* Mon Apr 18 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-183
- Allow modemmanager to talk to logind - Dontaudit tor daemon needs net_admin capability. rhbz#1311788 - Allow GDM write to event devices. This rule is needed for GDM, because other display managers runs the X server as root, GDM instead runs the X server as the unprivileged user, within the user session. rhbz#1232042 - Xorg now writes content in users homedir.
This commit is contained in:
parent
4c61782def
commit
64f8164852
Binary file not shown.
@ -29116,16 +29116,17 @@ index cc877c7..b8e6e98 100644
|
|||||||
+ xserver_rw_xdm_pipes(ssh_agent_type)
|
+ xserver_rw_xdm_pipes(ssh_agent_type)
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
|
diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
|
||||||
index 8274418..53f66a4 100644
|
index 8274418..5f31270 100644
|
||||||
--- a/policy/modules/services/xserver.fc
|
--- a/policy/modules/services/xserver.fc
|
||||||
+++ b/policy/modules/services/xserver.fc
|
+++ b/policy/modules/services/xserver.fc
|
||||||
@@ -2,13 +2,38 @@
|
@@ -2,13 +2,39 @@
|
||||||
# HOME_DIR
|
# HOME_DIR
|
||||||
#
|
#
|
||||||
HOME_DIR/\.fonts\.conf -- gen_context(system_u:object_r:user_fonts_config_t,s0)
|
HOME_DIR/\.fonts\.conf -- gen_context(system_u:object_r:user_fonts_config_t,s0)
|
||||||
+HOME_DIR/\.fonts\.d(/.*)? gen_context(system_u:object_r:user_fonts_config_t,s0)
|
+HOME_DIR/\.fonts\.d(/.*)? gen_context(system_u:object_r:user_fonts_config_t,s0)
|
||||||
HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
|
HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
|
||||||
+HOME_DIR/\.local/share/fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
|
+HOME_DIR/\.local/share/fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
|
||||||
|
+HOME_DIR/\.local/share/xorg(/.*)? gen_context(system_u:object_r:xdm_home_t,s0)
|
||||||
+HOME_DIR/\.fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
+HOME_DIR/\.fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
||||||
HOME_DIR/\.fonts/auto(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
HOME_DIR/\.fonts/auto(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
||||||
HOME_DIR/\.fonts\.cache-.* -- gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
HOME_DIR/\.fonts\.cache-.* -- gen_context(system_u:object_r:user_fonts_cache_t,s0)
|
||||||
@ -29158,7 +29159,7 @@ index 8274418..53f66a4 100644
|
|||||||
|
|
||||||
#
|
#
|
||||||
# /dev
|
# /dev
|
||||||
@@ -22,13 +47,21 @@ HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0)
|
@@ -22,13 +48,21 @@ HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0)
|
||||||
/etc/gdm(3)?/PreSession/.* -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
/etc/gdm(3)?/PreSession/.* -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
||||||
/etc/gdm(3)?/Xsession -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
/etc/gdm(3)?/Xsession -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
||||||
|
|
||||||
@ -29181,7 +29182,7 @@ index 8274418..53f66a4 100644
|
|||||||
/etc/X11/[wx]dm/Xreset.* -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
/etc/X11/[wx]dm/Xreset.* -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
||||||
/etc/X11/[wxg]dm/Xsession -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
/etc/X11/[wxg]dm/Xsession -- gen_context(system_u:object_r:xsession_exec_t,s0)
|
||||||
/etc/X11/wdm(/.*)? gen_context(system_u:object_r:xdm_rw_etc_t,s0)
|
/etc/X11/wdm(/.*)? gen_context(system_u:object_r:xdm_rw_etc_t,s0)
|
||||||
@@ -46,26 +79,35 @@ HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0)
|
