* Mon Nov 30 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-161

- Set default value as true in boolean mozilla_plugin_can_network_connect. BZ(1286177)
This commit is contained in:
Lukas Vrabec 2015-11-30 12:48:01 +01:00
parent e5fd601a61
commit 71a663b812
4 changed files with 151 additions and 129 deletions

Binary file not shown.

View File

@ -15416,7 +15416,7 @@ index d7c11a0..6b3331d 100644
/var/run/shm/.* <<none>>
-')
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
index 8416beb..4d615ff 100644
index 8416beb..cdeecad 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -631,6 +631,27 @@ interface(`fs_getattr_cgroup',`
@ -16467,39 +16467,48 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -2234,18 +2587,533 @@ interface(`fs_mount_iso9660_fs',`
@@ -2234,18 +2587,17 @@ interface(`fs_mount_iso9660_fs',`
## </summary>
## </param>
#
-interface(`fs_remount_iso9660_fs',`
+interface(`fs_manage_hugetlbfs_dirs',`
+ gen_require(`
gen_require(`
- type iso9660_t;
+ type hugetlbfs_t;
+ ')
+
')
- allow $1 iso9660_t:filesystem remount;
+ manage_dirs_pattern($1, hugetlbfs_t, hugetlbfs_t)
+')
+
+########################################
+## <summary>
')
########################################
## <summary>
-## Unmount an iso9660 filesystem, which
-## is usually used on CDs.
+## Read hugetlbfs files.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
## </summary>
## <param name="domain">
## <summary>
@@ -2253,38 +2605,557 @@ interface(`fs_remount_iso9660_fs',`
## </summary>
## </param>
#
-interface(`fs_unmount_iso9660_fs',`
+interface(`fs_read_hugetlbfs_files',`
+ gen_require(`
gen_require(`
- type iso9660_t;
+ type hugetlbfs_t;
+ ')
+
')
- allow $1 iso9660_t:filesystem unmount;
+ read_files_pattern($1, hugetlbfs_t, hugetlbfs_t)
+')
+
+########################################
+## <summary>
')
########################################
## <summary>
-## Get the attributes of an iso9660
-## filesystem, which is usually used on CDs.
+## Read and write hugetlbfs files.
+## </summary>
+## <param name="domain">
@ -16987,48 +16996,39 @@ index 8416beb..4d615ff 100644
+## </param>
+#
+interface(`fs_write_kdbus_files', `
gen_require(`
- type iso9660_t;
+ gen_require(`
+ type kdbusfs_t;
')
- allow $1 iso9660_t:filesystem remount;
+ ')
+
+ write_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ fs_search_tmpfs($1)
+ dev_search_sysfs($1)
')
########################################
## <summary>
-## Unmount an iso9660 filesystem, which
-## is usually used on CDs.
+')
+
+########################################
+## <summary>
+## Read and write kdbusfs files.
## </summary>
## <param name="domain">
## <summary>
@@ -2253,38 +3121,41 @@ interface(`fs_remount_iso9660_fs',`
## </summary>
## </param>
#
-interface(`fs_unmount_iso9660_fs',`
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`fs_rw_kdbus_files',`
gen_require(`
- type iso9660_t;
+ gen_require(`
+ type kdbusfs_t;
+
')
- allow $1 iso9660_t:filesystem unmount;
+ ')
+
+ read_lnk_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ rw_files_pattern($1, kdbusfs_t, kdbusfs_t)
+ fs_search_tmpfs($1)
+ dev_search_sysfs($1)
')
########################################
## <summary>
-## Get the attributes of an iso9660
-## filesystem, which is usually used on CDs.
+')
+
+########################################
+## <summary>
+## Do not audit attempts to open,
+## get attributes, read and write
+## cgroup files.
