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/usr/sbin/rhn_check -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
|
/usr/sbin/up2date -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
')
|
')
|
||||||
|
|
||||||
/var/lib/alternatives(/.*)? gen_context(system_u:object_r:rpm_var_lib_t,s0)
|
/var/lib/alternatives(/.*)? gen_context(system_u:object_r:rpm_var_lib_t,s0)
|
||||||
|
@ -71,6 +71,7 @@ interface(`rpm_run',`
|
|||||||
rpm_domtrans($1)
|
rpm_domtrans($1)
|
||||||
role $2 types rpm_t;
|
role $2 types rpm_t;
|
||||||
role $2 types rpm_script_t;
|
role $2 types rpm_script_t;
|
||||||
|
seutil_run_loadpol(rpm_script_t,$2,$3)
|
||||||
allow rpm_t $3:chr_file rw_term_perms;
|
allow rpm_t $3:chr_file rw_term_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(rpm,1.2.0)
|
policy_module(rpm,1.2.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -288,6 +288,7 @@ storage_raw_write_fixed_disk(rpm_script_t)
|
|||||||
|
|
||||||
term_getattr_unallocated_ttys(rpm_script_t)
|
term_getattr_unallocated_ttys(rpm_script_t)
|
||||||
term_list_ptys(rpm_script_t)
|
term_list_ptys(rpm_script_t)
|
||||||
|
term_use_all_terms(rpm_script_t)
|
||||||
|
|
||||||
auth_dontaudit_getattr_shadow(rpm_script_t)
|
auth_dontaudit_getattr_shadow(rpm_script_t)
|
||||||
# ideally we would not need this
|
# ideally we would not need this
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(mono,1.0.0)
|
policy_module(mono,1.0.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -18,7 +18,7 @@ domain_entry_file(mono_t,mono_exec_t)
|
|||||||
#
|
#
|
||||||
|
|
||||||
ifdef(`targeted_policy',`
|
ifdef(`targeted_policy',`
|
||||||
allow mono_t self:process execheap;
|
allow mono_t self:process { execheap execmem };
|
||||||
unconfined_domain_template(mono_t)
|
unconfined_domain_template(mono_t)
|
||||||
role system_r types mono_t;
|
role system_r types mono_t;
|
||||||
')
|
')
|
||||||
|
@ -125,6 +125,11 @@ HOME_ROOT/lost\+found/.* <<none>>
|
|||||||
/mnt(/[^/]*)? -d gen_context(system_u:object_r:mnt_t,s0)
|
/mnt(/[^/]*)? -d gen_context(system_u:object_r:mnt_t,s0)
|
||||||
/mnt/[^/]*/.* <<none>>
|
/mnt/[^/]*/.* <<none>>
|
||||||
|
|
||||||
|
#
|
||||||
|
# /net
|
||||||
|
#
|
||||||
|
/net -d gen_context(system_u:object_r:mnt_t,s0)
|
||||||
|
|
||||||
#
|
#
|
||||||
# /opt
|
# /opt
|
||||||
#
|
#
|
||||||
|
@ -321,7 +321,7 @@ interface(`files_list_non_security',`
|
|||||||
attribute file_type, security_file_type;
|
attribute file_type, security_file_type;
|
||||||
')
|
')
|
||||||
|
|
||||||
dontaudit $1 { file_type -security_file_type }:dir r_dir_perms;
|
allow $1 { file_type -security_file_type }:dir r_dir_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -969,6 +969,22 @@ interface(`fs_read_eventpollfs',`
|
|||||||
allow $1 eventpollfs_t:file r_file_perms;
|
allow $1 eventpollfs_t:file r_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Search inotifyfs filesystem.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`fs_search_inotifyfs',`
|
||||||
|
gen_require(`
|
||||||
|
type inotifyfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 inotifyfs_t:dir search_dir_perms;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Mount an iso9660 filesystem, which
|
## Mount an iso9660 filesystem, which
|
||||||
|