@@ -46,26 +80,35 @@ HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0)
|
||||||
# /tmp
|
# /tmp
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -29223,7 +29224,7 @@ index 8274418..53f66a4 100644
|
|||||||
|
|
||||||
/usr/lib/qt-.*/etc/settings(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/usr/lib/qt-.*/etc/settings(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
|
|
||||||
@@ -91,19 +133,34 @@ ifndef(`distro_debian',`
|
@@ -91,19 +134,34 @@ ifndef(`distro_debian',`
|
||||||
/var/[xgkw]dm(/.*)? gen_context(system_u:object_r:xserver_log_t,s0)
|
/var/[xgkw]dm(/.*)? gen_context(system_u:object_r:xserver_log_t,s0)
|
||||||
|
|
||||||
/var/lib/gdm(3)?(/.*)? gen_context(system_u:object_r:xdm_var_lib_t,s0)
|
/var/lib/gdm(3)?(/.*)? gen_context(system_u:object_r:xdm_var_lib_t,s0)
|
||||||
@ -29262,7 +29263,7 @@ index 8274418..53f66a4 100644
|
|||||||
/var/run/xdm\.pid -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/xdm\.pid -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
/var/run/lxdm\.auth -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/lxdm\.auth -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
/var/run/lxdm\.pid -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/lxdm\.pid -- gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
@@ -111,7 +168,18 @@ ifndef(`distro_debian',`
|
@@ -111,7 +169,18 @@ ifndef(`distro_debian',`
|
||||||
/var/run/slim.* gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/slim.* gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
/var/run/xauth(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/xauth(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
/var/run/xdmctl(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
/var/run/xdmctl(/.*)? gen_context(system_u:object_r:xdm_var_run_t,s0)
|
||||||
@ -31042,7 +31043,7 @@ index 6bf0ecc..e6be63a 100644
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
|
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
|
||||||
index 8b40377..436b1e0 100644
|
index 8b40377..fe6657c 100644
|
||||||
--- a/policy/modules/services/xserver.te
|
--- a/policy/modules/services/xserver.te
|
||||||
+++ b/policy/modules/services/xserver.te
|
+++ b/policy/modules/services/xserver.te
|
||||||
@@ -26,28 +26,66 @@ gen_require(`
|
@@ -26,28 +26,66 @@ gen_require(`
|
||||||
@ -32099,7 +32100,7 @@ index 8b40377..436b1e0 100644
|
|||||||
manage_dirs_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
manage_dirs_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
||||||
manage_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
manage_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
||||||
manage_lnk_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
manage_lnk_files_pattern(xserver_t, xserver_tmpfs_t, xserver_tmpfs_t)
|
||||||
@@ -638,25 +1128,32 @@ manage_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
|
@@ -638,25 +1128,37 @@ manage_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
|
||||||
manage_lnk_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
|
manage_lnk_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
|
||||||
files_search_var_lib(xserver_t)
|
files_search_var_lib(xserver_t)
|
||||||
|
|
||||||
@ -32118,6 +32119,11 @@ index 8b40377..436b1e0 100644
|
|||||||
manage_files_pattern(xserver_t, xserver_log_t, xserver_log_t)
|
manage_files_pattern(xserver_t, xserver_log_t, xserver_log_t)
|
||||||
logging_log_filetrans(xserver_t, xserver_log_t, file)
|
logging_log_filetrans(xserver_t, xserver_log_t, file)
|
||||||
+manage_files_pattern(xserver_t, xdm_log_t, xdm_log_t)
|
+manage_files_pattern(xserver_t, xdm_log_t, xdm_log_t)
|
||||||
|
+
|
||||||
|