@ -17265,7 +17265,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -2719,6 +3685,47 @@ interface(`fs_search_rpc',`
@@ -2719,6 +3685,65 @@ interface(`fs_search_rpc',`
########################################
## <summary>
@ -17309,11 +17309,29 @@ index 8416beb..4d615ff 100644
+')
+
+########################################
+## <summary>
+## Relabel directory on removable storage.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`fs_relabel_pstore_dirs',`
+ gen_require(`
+ type pstore_t;
+ ')
+
+ relabel_dirs_pattern($1, pstore_t, pstore_t)
+')
+
+########################################
+## <summary>
## Search removable storage directories.
## </summary>
## <param name="domain">
@@ -2741,7 +3748,7 @@ interface(`fs_search_removable',`
@@ -2741,7 +3766,7 @@ interface(`fs_search_removable',`
## </summary>
## <param name="domain">
## <summary>
@ -17322,7 +17340,7 @@ index 8416beb..4d615ff 100644
## </summary>
## </param>
#
@@ -2777,7 +3784,7 @@ interface(`fs_read_removable_files',`
@@ -2777,7 +3802,7 @@ interface(`fs_read_removable_files',`
## </summary>
## <param name="domain">
## <summary>
@ -17331,7 +17349,7 @@ index 8416beb..4d615ff 100644
## </summary>
## </param>
#
@@ -2970,6 +3977,7 @@ interface(`fs_manage_nfs_dirs',`
@@ -2970,6 +3995,7 @@ interface(`fs_manage_nfs_dirs',`
type nfs_t;
')
@ -17339,7 +17357,7 @@ index 8416beb..4d615ff 100644
allow $1 nfs_t:dir manage_dir_perms;
')
@@ -3010,6 +4018,7 @@ interface(`fs_manage_nfs_files',`
@@ -3010,6 +4036,7 @@ interface(`fs_manage_nfs_files',`
type nfs_t;
')
@ -17347,7 +17365,7 @@ index 8416beb..4d615ff 100644
manage_files_pattern($1, nfs_t, nfs_t)
')
@@ -3050,6 +4059,7 @@ interface(`fs_manage_nfs_symlinks',`
@@ -3050,6 +4077,7 @@ interface(`fs_manage_nfs_symlinks',`
type nfs_t;
')
@ -17355,7 +17373,7 @@ index 8416beb..4d615ff 100644
manage_lnk_files_pattern($1, nfs_t, nfs_t)
')
@@ -3137,6 +4147,24 @@ interface(`fs_nfs_domtrans',`
@@ -3137,6 +4165,24 @@ interface(`fs_nfs_domtrans',`
########################################
## <summary>
@ -17380,7 +17398,7 @@ index 8416beb..4d615ff 100644
## Mount a NFS server pseudo filesystem.
## </summary>
## <param name="domain">
@@ -3263,6 +4291,24 @@ interface(`fs_getattr_nfsd_files',`
@@ -3263,6 +4309,24 @@ interface(`fs_getattr_nfsd_files',`
getattr_files_pattern($1, nfsd_fs_t, nfsd_fs_t)
')
@ -17405,7 +17423,7 @@ index 8416beb..4d615ff 100644
########################################
## <summary>
## Read and write NFS server files.
@@ -3283,6 +4329,24 @@ interface(`fs_rw_nfsd_fs',`
@@ -3283,6 +4347,24 @@ interface(`fs_rw_nfsd_fs',`
########################################
## <summary>
@ -17430,7 +17448,7 @@ index 8416beb..4d615ff 100644
## Allow the type to associate to ramfs filesystems.
## </summary>
## <param name="type">
@@ -3392,7 +4456,7 @@ interface(`fs_search_ramfs',`
@@ -3392,7 +4474,7 @@ interface(`fs_search_ramfs',`
########################################
## <summary>
@ -17439,7 +17457,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3429,7 +4493,7 @@ interface(`fs_manage_ramfs_dirs',`
@@ -3429,7 +4511,7 @@ interface(`fs_manage_ramfs_dirs',`
########################################
## <summary>
@ -17448,7 +17466,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3447,7 +4511,7 @@ interface(`fs_dontaudit_read_ramfs_files',`
@@ -3447,7 +4529,7 @@ interface(`fs_dontaudit_read_ramfs_files',`
########################################
## <summary>
@ -17457,7 +17475,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3779,6 +4843,24 @@ interface(`fs_mount_tmpfs',`
