procmail uses /tmp files

Wants to send signull to itself
Can exec ls
Read spamassinn_lib_dirs
New directory for spamassin /var/lib/
pyzor uses tmp files
This commit is contained in:
Chris PeBenito 2007-03-07 21:33:22 +00:00
parent 7aefc69117
commit 59bedc1886
7 changed files with 73 additions and 6 deletions

View File

@ -1,3 +1,4 @@
- Patch for procmail, spamassassin, and pyzor updates from Dan Walsh.
- Patch for setroubleshoot for validating file contexts from Dan Walsh. - Patch for setroubleshoot for validating file contexts from Dan Walsh.
- Patch for gssd fixes from Dan Walsh. - Patch for gssd fixes from Dan Walsh.
- Patch for lvm fixes from Dan Walsh. - Patch for lvm fixes from Dan Walsh.

View File

@ -1,5 +1,5 @@
policy_module(procmail,1.4.0) policy_module(procmail,1.4.1)
######################################## ########################################
# #
@ -12,19 +12,25 @@ domain_type(procmail_t)
domain_entry_file(procmail_t,procmail_exec_t) domain_entry_file(procmail_t,procmail_exec_t)
role system_r types procmail_t; role system_r types procmail_t;
type procmail_tmp_t;
files_tmp_file(procmail_tmp_t)
######################################## ########################################
# #
# Local policy # Local policy
# #
allow procmail_t self:capability { sys_nice chown setuid setgid dac_override }; allow procmail_t self:capability { sys_nice chown setuid setgid dac_override };
allow procmail_t self:process { setsched signal }; allow procmail_t self:process { setsched signal signull };
allow procmail_t self:fifo_file rw_fifo_file_perms; allow procmail_t self:fifo_file rw_fifo_file_perms;
allow procmail_t self:unix_stream_socket create_socket_perms; allow procmail_t self:unix_stream_socket create_socket_perms;
allow procmail_t self:unix_dgram_socket create_socket_perms; allow procmail_t self:unix_dgram_socket create_socket_perms;
allow procmail_t self:tcp_socket create_stream_socket_perms; allow procmail_t self:tcp_socket create_stream_socket_perms;
allow procmail_t self:udp_socket create_socket_perms; allow procmail_t self:udp_socket create_socket_perms;
allow procmail_t procmail_tmp_t:file manage_file_perms;
files_tmp_filetrans(procmail_t, procmail_tmp_t, file)
kernel_read_system_state(procmail_t) kernel_read_system_state(procmail_t)
kernel_read_kernel_sysctls(procmail_t) kernel_read_kernel_sysctls(procmail_t)
@ -50,6 +56,7 @@ auth_use_nsswitch(procmail_t)
corecmd_exec_bin(procmail_t) corecmd_exec_bin(procmail_t)
corecmd_exec_shell(procmail_t) corecmd_exec_shell(procmail_t)
corecmd_dontaudit_search_sbin(procmail_t) corecmd_dontaudit_search_sbin(procmail_t)
corecmd_exec_ls(procmail_t)
files_read_etc_files(procmail_t) files_read_etc_files(procmail_t)
files_read_etc_runtime_files(procmail_t) files_read_etc_runtime_files(procmail_t)
@ -115,8 +122,7 @@ optional_policy(`
optional_policy(` optional_policy(`
corenet_udp_bind_generic_port(procmail_t) corenet_udp_bind_generic_port(procmail_t)
files_getattr_tmp_dirs(procmail_t)
spamassassin_exec(procmail_t) spamassassin_exec(procmail_t)
spamassassin_exec_client(procmail_t) spamassassin_exec_client(procmail_t)
spamassassin_read_lib_files(procmail_t)
') ')

View File

@ -64,6 +64,10 @@ interface(`pyzor_exec',`
## </param> ## </param>
# #
template(`pyzor_per_role_template',` template(`pyzor_per_role_template',`
gen_require(`
type pyzord_t;
')
type $1_pyzor_home_t; type $1_pyzor_home_t;
userdom_user_home_content($1,$1_pyzor_home_t) userdom_user_home_content($1,$1_pyzor_home_t)