@ -42,8 +42,8 @@ ifdef(`distro_redhat', `
|
|||||||
/dev/sonycd -b gen_context(system_u:object_r:removable_device_t,s0)
|
/dev/sonycd -b gen_context(system_u:object_r:removable_device_t,s0)
|
||||||
/dev/tape.* -c gen_context(system_u:object_r:tape_device_t,s0)
|
/dev/tape.* -c gen_context(system_u:object_r:tape_device_t,s0)
|
||||||
/dev/ub[a-z] -b gen_context(system_u:object_r:removable_device_t,s15:c0.c255)
|
/dev/ub[a-z] -b gen_context(system_u:object_r:removable_device_t,s15:c0.c255)
|
||||||
|
|
||||||
/dev/ubd[^/]* -b gen_context(system_u:object_r:fixed_disk_device_t,s15:c0.c255)
|
/dev/ubd[^/]* -b gen_context(system_u:object_r:fixed_disk_device_t,s15:c0.c255)
|
||||||
|
/dev/xvd[^/]* -b gen_context(system_u:object_r:fixed_disk_device_t,s15:c0.c255)
|
||||||
|
|
||||||
/dev/ataraid/.* -b gen_context(system_u:object_r:fixed_disk_device_t,s15:c0.c255)
|
/dev/ataraid/.* -b gen_context(system_u:object_r:fixed_disk_device_t,s15:c0.c255)
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(cups,1.2.0)
|
policy_module(cups,1.2.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -148,6 +148,7 @@ fs_getattr_all_fs(cupsd_t)
|
|||||||
fs_search_auto_mountpoints(cupsd_t)
|
fs_search_auto_mountpoints(cupsd_t)
|
||||||
|
|
||||||
term_dontaudit_use_console(cupsd_t)
|
term_dontaudit_use_console(cupsd_t)
|
||||||
|
term_write_unallocated_ttys(cupsd_t)
|
||||||
|
|
||||||
auth_domtrans_chk_passwd(cupsd_t)
|
auth_domtrans_chk_passwd(cupsd_t)
|
||||||
auth_dontaudit_read_pam_pid(cupsd_t)
|
auth_dontaudit_read_pam_pid(cupsd_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(hal,1.2.1)
|
policy_module(hal,1.2.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -116,6 +116,8 @@ term_dontaudit_use_unallocated_tty(hald_t)
|
|||||||
init_use_fd(hald_t)
|
init_use_fd(hald_t)
|
||||||
init_use_script_pty(hald_t)
|
init_use_script_pty(hald_t)
|
||||||
init_domtrans_script(hald_t)
|
init_domtrans_script(hald_t)
|
||||||
|
init_write_initctl(hald_t)
|
||||||
|
init_read_utmp(hald_t)
|
||||||
|
|
||||||
libs_use_ld_so(hald_t)
|
libs_use_ld_so(hald_t)
|
||||||
libs_use_shared_libs(hald_t)
|
libs_use_shared_libs(hald_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(locallogin,1.1.1)
|
policy_module(locallogin,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -239,6 +239,7 @@ allow sulogin_t self:msg { send receive };
|
|||||||
kernel_read_system_state(sulogin_t)
|
kernel_read_system_state(sulogin_t)
|
||||||
|
|
||||||
fs_search_auto_mountpoints(sulogin_t)
|
fs_search_auto_mountpoints(sulogin_t)
|
||||||
|
fs_use_tmpfs_chr_dev(sulogin_t)
|
||||||
|
|
||||||
files_read_etc_files(sulogin_t)
|
files_read_etc_files(sulogin_t)
|
||||||
# because file systems are not mounted:
|
# because file systems are not mounted:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(modutils,1.0.0)
|
policy_module(modutils,1.0.1)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
bool secure_mode_insmod;
|
bool secure_mode_insmod;
|
||||||
@ -113,6 +113,8 @@ logging_search_logs(insmod_t)
|
|||||||
|
|
||||||
miscfiles_read_localization(insmod_t)
|
miscfiles_read_localization(insmod_t)
|
||||||
|
|
||||||
|
seutil_read_file_contexts(insmod_t)
|
||||||
|
|
||||||
if( ! secure_mode_insmod ) {
|
if( ! secure_mode_insmod ) {
|
||||||
kernel_domtrans_to(insmod_t,insmod_exec_t)
