procmail uses /tmp files
Wants to send signull to itself Can exec ls Read spamassinn_lib_dirs New directory for spamassin /var/lib/ pyzor uses tmp files
This commit is contained in:
parent
7aefc69117
commit
59bedc1886
@ -1,3 +1,4 @@
|
|||||||
|
- Patch for procmail, spamassassin, and pyzor updates from Dan Walsh.
|
||||||
- Patch for setroubleshoot for validating file contexts from Dan Walsh.
|
- Patch for setroubleshoot for validating file contexts from Dan Walsh.
|
||||||
- Patch for gssd fixes from Dan Walsh.
|
- Patch for gssd fixes from Dan Walsh.
|
||||||
- Patch for lvm fixes from Dan Walsh.
|
- Patch for lvm fixes from Dan Walsh.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(procmail,1.4.0)
|
policy_module(procmail,1.4.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -12,19 +12,25 @@ domain_type(procmail_t)
|
|||||||
domain_entry_file(procmail_t,procmail_exec_t)
|
domain_entry_file(procmail_t,procmail_exec_t)
|
||||||
role system_r types procmail_t;
|
role system_r types procmail_t;
|
||||||
|
|
||||||
|
type procmail_tmp_t;
|
||||||
|
files_tmp_file(procmail_tmp_t)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Local policy
|
# Local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow procmail_t self:capability { sys_nice chown setuid setgid dac_override };
|
allow procmail_t self:capability { sys_nice chown setuid setgid dac_override };
|
||||||
allow procmail_t self:process { setsched signal };
|
allow procmail_t self:process { setsched signal signull };
|
||||||
allow procmail_t self:fifo_file rw_fifo_file_perms;
|
allow procmail_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow procmail_t self:unix_stream_socket create_socket_perms;
|
allow procmail_t self:unix_stream_socket create_socket_perms;
|
||||||
allow procmail_t self:unix_dgram_socket create_socket_perms;
|
allow procmail_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow procmail_t self:tcp_socket create_stream_socket_perms;
|
allow procmail_t self:tcp_socket create_stream_socket_perms;
|
||||||
allow procmail_t self:udp_socket create_socket_perms;
|
allow procmail_t self:udp_socket create_socket_perms;
|
||||||
|
|
||||||
|
allow procmail_t procmail_tmp_t:file manage_file_perms;
|
||||||
|
files_tmp_filetrans(procmail_t, procmail_tmp_t, file)
|
||||||
|
|
||||||
kernel_read_system_state(procmail_t)
|
kernel_read_system_state(procmail_t)
|
||||||
kernel_read_kernel_sysctls(procmail_t)
|
kernel_read_kernel_sysctls(procmail_t)
|
||||||
|
|
||||||
@ -50,6 +56,7 @@ auth_use_nsswitch(procmail_t)
|
|||||||
corecmd_exec_bin(procmail_t)
|
corecmd_exec_bin(procmail_t)
|
||||||
corecmd_exec_shell(procmail_t)
|
corecmd_exec_shell(procmail_t)
|
||||||
corecmd_dontaudit_search_sbin(procmail_t)
|
corecmd_dontaudit_search_sbin(procmail_t)
|
||||||
|
corecmd_exec_ls(procmail_t)
|
||||||
|
|
||||||
files_read_etc_files(procmail_t)
|
files_read_etc_files(procmail_t)
|
||||||
files_read_etc_runtime_files(procmail_t)
|
files_read_etc_runtime_files(procmail_t)
|
||||||
@ -115,8 +122,7 @@ optional_policy(`
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
corenet_udp_bind_generic_port(procmail_t)
|
corenet_udp_bind_generic_port(procmail_t)
|
||||||
|
|
||||||
files_getattr_tmp_dirs(procmail_t)
|
|
||||||
|
|
||||||
spamassassin_exec(procmail_t)
|
spamassassin_exec(procmail_t)
|
||||||
spamassassin_exec_client(procmail_t)
|
spamassassin_exec_client(procmail_t)
|
||||||
|
spamassassin_read_lib_files(procmail_t)
|
||||||
')
|
')
|
||||||
|
@ -64,6 +64,10 @@ interface(`pyzor_exec',`
|
|||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
template(`pyzor_per_role_template',`
|
template(`pyzor_per_role_template',`
|
||||||
|
gen_require(`
|
||||||
|
type pyzord_t;
|
||||||
|
')
|
||||||
|
|
||||||
type $1_pyzor_home_t;
|
type $1_pyzor_home_t;
|
||||||
userdom_user_home_content($1,$1_pyzor_home_t)
|
userdom_user_home_content($1,$1_pyzor_home_t)
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(pyzor,1.1.1)
|
policy_module(pyzor,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -23,6 +23,9 @@ files_type(pyzor_etc_t)