+manage_dirs_pattern(xserver_t, xdm_home_t, xdm_home_t)
|
||||||
|
+manage_files_pattern(xserver_t, xdm_home_t, xdm_home_t)
|
||||||
|
+manage_lnk_files_pattern(xserver_t, xdm_home_t, xdm_home_t)
|
||||||
|
+gnome_data_filetrans(xserver_t, xdm_home_t, dir, "xorg")
|
||||||
|
|
||||||
kernel_read_system_state(xserver_t)
|
kernel_read_system_state(xserver_t)
|
||||||
kernel_read_device_sysctls(xserver_t)
|
kernel_read_device_sysctls(xserver_t)
|
||||||
@ -32136,7 +32142,7 @@ index 8b40377..436b1e0 100644
|
|||||||
corenet_all_recvfrom_netlabel(xserver_t)
|
corenet_all_recvfrom_netlabel(xserver_t)
|
||||||
corenet_tcp_sendrecv_generic_if(xserver_t)
|
corenet_tcp_sendrecv_generic_if(xserver_t)
|
||||||
corenet_udp_sendrecv_generic_if(xserver_t)
|
corenet_udp_sendrecv_generic_if(xserver_t)
|
||||||
@@ -677,23 +1174,28 @@ dev_rw_apm_bios(xserver_t)
|
@@ -677,23 +1179,28 @@ dev_rw_apm_bios(xserver_t)
|
||||||
dev_rw_agp(xserver_t)
|
dev_rw_agp(xserver_t)
|
||||||
dev_rw_framebuffer(xserver_t)
|
dev_rw_framebuffer(xserver_t)
|
||||||
dev_manage_dri_dev(xserver_t)
|
dev_manage_dri_dev(xserver_t)
|
||||||
@ -32168,7 +32174,7 @@ index 8b40377..436b1e0 100644
|
|||||||
|
|
||||||
# brought on by rhgb
|
# brought on by rhgb
|
||||||
files_search_mnt(xserver_t)
|
files_search_mnt(xserver_t)
|
||||||
@@ -705,6 +1207,14 @@ fs_search_nfs(xserver_t)
|
@@ -705,6 +1212,14 @@ fs_search_nfs(xserver_t)
|
||||||
fs_search_auto_mountpoints(xserver_t)
|
fs_search_auto_mountpoints(xserver_t)
|
||||||
fs_search_ramfs(xserver_t)
|
fs_search_ramfs(xserver_t)
|
||||||
|
|
||||||
@ -32183,7 +32189,7 @@ index 8b40377..436b1e0 100644
|
|||||||
mls_xwin_read_to_clearance(xserver_t)
|
mls_xwin_read_to_clearance(xserver_t)
|
||||||
|
|
||||||
selinux_validate_context(xserver_t)
|
selinux_validate_context(xserver_t)
|
||||||
@@ -718,20 +1228,18 @@ init_getpgid(xserver_t)
|
@@ -718,20 +1233,18 @@ init_getpgid(xserver_t)
|
||||||
term_setattr_unallocated_ttys(xserver_t)
|
term_setattr_unallocated_ttys(xserver_t)
|
||||||
term_use_unallocated_ttys(xserver_t)
|
term_use_unallocated_ttys(xserver_t)
|
||||||
|
|
||||||
@ -32207,7 +32213,7 @@ index 8b40377..436b1e0 100644
|
|||||||
|
|
||||||
userdom_search_user_home_dirs(xserver_t)
|
userdom_search_user_home_dirs(xserver_t)
|
||||||
userdom_use_user_ttys(xserver_t)
|
userdom_use_user_ttys(xserver_t)
|
||||||
@@ -739,8 +1247,6 @@ userdom_setattr_user_ttys(xserver_t)
|
@@ -739,8 +1252,6 @@ userdom_setattr_user_ttys(xserver_t)
|
||||||
userdom_read_user_tmp_files(xserver_t)
|
userdom_read_user_tmp_files(xserver_t)
|
||||||
userdom_rw_user_tmpfs_files(xserver_t)
|
userdom_rw_user_tmpfs_files(xserver_t)
|
||||||
|
|
||||||
@ -32216,7 +32222,7 @@ index 8b40377..436b1e0 100644
|
|||||||
ifndef(`distro_redhat',`
|
ifndef(`distro_redhat',`
|
||||||
allow xserver_t self:process { execmem execheap execstack };
|
allow xserver_t self:process { execmem execheap execstack };
|
||||||
domain_mmap_low_uncond(xserver_t)
|
domain_mmap_low_uncond(xserver_t)
|
||||||
@@ -785,17 +1291,54 @@ optional_policy(`
|
@@ -785,17 +1296,54 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -32273,7 +32279,7 @@ index 8b40377..436b1e0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -803,6 +1346,10 @@ optional_policy(`
|
@@ -803,6 +1351,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -32284,7 +32290,7 @@ index 8b40377..436b1e0 100644
|
|||||||
xfs_stream_connect(xserver_t)
|
xfs_stream_connect(xserver_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -818,18 +1365,17 @@ allow xserver_t xdm_t:shm rw_shm_perms;
|
@@ -818,18 +1370,17 @@ allow xserver_t xdm_t:shm rw_shm_perms;