@@ -3779,6 +4861,24 @@ interface(`fs_mount_tmpfs',`
########################################
## <summary>
@ -17482,7 +17500,7 @@ index 8416beb..4d615ff 100644
## Remount a tmpfs filesystem.
## </summary>
## <param name="domain">
@@ -3815,6 +4897,24 @@ interface(`fs_unmount_tmpfs',`
@@ -3815,6 +4915,24 @@ interface(`fs_unmount_tmpfs',`
########################################
## <summary>
@ -17507,7 +17525,7 @@ index 8416beb..4d615ff 100644
## Get the attributes of a tmpfs
## filesystem.
## </summary>
@@ -3839,39 +4939,76 @@ interface(`fs_getattr_tmpfs',`
@@ -3839,39 +4957,76 @@ interface(`fs_getattr_tmpfs',`
## </summary>
## <param name="type">
## <summary>
@ -17593,7 +17611,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3879,36 +5016,35 @@ interface(`fs_relabelfrom_tmpfs',`
@@ -3879,36 +5034,35 @@ interface(`fs_relabelfrom_tmpfs',`
## </summary>
## </param>
#
@ -17637,7 +17655,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3916,35 +5052,36 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',`
@@ -3916,35 +5070,36 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',`
## </summary>
## </param>
#
@ -17681,7 +17699,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3952,17 +5089,17 @@ interface(`fs_setattr_tmpfs_dirs',`
@@ -3952,17 +5107,17 @@ interface(`fs_setattr_tmpfs_dirs',`
## </summary>
## </param>
#
@ -17702,7 +17720,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -3970,31 +5107,30 @@ interface(`fs_search_tmpfs',`
@@ -3970,31 +5125,30 @@ interface(`fs_search_tmpfs',`
## </summary>
## </param>
#
@ -17740,7 +17758,7 @@ index 8416beb..4d615ff 100644
')
########################################
@@ -4105,7 +5241,7 @@ interface(`fs_dontaudit_rw_tmpfs_files',`
@@ -4105,7 +5259,7 @@ interface(`fs_dontaudit_rw_tmpfs_files',`
type tmpfs_t;
')
@ -17749,7 +17767,7 @@ index 8416beb..4d615ff 100644
')