|
kernel_domtrans_to(insmod_t,insmod_exec_t)
|
||||||
}
|
}
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(selinuxutil,1.1.1)
|
policy_module(selinuxutil,1.1.2)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
bool secure_mode;
|
bool secure_mode;
|
||||||
@ -414,7 +414,7 @@ ifdef(`targeted_policy',`',`
|
|||||||
allow run_init_t self:process setexec;
|
allow run_init_t self:process setexec;
|
||||||
allow run_init_t self:capability setuid;
|
allow run_init_t self:capability setuid;
|
||||||
allow run_init_t self:fifo_file rw_file_perms;
|
allow run_init_t self:fifo_file rw_file_perms;
|
||||||
allow run_init_t self:netlink_audit_socket { create bind write nlmsg_read read };
|
allow run_init_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
|
||||||
|
|
||||||
# often the administrator runs such programs from a directory that is owned
|
# often the administrator runs such programs from a directory that is owned
|
||||||
# by a different user or has restrictive SE permissions, do not want to audit
|
# by a different user or has restrictive SE permissions, do not want to audit
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(udev,1.2.0)
|
policy_module(udev,1.2.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -90,6 +90,7 @@ dev_rw_generic_file(udev_t)
|
|||||||
dev_delete_generic_file(udev_t)
|
dev_delete_generic_file(udev_t)
|
||||||
|
|
||||||
fs_getattr_all_fs(udev_t)
|
fs_getattr_all_fs(udev_t)
|
||||||
|
fs_search_inotifyfs(udev_t)
|
||||||
|
|
||||||
selinux_get_fs_mount(udev_t)
|
selinux_get_fs_mount(udev_t)
|
||||||
selinux_validate_context(udev_t)
|
selinux_validate_context(udev_t)
|
||||||
|
@ -54,8 +54,13 @@ template(`unconfined_domain_template',`
|
|||||||
tunable_policy(`allow_execmem && allow_execstack',`
|
tunable_policy(`allow_execmem && allow_execstack',`
|
||||||
# Allow making the stack executable via mprotect.
|
# Allow making the stack executable via mprotect.
|
||||||
allow $1 self:process execstack;
|
allow $1 self:process execstack;
|
||||||
|
', `
|
||||||
|
# These are fairly common but seem to be harmless
|
||||||
|
# caused by using shared libraries built with old tool chains
|
||||||
|
dontaudit $1 self:process execstack;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
optional_policy(`authlogin',`
|
optional_policy(`authlogin',`
|
||||||
auth_unconfined($1)
|
auth_unconfined($1)
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(unconfined,1.2.1)
|
policy_module(unconfined,1.2.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -848,9 +848,6 @@ template(`admin_user_template',`
|
|||||||
fs_set_all_quotas($1_t)
|
fs_set_all_quotas($1_t)
|
||||||
fs_exec_noxattr($1_t)
|
fs_exec_noxattr($1_t)
|
||||||
|
|
||||||
selinux_set_enforce_mode($1_t)
|
|
||||||
selinux_set_boolean($1_t)
|
|
||||||
selinux_set_parameters($1_t)
|
|
||||||
# Get security policy decisions:
|
# Get security policy decisions:
|
||||||
selinux_get_fs_mount($1_t)
|
selinux_get_fs_mount($1_t)
|
||||||
selinux_validate_context($1_t)
|
selinux_validate_context($1_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(userdomain,1.2.4)
|
policy_module(userdomain,1.2.5)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
role sysadm_r, staff_r, user_r;
|
role sysadm_r, staff_r, user_r;