|
||||||
|
|
||||||
# NB we do NOT allow xserver_t xdm_var_lib_t:dir, only access to an open
|
# NB we do NOT allow xserver_t xdm_var_lib_t:dir, only access to an open
|
||||||
# handle of a file inside the dir!!!
|
# handle of a file inside the dir!!!
|
||||||
@ -32309,7 +32315,7 @@ index 8b40377..436b1e0 100644
|
|||||||
can_exec(xserver_t, xkb_var_lib_t)
|
can_exec(xserver_t, xkb_var_lib_t)
|
||||||
|
|
||||||
# VNC v4 module in X server
|
# VNC v4 module in X server
|
||||||
@@ -842,26 +1388,21 @@ init_use_fds(xserver_t)
|
@@ -842,26 +1393,21 @@ init_use_fds(xserver_t)
|
||||||
# to read ROLE_home_t - examine this in more detail
|
# to read ROLE_home_t - examine this in more detail
|
||||||
# (xauth?)
|
# (xauth?)
|
||||||
userdom_read_user_home_content_files(xserver_t)
|
userdom_read_user_home_content_files(xserver_t)
|
||||||
@ -32344,7 +32350,7 @@ index 8b40377..436b1e0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -912,7 +1453,7 @@ allow x_domain xproperty_t:x_property { getattr create read write append destroy
|
@@ -912,7 +1458,7 @@ allow x_domain xproperty_t:x_property { getattr create read write append destroy
|
||||||
allow x_domain root_xdrawable_t:x_drawable { getattr setattr list_child add_child remove_child send receive hide show };
|
allow x_domain root_xdrawable_t:x_drawable { getattr setattr list_child add_child remove_child send receive hide show };
|
||||||
# operations allowed on my windows
|
# operations allowed on my windows
|
||||||
allow x_domain self:x_drawable { create destroy getattr setattr read write show hide list_child add_child remove_child manage send receive };
|
allow x_domain self:x_drawable { create destroy getattr setattr read write show hide list_child add_child remove_child manage send receive };
|
||||||
@ -32353,7 +32359,7 @@ index 8b40377..436b1e0 100644
|
|||||||
# operations allowed on all windows
|
# operations allowed on all windows
|
||||||
allow x_domain x_domain:x_drawable { getattr get_property set_property remove_child };
|
allow x_domain x_domain:x_drawable { getattr get_property set_property remove_child };
|
||||||
|
|
||||||
@@ -966,11 +1507,31 @@ allow x_domain self:x_resource { read write };
|
@@ -966,11 +1512,31 @@ allow x_domain self:x_resource { read write };
|
||||||
# can mess with the screensaver
|
# can mess with the screensaver
|
||||||
allow x_domain xserver_t:x_screen { getattr saver_getattr };
|
allow x_domain xserver_t:x_screen { getattr saver_getattr };
|
||||||
|
|
||||||
@ -32385,7 +32391,7 @@ index 8b40377..436b1e0 100644
|
|||||||
tunable_policy(`! xserver_object_manager',`
|
tunable_policy(`! xserver_object_manager',`
|
||||||
# should be xserver_unconfined(x_domain),
|
# should be xserver_unconfined(x_domain),
|
||||||