|
|||||||
type pyzord_log_t;
|
type pyzord_log_t;
|
||||||
logging_log_file(pyzord_log_t)
|
logging_log_file(pyzord_log_t)
|
||||||
|
|
||||||
|
type pyzor_tmp_t;
|
||||||
|
files_tmp_file(pyzor_tmp_t)
|
||||||
|
|
||||||
type pyzor_var_lib_t;
|
type pyzor_var_lib_t;
|
||||||
files_type(pyzor_var_lib_t)
|
files_type(pyzor_var_lib_t)
|
||||||
|
|
||||||
@ -37,6 +40,10 @@ allow pyzor_t pyzor_var_lib_t:dir list_dir_perms;
|
|||||||
read_files_pattern(pyzor_t,pyzor_var_lib_t,pyzor_var_lib_t)
|
read_files_pattern(pyzor_t,pyzor_var_lib_t,pyzor_var_lib_t)
|
||||||
files_search_var_lib(pyzor_t)
|
files_search_var_lib(pyzor_t)
|
||||||
|
|
||||||
|
manage_files_pattern(pyzor_t,pyzor_tmp_t,pyzor_tmp_t)
|
||||||
|
manage_dirs_pattern(pyzor_t,pyzor_tmp_t,pyzor_tmp_t)
|
||||||
|
files_tmp_filetrans(pyzor_t, pyzor_tmp_t, { file dir })
|
||||||
|
|
||||||
kernel_read_kernel_sysctls(pyzor_t)
|
kernel_read_kernel_sysctls(pyzor_t)
|
||||||
kernel_read_system_state(pyzor_t)
|
kernel_read_system_state(pyzor_t)
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
|
|
||||||
/usr/sbin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0)
|
/usr/sbin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0)
|
||||||
|
|
||||||
|
/var/lib/spamassassin(/.*)? gen_context(system_u:object_r:spamd_var_lib_t,s0)
|
||||||
|
|
||||||
/var/spool/spamassassin(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
|
/var/spool/spamassassin(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
|
||||||
|
|
||||||
ifdef(`strict_policy',`
|
ifdef(`strict_policy',`
|
||||||
|
@ -460,6 +460,45 @@ template(`spamassassin_domtrans_user_local_client',`
|
|||||||
domtrans_pattern($2,spamassassin_exec_t,$1_spamassassin_t)
|
domtrans_pattern($2,spamassassin_exec_t,$1_spamassassin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## read spamd lib files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`spamassassin_read_lib_files',`
|
||||||
|
gen_require(`
|
||||||
|
type spamd_var_lib_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_var_lib($1)
|
||||||
|
read_files_pattern($1,spamd_var_lib_t,spamd_var_lib_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create, read, write, and delete
|
||||||
|
## spamd lib files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`spamassassin_manage_lib_files',`
|
||||||
|
gen_require(`
|
||||||
|
type spamd_var_lib_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_var_lib($1)
|
||||||
|
manage_files_pattern($1,spamd_var_lib_t,spamd_var_lib_t)
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read temporary spamd file.
|
## Read temporary spamd file.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(spamassassin,1.5.1)
|
policy_module(spamassassin,1.5.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -20,6 +20,10 @@ files_type(spamd_spool_t)
|
|||||||
type spamd_tmp_t;
|
type spamd_tmp_t;
|
||||||
files_tmp_file(spamd_tmp_t)
|
files_tmp_file(spamd_tmp_t)
|
||||||
|
|
||||||
|
# var/lib files
|
||||||
|
type spamd_var_lib_t;
|
||||||
|
files_type(spamd_var_lib_t)
|
||||||
|
|
||||||
type spamd_var_run_t;
|
type spamd_var_run_t;
|
||||||
files_pid_file(spamd_var_run_t)
|
files_pid_file(spamd_var_run_t)
|
||||||
|
|
||||||
@ -61,6 +65,10 @@ manage_dirs_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
|
|||||||
manage_files_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
|
manage_files_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
|
||||||
files_tmp_filetrans(spamd_t, spamd_tmp_t, { file dir })
|
files_tmp_filetrans(spamd_t, spamd_tmp_t, { file dir })
|
||||||
|
|
||||||
|
# var/lib files for spamd
|
||||||
|
allow spamd_t spamd_var_lib_t:dir list_dir_perms;
|
||||||
|
read_files_pattern(spamd_t,spamd_var_lib_t,spamd_var_lib_t)
|
||||||
|
|
||||||
manage_files_pattern(spamd_t,spamd_var_run_t,spamd_var_run_t)
|
manage_files_pattern(spamd_t,spamd_var_run_t,spamd_var_run_t)
|
||||||
files_pid_filetrans(spamd_t,spamd_var_run_t,file)
|
files_pid_filetrans(spamd_t,spamd_var_run_t,file)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user