########################################
@@ -4165,6 +5301,24 @@ interface(`fs_rw_tmpfs_files',`
@@ -4165,6 +5319,24 @@ interface(`fs_rw_tmpfs_files',`
########################################
## <summary>
@ -17774,7 +17792,7 @@ index 8416beb..4d615ff 100644
## Read tmpfs link files.
## </summary>
## <param name="domain">
@@ -4202,7 +5356,7 @@ interface(`fs_rw_tmpfs_chr_files',`
@@ -4202,7 +5374,7 @@ interface(`fs_rw_tmpfs_chr_files',`
########################################
## <summary>
@ -17783,7 +17801,7 @@ index 8416beb..4d615ff 100644
## </summary>
## <param name="domain">
## <summary>
@@ -4221,6 +5375,60 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
@@ -4221,6 +5393,60 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
########################################
## <summary>
@ -17844,7 +17862,7 @@ index 8416beb..4d615ff 100644
## Relabel character nodes on tmpfs filesystems.
## </summary>
## <param name="domain">
@@ -4278,6 +5486,44 @@ interface(`fs_relabel_tmpfs_blk_file',`
@@ -4278,6 +5504,44 @@ interface(`fs_relabel_tmpfs_blk_file',`
########################################
## <summary>
@ -17889,7 +17907,7 @@ index 8416beb..4d615ff 100644
## Read and write, create and delete generic
## files on tmpfs filesystems.
## </summary>
@@ -4297,6 +5543,25 @@ interface(`fs_manage_tmpfs_files',`
@@ -4297,6 +5561,25 @@ interface(`fs_manage_tmpfs_files',`
########################################
## <summary>
@ -17915,7 +17933,7 @@ index 8416beb..4d615ff 100644
## Read and write, create and delete symbolic
## links on tmpfs filesystems.
## </summary>
@@ -4407,6 +5672,25 @@ interface(`fs_search_xenfs',`
@@ -4407,6 +5690,25 @@ interface(`fs_search_xenfs',`
allow $1 xenfs_t:dir search_dir_perms;
')
@ -17941,7 +17959,7 @@ index 8416beb..4d615ff 100644
########################################
## <summary>
## Create, read, write, and delete directories
@@ -4503,6 +5787,8 @@ interface(`fs_mount_all_fs',`
@@ -4503,6 +5805,8 @@ interface(`fs_mount_all_fs',`
')
allow $1 filesystem_type:filesystem mount;
@ -17950,7 +17968,7 @@ index 8416beb..4d615ff 100644
')
########################################
@@ -4549,7 +5835,7 @@ interface(`fs_unmount_all_fs',`
@@ -4549,7 +5853,7 @@ interface(`fs_unmount_all_fs',`
## <desc>
## <p>
## Allow the specified domain to
@ -17959,7 +17977,7 @@ index 8416beb..4d615ff 100644
## Example attributes:
## </p>
## <ul>
@@ -4596,6 +5882,26 @@ interface(`fs_dontaudit_getattr_all_fs',`
@@ -4596,6 +5900,26 @@ interface(`fs_dontaudit_getattr_all_fs',`
########################################
## <summary>
@ -17986,7 +18004,7 @@ index 8416beb..4d615ff 100644
## Get the quotas of all filesystems.
## </summary>
## <param name="domain">
@@ -4671,6 +5977,25 @@ interface(`fs_getattr_all_dirs',`
@@ -4671,6 +5995,25 @@ interface(`fs_getattr_all_dirs',`
########################################
## <summary>
@ -18012,7 +18030,7 @@ index 8416beb..4d615ff 100644
## Search all directories with a filesystem type.
## </summary>
## <param name="domain">
@@ -4912,3 +6237,63 @@ interface(`fs_unconfined',`
@@ -4912,3 +6255,63 @@ interface(`fs_unconfined',`
typeattribute $1 filesystem_unconfined_type;
')
@ -33892,7 +33910,7 @@ index 79a45f6..af3877f 100644
+ read_files_pattern($1, init_var_lib_t, init_var_lib_t)
+')
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 17eda24..34affdd 100644
index 17eda24..6d9bef0 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -11,10 +11,31 @@ gen_require(`
@ -34185,7 +34203,7 @@ index 17eda24..34affdd 100644
ifdef(`distro_gentoo',`
allow init_t self:process { getcap setcap };
@@ -186,29 +321,238 @@ ifdef(`distro_gentoo',`
@@ -186,29 +321,239 @@ ifdef(`distro_gentoo',`
')
ifdef(`distro_redhat',`
@ -34317,6 +34335,7 @@ index 17eda24..34affdd 100644