# but typeattribute doesnt work in conditionals
|
# but typeattribute doesnt work in conditionals
|
||||||
@@ -992,18 +1553,148 @@ tunable_policy(`! xserver_object_manager',`
|
@@ -992,18 +1558,148 @@ tunable_policy(`! xserver_object_manager',`
|
||||||
allow x_domain xevent_type:{ x_event x_synthetic_event } *;
|
allow x_domain xevent_type:{ x_event x_synthetic_event } *;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -49519,7 +49519,7 @@ index b1ac8b5..24782b3 100644
|
|||||||
+ ')
|
+ ')
|
||||||
+')
|
+')
|
||||||
diff --git a/modemmanager.te b/modemmanager.te
|
diff --git a/modemmanager.te b/modemmanager.te
|
||||||
index d15eb5b..6e2a403 100644
|
index d15eb5b..7f3c31d 100644
|
||||||
--- a/modemmanager.te
|
--- a/modemmanager.te
|
||||||
+++ b/modemmanager.te
|
+++ b/modemmanager.te
|
||||||
@@ -11,6 +11,9 @@ init_daemon_domain(modemmanager_t, modemmanager_exec_t)
|
@@ -11,6 +11,9 @@ init_daemon_domain(modemmanager_t, modemmanager_exec_t)
|
||||||
@ -49561,6 +49561,14 @@ index d15eb5b..6e2a403 100644
|
|||||||
|
|
||||||
logging_send_syslog_msg(modemmanager_t)
|
logging_send_syslog_msg(modemmanager_t)
|
||||||
|
|
||||||
|
@@ -56,3 +63,7 @@ optional_policy(`
|
||||||
|
udev_read_db(modemmanager_t)
|
||||||
|
udev_manage_pid_files(modemmanager_t)
|
||||||
|
')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ systemd_dbus_chat_logind(modemmanager_t)
|
||||||
|
+')
|
||||||
diff --git a/mojomojo.fc b/mojomojo.fc
|
diff --git a/mojomojo.fc b/mojomojo.fc
|
||||||
index 7b827ca..5ee8a0f 100644
|
index 7b827ca..5ee8a0f 100644
|
||||||
--- a/mojomojo.fc
|
--- a/mojomojo.fc
|
||||||
@ -107581,7 +107589,7 @@ index 61c2e07..3b86095 100644
|
|||||||
+ ')
|
+ ')
|
||||||
')
|
')
|
||||||
diff --git a/tor.te b/tor.te
|
diff --git a/tor.te b/tor.te
|
||||||
index 5ceacde..40e9303 100644
|
index 5ceacde..9353adb 100644
|
||||||
--- a/tor.te
|
--- a/tor.te
|
||||||
+++ b/tor.te
|
+++ b/tor.te
|
||||||
@@ -13,6 +13,13 @@ policy_module(tor, 1.9.0)
|
@@ -13,6 +13,13 @@ policy_module(tor, 1.9.0)
|
||||||
@ -107608,7 +107616,16 @@ index 5ceacde..40e9303 100644
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Local policy
|
# Local policy
|
||||||
@@ -77,7 +87,6 @@ corenet_tcp_sendrecv_generic_node(tor_t)
|
@@ -48,6 +58,8 @@ allow tor_t tor_etc_t:dir list_dir_perms;
|
||||||
|
allow tor_t tor_etc_t:file read_file_perms;
|
||||||
|
allow tor_t tor_etc_t:lnk_file read_lnk_file_perms;
|
||||||
|
|
||||||
|
+dontaudit tor_t self:capability { net_admin };
|
||||||
|
+
|
||||||
|
manage_dirs_pattern(tor_t, tor_var_lib_t, tor_var_lib_t)
|
||||||
|
manage_files_pattern(tor_t, tor_var_lib_t, tor_var_lib_t)
|
||||||
|
manage_sock_files_pattern(tor_t, tor_var_lib_t, tor_var_lib_t)
|
||||||
|
@@ -77,7 +89,6 @@ corenet_tcp_sendrecv_generic_node(tor_t)
|