|
||||||
@ -156,14 +156,21 @@ ifdef(`targeted_policy',`
|
|||||||
|
|
||||||
mls_process_read_up(sysadm_t)
|
mls_process_read_up(sysadm_t)
|
||||||
|
|
||||||
logging_read_audit_log(sysadm_t)
|
|
||||||
|
|
||||||
ifdef(`direct_sysadm_daemon',`
|
ifdef(`direct_sysadm_daemon',`
|
||||||
optional_policy(`init',`
|
optional_policy(`init',`
|
||||||
init_run_daemon(sysadm_t,sysadm_r,admin_terminal)
|
init_run_daemon(sysadm_t,sysadm_r,admin_terminal)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
ifdef(`enable_mls',`
|
||||||
|
logging_read_audit_log(secadm_t)
|
||||||
|
logging_domtrans_auditctl(secadm_t)
|
||||||
|
mls_process_read_up(secadm_t)
|
||||||
|
', `
|
||||||
|
logging_domtrans_auditctl(sysadm_t)
|
||||||
|
logging_read_audit_log(sysadm_t)
|
||||||
|
')
|
||||||
|
|
||||||
tunable_policy(`allow_ptrace',`
|
tunable_policy(`allow_ptrace',`
|
||||||
domain_ptrace_all_domains(sysadm_t)
|
domain_ptrace_all_domains(sysadm_t)
|
||||||
')
|
')
|
||||||
@ -205,12 +212,20 @@ ifdef(`targeted_policy',`
|
|||||||
|
|
||||||
optional_policy(`consoletype',`
|
optional_policy(`consoletype',`
|
||||||
consoletype_exec(sysadm_t)
|
consoletype_exec(sysadm_t)
|
||||||
|
|
||||||
|
ifdef(`enable_mls',`
|
||||||
|
consoletype_exec(secadm_t)
|
||||||
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`ddcprobe',`
|
optional_policy(`ddcprobe',`
|
||||||
ddcprobe_run(sysadm_t,sysadm_r,admin_terminal)
|
ddcprobe_run(sysadm_t,sysadm_r,admin_terminal)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`dmesg',`
|
||||||
|
dmesg_exec(sysadm_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`dmidecode',`
|
optional_policy(`dmidecode',`
|
||||||
dmidecode_run(sysadm_t,sysadm_r,admin_terminal)
|
dmidecode_run(sysadm_t,sysadm_r,admin_terminal)
|
||||||
')
|
')
|
||||||
@ -320,13 +335,27 @@ ifdef(`targeted_policy',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`selinuxutil',`
|
optional_policy(`selinuxutil',`
|
||||||
seutil_run_checkpol(sysadm_t,sysadm_r,admin_terminal)
|
|
||||||
seutil_run_loadpol(sysadm_t,sysadm_r,admin_terminal)
|
|
||||||
seutil_run_restorecon(sysadm_t,sysadm_r,admin_terminal)
|
seutil_run_restorecon(sysadm_t,sysadm_r,admin_terminal)
|
||||||
seutil_run_setfiles(sysadm_t,sysadm_r,admin_terminal)
|
seutil_run_runinit(sysadm_t,sysadm_r,admin_terminal)
|
||||||
|
|
||||||
ifdef(`targeted_policy',`',`
|
ifdef(`enable_mls',`
|
||||||
seutil_run_runinit(sysadm_t,sysadm_r,admin_terminal)
|
selinux_set_enforce_mode(secadm_t)
|
||||||
|
selinux_set_boolean(secadm_t)
|
||||||
|
selinux_set_parameters(secadm_t)
|
||||||
|
|
||||||
|
seutil_manage_binary_pol(secadm_t)
|
||||||
|
seutil_run_checkpol(secadm_t,secadm_r,admin_terminal)
|
||||||
|
seutil_run_loadpol(secadm_t,secadm_r,admin_terminal)
|
||||||
|
seutil_run_setfiles(secadm_t,secadm_r,admin_terminal)
|
||||||
|
', `
|
||||||
|
selinux_set_enforce_mode(sysadm_t)
|
||||||
|
selinux_set_boolean(sysadm_t)
|
||||||
|
selinux_set_parameters(sysadm_t)
|
||||||
|
|
||||||
|
seutil_manage_binary_pol(sysadm_t)
|
||||||
|
seutil_run_checkpol(sysadm_t,sysadm_r,admin_terminal)
|
||||||
|
seutil_run_loadpol(sysadm_t,sysadm_r,admin_terminal)
|
||||||
|
seutil_run_setfiles(sysadm_t,sysadm_r,admin_terminal)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user