+fs_manage_cgroup_files(init_t)
+fs_manage_hugetlbfs_dirs(init_t)
+fs_manage_tmpfs_dirs(init_t)
+fs_relabel_pstore_dirs(init_t)
+fs_relabel_tmpfs_dirs(init_t)
+fs_relabel_tmpfs_files(init_t)
+fs_relabel_tmpfs_fifo_files(init_t)
@ -34433,7 +34452,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -216,7 +560,31 @@ optional_policy(`
@@ -216,7 +561,31 @@ optional_policy(`
')
optional_policy(`
@ -34465,7 +34484,7 @@ index 17eda24..34affdd 100644
')
########################################
@@ -225,9 +593,9 @@ optional_policy(`
@@ -225,9 +594,9 @@ optional_policy(`
#
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
@ -34477,7 +34496,7 @@ index 17eda24..34affdd 100644
allow initrc_t self:passwd rootok;
allow initrc_t self:key manage_key_perms;
@@ -258,12 +626,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
@@ -258,12 +627,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
allow initrc_t initrc_var_run_t:file manage_file_perms;
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
@ -34494,7 +34513,7 @@ index 17eda24..34affdd 100644
manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t)
@@ -279,23 +651,36 @@ kernel_change_ring_buffer_level(initrc_t)
@@ -279,23 +652,36 @@ kernel_change_ring_buffer_level(initrc_t)
kernel_clear_ring_buffer(initrc_t)
kernel_get_sysvipc_info(initrc_t)
kernel_read_all_sysctls(initrc_t)
@ -34537,7 +34556,7 @@ index 17eda24..34affdd 100644
corenet_tcp_sendrecv_all_ports(initrc_t)
corenet_udp_sendrecv_all_ports(initrc_t)
corenet_tcp_connect_all_ports(initrc_t)
@@ -303,9 +688,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
@@ -303,9 +689,11 @@ corenet_sendrecv_all_client_packets(initrc_t)
dev_read_rand(initrc_t)
dev_read_urand(initrc_t)
@ -34549,7 +34568,7 @@ index 17eda24..34affdd 100644
dev_rw_sysfs(initrc_t)
dev_list_usbfs(initrc_t)
dev_read_framebuffer(initrc_t)
@@ -313,8 +700,10 @@ dev_write_framebuffer(initrc_t)
@@ -313,8 +701,10 @@ dev_write_framebuffer(initrc_t)
dev_read_realtime_clock(initrc_t)
dev_read_sound_mixer(initrc_t)
dev_write_sound_mixer(initrc_t)
@ -34560,7 +34579,7 @@ index 17eda24..34affdd 100644
dev_delete_lvm_control_dev(initrc_t)
dev_manage_generic_symlinks(initrc_t)
dev_manage_generic_files(initrc_t)
@@ -322,8 +711,7 @@ dev_manage_generic_files(initrc_t)
@@ -322,8 +712,7 @@ dev_manage_generic_files(initrc_t)
dev_delete_generic_symlinks(initrc_t)
dev_getattr_all_blk_files(initrc_t)
dev_getattr_all_chr_files(initrc_t)
@ -34570,7 +34589,7 @@ index 17eda24..34affdd 100644
domain_kill_all_domains(initrc_t)
domain_signal_all_domains(initrc_t)
@@ -332,7 +720,6 @@ domain_sigstop_all_domains(initrc_t)
@@ -332,7 +721,6 @@ domain_sigstop_all_domains(initrc_t)
domain_sigchld_all_domains(initrc_t)
domain_read_all_domains_state(initrc_t)
domain_getattr_all_domains(initrc_t)
@ -34578,7 +34597,7 @@ index 17eda24..34affdd 100644
domain_getsession_all_domains(initrc_t)
domain_use_interactive_fds(initrc_t)
# for lsof which is used by alsa shutdown:
@@ -340,6 +727,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
@@ -340,6 +728,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t)
domain_dontaudit_getattr_all_tcp_sockets(initrc_t)
domain_dontaudit_getattr_all_dgram_sockets(initrc_t)
domain_dontaudit_getattr_all_pipes(initrc_t)
@ -34586,7 +34605,7 @@ index 17eda24..34affdd 100644
files_getattr_all_dirs(initrc_t)
files_getattr_all_files(initrc_t)
@@ -347,14 +735,15 @@ files_getattr_all_symlinks(initrc_t)
@@ -347,14 +736,15 @@ files_getattr_all_symlinks(initrc_t)
files_getattr_all_pipes(initrc_t)
files_getattr_all_sockets(initrc_t)
files_purge_tmp(initrc_t)
@ -34604,7 +34623,7 @@ index 17eda24..34affdd 100644
files_read_usr_files(initrc_t)
files_manage_urandom_seed(initrc_t)
files_manage_generic_spool(initrc_t)