||||||
corenet_udp_sendrecv_generic_node(tor_t)
|
corenet_udp_sendrecv_generic_node(tor_t)
|
||||||
corenet_tcp_bind_generic_node(tor_t)
|
corenet_tcp_bind_generic_node(tor_t)
|
||||||
corenet_udp_bind_generic_node(tor_t)
|
corenet_udp_bind_generic_node(tor_t)
|
||||||
@ -107616,7 +107633,7 @@ index 5ceacde..40e9303 100644
|
|||||||
corenet_sendrecv_dns_server_packets(tor_t)
|
corenet_sendrecv_dns_server_packets(tor_t)
|
||||||
corenet_udp_bind_dns_port(tor_t)
|
corenet_udp_bind_dns_port(tor_t)
|
||||||
corenet_udp_sendrecv_dns_port(tor_t)
|
corenet_udp_sendrecv_dns_port(tor_t)
|
||||||
@@ -85,6 +94,7 @@ corenet_udp_sendrecv_dns_port(tor_t)
|
@@ -85,6 +96,7 @@ corenet_udp_sendrecv_dns_port(tor_t)
|
||||||
corenet_sendrecv_tor_server_packets(tor_t)
|
corenet_sendrecv_tor_server_packets(tor_t)
|
||||||
corenet_tcp_bind_tor_port(tor_t)
|
corenet_tcp_bind_tor_port(tor_t)
|
||||||
corenet_tcp_sendrecv_tor_port(tor_t)
|
corenet_tcp_sendrecv_tor_port(tor_t)
|
||||||
@ -107624,7 +107641,7 @@ index 5ceacde..40e9303 100644
|
|||||||
|
|
||||||
corenet_sendrecv_all_client_packets(tor_t)
|
corenet_sendrecv_all_client_packets(tor_t)
|
||||||
corenet_tcp_connect_all_ports(tor_t)
|
corenet_tcp_connect_all_ports(tor_t)
|
||||||
@@ -98,19 +108,22 @@ dev_read_urand(tor_t)
|
@@ -98,19 +110,22 @@ dev_read_urand(tor_t)
|
||||||
domain_use_interactive_fds(tor_t)
|
domain_use_interactive_fds(tor_t)
|
||||||
|
|
||||||
files_read_etc_runtime_files(tor_t)
|
files_read_etc_runtime_files(tor_t)
|
||||||
@ -116833,7 +116850,7 @@ index 0928c5d..d270a72 100644
|
|||||||
|
|
||||||
userdom_dontaudit_use_unpriv_user_fds(xfs_t)
|
userdom_dontaudit_use_unpriv_user_fds(xfs_t)
|
||||||
diff --git a/xguest.te b/xguest.te
|
diff --git a/xguest.te b/xguest.te
|
||||||
index a64aad3..fe078eb 100644
|
index a64aad3..d923154 100644
|
||||||
--- a/xguest.te
|
--- a/xguest.te
|
||||||
+++ b/xguest.te
|
+++ b/xguest.te
|
||||||
@@ -6,46 +6,47 @@ policy_module(xguest, 1.2.0)
|
@@ -6,46 +6,47 @@ policy_module(xguest, 1.2.0)
|
||||||
@ -116902,7 +116919,7 @@ index a64aad3..fe078eb 100644
|
|||||||
storage_raw_read_removable_device(xguest_t)
|
storage_raw_read_removable_device(xguest_t)
|
||||||
storage_raw_write_removable_device(xguest_t)
|
storage_raw_write_removable_device(xguest_t)
|
||||||
',`
|
',`
|
||||||
@@ -54,9 +55,22 @@ ifndef(`enable_mls',`
|
@@ -54,9 +55,25 @@ ifndef(`enable_mls',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -116913,6 +116930,9 @@ index a64aad3..fe078eb 100644
|
|||||||
+kernel_dontaudit_request_load_module(xguest_t)
|
+kernel_dontaudit_request_load_module(xguest_t)
|
||||||
+kernel_read_software_raid_state(xguest_t)
|
+kernel_read_software_raid_state(xguest_t)
|
||||||
+
|
+
|
||||||
|
+#GDM runs the X server as the unprivileged user.
