Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home
Allow clamd to send signals to itself Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm.
This commit is contained in:
parent
24ea653911
commit
5212892e22
@ -24,36 +24,37 @@ manage_files_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t)
|
||||
manage_dirs_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t)
|
||||
files_tmp_filetrans(firewallgui_t,firewallgui_tmp_t, { file dir })
|
||||
|
||||
files_manage_system_conf_files(firewallgui_t)
|
||||
files_etc_filetrans_system_conf(firewallgui_t)
|
||||
|
||||
corecmd_exec_shell(firewallgui_t)
|
||||
corecmd_exec_bin(firewallgui_t)
|
||||
consoletype_exec(firewallgui_t)
|
||||
|
||||
kernel_read_system_state(firewallgui_t)
|
||||
kernel_read_network_state(firewallgui_t)
|
||||
kernel_rw_net_sysctls(firewallgui_t)
|
||||
kernel_rw_kernel_sysctl(firewallgui_t)
|
||||
kernel_rw_vm_sysctls(firewallgui_t)
|
||||
|
||||
corecmd_exec_shell(firewallgui_t)
|
||||
corecmd_exec_bin(firewallgui_t)
|
||||
consoletype_exec(firewallgui_t)
|
||||
|
||||
dev_read_urand(firewallgui_t)
|
||||
dev_read_sysfs(firewallgui_t)
|
||||
|
||||
files_manage_system_conf_files(firewallgui_t)
|
||||
files_etc_filetrans_system_conf(firewallgui_t)
|
||||
files_read_etc_files(firewallgui_t)
|
||||
files_read_usr_files(firewallgui_t)
|
||||
files_search_kernel_modules(firewallgui_t)
|
||||
files_list_kernel_modules(firewallgui_t)
|
||||
|
||||
iptables_domtrans(firewallgui_t)
|
||||
iptables_initrc_domtrans(firewallgui_t)
|
||||
|
||||
modutils_getattr_module_deps(firewallgui_t)
|
||||
|
||||
dev_read_urand(firewallgui_t)
|
||||
dev_read_sysfs(firewallgui_t)
|
||||
|
||||
nscd_dontaudit_search_pid(firewallgui_t)
|
||||
nscd_socket_use(firewallgui_t)
|
||||
|
||||
miscfiles_read_localization(firewallgui_t)
|
||||
|
||||
iptables_domtrans(firewallgui_t)
|
||||
iptables_initrc_domtrans(firewallgui_t)
|
||||
userdom_dontaudit_search_user_home_dirs(firewallgui_t)
|
||||
|
||||
nscd_dontaudit_search_pid(firewallgui_t)
|
||||
nscd_socket_use(firewallgui_t)
|
||||
|
||||
optional_policy(`
|
||||
gnome_read_gconf_home_files(firewallgui_t)
|
||||
|
@ -346,8 +346,10 @@ term_getattr_all_ttys(mozilla_plugin_t)
|
||||
term_getattr_all_ptys(mozilla_plugin_t)
|
||||
|
||||
userdom_rw_user_tmpfs_files(mozilla_plugin_t)
|
||||
userdom_delete_user_tmpfs_files(mozilla_plugin_t)
|
||||
userdom_stream_connect(mozilla_plugin_t)
|
||||
userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
|
||||
userdom_read_user_home_content_files(mozilla_plugin_t)
|
||||
|
||||
optional_policy(`
|
||||
alsa_read_rw_config(mozilla_plugin_t)
|
||||
|
@ -64,6 +64,8 @@ logging_log_file(freshclam_var_log_t)
|
||||
|
||||
allow clamd_t self:capability { kill setgid setuid dac_override };
|
||||
dontaudit clamd_t self:capability sys_tty_config;
|
||||
allow clamd_t self:process signal;
|
||||
|
||||
allow clamd_t self:fifo_file rw_fifo_file_perms;
|
||||
allow clamd_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
||||
allow clamd_t self:unix_dgram_socket create_socket_perms;
|
||||
|
Loading…
Reference in New Issue
Block a user