View File

@ -1,5 +1,5 @@
policy_module(pyzor,1.1.1) policy_module(pyzor,1.1.2)
######################################## ########################################
# #
@ -23,6 +23,9 @@ files_type(pyzor_etc_t)
type pyzord_log_t; type pyzord_log_t;
logging_log_file(pyzord_log_t) logging_log_file(pyzord_log_t)
type pyzor_tmp_t;
files_tmp_file(pyzor_tmp_t)
type pyzor_var_lib_t; type pyzor_var_lib_t;
files_type(pyzor_var_lib_t) files_type(pyzor_var_lib_t)
@ -37,6 +40,10 @@ allow pyzor_t pyzor_var_lib_t:dir list_dir_perms;
read_files_pattern(pyzor_t,pyzor_var_lib_t,pyzor_var_lib_t) read_files_pattern(pyzor_t,pyzor_var_lib_t,pyzor_var_lib_t)
files_search_var_lib(pyzor_t) files_search_var_lib(pyzor_t)
manage_files_pattern(pyzor_t,pyzor_tmp_t,pyzor_tmp_t)
manage_dirs_pattern(pyzor_t,pyzor_tmp_t,pyzor_tmp_t)
files_tmp_filetrans(pyzor_t, pyzor_tmp_t, { file dir })
kernel_read_kernel_sysctls(pyzor_t) kernel_read_kernel_sysctls(pyzor_t)
kernel_read_system_state(pyzor_t) kernel_read_system_state(pyzor_t)

View File

@ -6,6 +6,8 @@
/usr/sbin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0) /usr/sbin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0)
/var/lib/spamassassin(/.*)? gen_context(system_u:object_r:spamd_var_lib_t,s0)
/var/spool/spamassassin(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0) /var/spool/spamassassin(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
ifdef(`strict_policy',` ifdef(`strict_policy',`

View File

@ -460,6 +460,45 @@ template(`spamassassin_domtrans_user_local_client',`
domtrans_pattern($2,spamassassin_exec_t,$1_spamassassin_t) domtrans_pattern($2,spamassassin_exec_t,$1_spamassassin_t)
') ')
########################################
## <summary>
## read spamd lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`spamassassin_read_lib_files',`
gen_require(`
type spamd_var_lib_t;
')
files_search_var_lib($1)
read_files_pattern($1,spamd_var_lib_t,spamd_var_lib_t)
')
########################################
## <summary>
## Create, read, write, and delete
## spamd lib files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`spamassassin_manage_lib_files',`
gen_require(`
type spamd_var_lib_t;
')
files_search_var_lib($1)
manage_files_pattern($1,spamd_var_lib_t,spamd_var_lib_t)
')
######################################## ########################################
## <summary> ## <summary>
## Read temporary spamd file. ## Read temporary spamd file.

View File

@ -1,5 +1,5 @@
policy_module(spamassassin,1.5.1) policy_module(spamassassin,1.5.2)
######################################## ########################################
# #
@ -20,6 +20,10 @@ files_type(spamd_spool_t)
type spamd_tmp_t; type spamd_tmp_t;
files_tmp_file(spamd_tmp_t) files_tmp_file(spamd_tmp_t)
# var/lib files
type spamd_var_lib_t;
files_type(spamd_var_lib_t)
type spamd_var_run_t; type spamd_var_run_t;
files_pid_file(spamd_var_run_t) files_pid_file(spamd_var_run_t)
@ -61,6 +65,10 @@ manage_dirs_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
manage_files_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t) manage_files_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
files_tmp_filetrans(spamd_t, spamd_tmp_t, { file dir }) files_tmp_filetrans(spamd_t, spamd_tmp_t, { file dir })
# var/lib files for spamd
allow spamd_t spamd_var_lib_t:dir list_dir_perms;
read_files_pattern(spamd_t,spamd_var_lib_t,spamd_var_lib_t)
manage_files_pattern(spamd_t,spamd_var_run_t,spamd_var_run_t) manage_files_pattern(spamd_t,spamd_var_run_t,spamd_var_run_t)
files_pid_filetrans(spamd_t,spamd_var_run_t,file) files_pid_filetrans(spamd_t,spamd_var_run_t,file)