|
||||||
|
+dev_rw_input_dev(xguest_t)
|
||||||
|
+
|
||||||
+tunable_policy(`selinuxuser_execstack',`
|
+tunable_policy(`selinuxuser_execstack',`
|
||||||
+ allow xguest_t self:process execstack;
|
+ allow xguest_t self:process execstack;
|
||||||
+')
|
+')
|
||||||
@ -116926,7 +116946,7 @@ index a64aad3..fe078eb 100644
|
|||||||
files_dontaudit_getattr_boot_dirs(xguest_t)
|
files_dontaudit_getattr_boot_dirs(xguest_t)
|
||||||
files_search_mnt(xguest_t)
|
files_search_mnt(xguest_t)
|
||||||
|
|
||||||
@@ -65,10 +79,9 @@ optional_policy(`
|
@@ -65,10 +82,9 @@ optional_policy(`
|
||||||
fs_manage_noxattr_fs_dirs(xguest_t)
|
fs_manage_noxattr_fs_dirs(xguest_t)
|
||||||
fs_getattr_noxattr_fs(xguest_t)
|
fs_getattr_noxattr_fs(xguest_t)
|
||||||
fs_read_noxattr_fs_symlinks(xguest_t)
|
fs_read_noxattr_fs_symlinks(xguest_t)
|
||||||
@ -116938,7 +116958,7 @@ index a64aad3..fe078eb 100644
|
|||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -84,12 +97,25 @@ optional_policy(`
|
@@ -84,12 +100,25 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -116950,23 +116970,23 @@ index a64aad3..fe078eb 100644
|
|||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ colord_dbus_chat(xguest_t)
|
+ colord_dbus_chat(xguest_t)
|
||||||
+')
|
')
|
||||||
+
|
|
||||||
+optional_policy(`
|
optional_policy(`
|
||||||
|
- gnomeclock_dontaudit_dbus_chat(xguest_t)
|
||||||
+ chrome_role(xguest_r, xguest_t)
|
+ chrome_role(xguest_r, xguest_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ thumb_role(xguest_r, xguest_t)
|
+ thumb_role(xguest_r, xguest_t)
|
||||||
')
|
+')
|
||||||
|
+
|
||||||
optional_policy(`
|
+optional_policy(`
|
||||||
- gnomeclock_dontaudit_dbus_chat(xguest_t)
|
|
||||||
+ dbus_dontaudit_chat_system_bus(xguest_t)
|
+ dbus_dontaudit_chat_system_bus(xguest_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -97,75 +123,78 @@ optional_policy(`
|
@@ -97,75 +126,78 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 182%{?dist}
|
Release: 183%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -653,6 +653,12 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Apr 18 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-183
|
||||||
|
- Allow modemmanager to talk to logind
|
||||||
|
- Dontaudit tor daemon needs net_admin capability. rhbz#1311788
|
||||||
|
- Allow GDM write to event devices. This rule is needed for GDM, because other display managers runs the X server as root, GDM instead runs the X server as the unprivileged user, within the user session. rhbz#1232042
|
||||||
|
- Xorg now writes content in users homedir.
|
||||||
|
|
||||||
* Fri Apr 08 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-182
|
* Fri Apr 08 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-182
|
||||||
- rename several contrib modules according to their filenames
|
- rename several contrib modules according to their filenames
|
||||||
- Add interface gnome_filetrans_cert_home_content()
|
- Add interface gnome_filetrans_cert_home_content()
|
||||||
|
Loading…
Reference in New Issue
Block a user