@@ -364,8 +753,12 @@ files_list_isid_type_dirs(initrc_t)
@@ -364,8 +754,12 @@ files_list_isid_type_dirs(initrc_t)
files_mounton_isid_type_dirs(initrc_t)
files_list_default(initrc_t)
files_mounton_default(initrc_t)
@ -34618,7 +34637,7 @@ index 17eda24..34affdd 100644
fs_list_inotifyfs(initrc_t)
fs_register_binary_executable_type(initrc_t)
# rhgb-console writes to ramfs
@@ -375,10 +768,11 @@ fs_mount_all_fs(initrc_t)
@@ -375,10 +769,11 @@ fs_mount_all_fs(initrc_t)
fs_unmount_all_fs(initrc_t)
fs_remount_all_fs(initrc_t)
fs_getattr_all_fs(initrc_t)
@ -34632,7 +34651,7 @@ index 17eda24..34affdd 100644
mcs_process_set_categories(initrc_t)
mls_file_read_all_levels(initrc_t)
@@ -387,8 +781,10 @@ mls_process_read_up(initrc_t)
@@ -387,8 +782,10 @@ mls_process_read_up(initrc_t)
mls_process_write_down(initrc_t)
mls_rangetrans_source(initrc_t)
mls_fd_share_all_levels(initrc_t)
@ -34643,7 +34662,7 @@ index 17eda24..34affdd 100644
storage_getattr_fixed_disk_dev(initrc_t)
storage_setattr_fixed_disk_dev(initrc_t)
@@ -398,6 +794,7 @@ term_use_all_terms(initrc_t)
@@ -398,6 +795,7 @@ term_use_all_terms(initrc_t)
term_reset_tty_labels(initrc_t)
auth_rw_login_records(initrc_t)
@ -34651,7 +34670,7 @@ index 17eda24..34affdd 100644
auth_setattr_login_records(initrc_t)
auth_rw_lastlog(initrc_t)
auth_read_pam_pid(initrc_t)
@@ -416,20 +813,18 @@ logging_read_all_logs(initrc_t)
@@ -416,20 +814,18 @@ logging_read_all_logs(initrc_t)
logging_append_all_logs(initrc_t)
logging_read_audit_config(initrc_t)
@ -34675,7 +34694,7 @@ index 17eda24..34affdd 100644
ifdef(`distro_debian',`
dev_setattr_generic_dirs(initrc_t)
@@ -451,7 +846,6 @@ ifdef(`distro_gentoo',`
@@ -451,7 +847,6 @@ ifdef(`distro_gentoo',`
allow initrc_t self:process setfscreate;
dev_create_null_dev(initrc_t)
dev_create_zero_dev(initrc_t)
@ -34683,7 +34702,7 @@ index 17eda24..34affdd 100644
term_create_console_dev(initrc_t)
# unfortunately /sbin/rc does stupid tricks
@@ -486,6 +880,10 @@ ifdef(`distro_gentoo',`
@@ -486,6 +881,10 @@ ifdef(`distro_gentoo',`
sysnet_setattr_config(initrc_t)
optional_policy(`
@ -34694,7 +34713,7 @@ index 17eda24..34affdd 100644
alsa_read_lib(initrc_t)
')
@@ -506,7 +904,7 @@ ifdef(`distro_redhat',`
@@ -506,7 +905,7 @@ ifdef(`distro_redhat',`
# Red Hat systems seem to have a stray
# fd open from the initrd
@ -34703,7 +34722,7 @@ index 17eda24..34affdd 100644
files_dontaudit_read_root_files(initrc_t)
# These seem to be from the initrd
@@ -521,6 +919,7 @@ ifdef(`distro_redhat',`
@@ -521,6 +920,7 @@ ifdef(`distro_redhat',`
files_create_boot_dirs(initrc_t)
files_create_boot_flag(initrc_t)
files_rw_boot_symlinks(initrc_t)
@ -34711,7 +34730,7 @@ index 17eda24..34affdd 100644
# wants to read /.fonts directory
files_read_default_files(initrc_t)
files_mountpoint(initrc_tmp_t)
@@ -541,6 +940,7 @@ ifdef(`distro_redhat',`
@@ -541,6 +941,7 @@ ifdef(`distro_redhat',`
miscfiles_rw_localization(initrc_t)
miscfiles_setattr_localization(initrc_t)
miscfiles_relabel_localization(initrc_t)
@ -34719,7 +34738,7 @@ index 17eda24..34affdd 100644
miscfiles_read_fonts(initrc_t)
miscfiles_read_hwdata(initrc_t)
@@ -550,8 +950,44 @@ ifdef(`distro_redhat',`
@@ -550,8 +951,44 @@ ifdef(`distro_redhat',`
')
optional_policy(`
@ -34764,7 +34783,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -559,14 +995,31 @@ ifdef(`distro_redhat',`
@@ -559,14 +996,31 @@ ifdef(`distro_redhat',`
rpc_write_exports(initrc_t)
rpc_manage_nfs_state_data(initrc_t)
')
@ -34796,7 +34815,7 @@ index 17eda24..34affdd 100644
')
')
@@ -577,6 +1030,39 @@ ifdef(`distro_suse',`
@@ -577,6 +1031,39 @@ ifdef(`distro_suse',`
')
')
@ -34836,7 +34855,7 @@ index 17eda24..34affdd 100644
optional_policy(`
amavis_search_lib(initrc_t)
amavis_setattr_pid_files(initrc_t)
@@ -589,6 +1075,8 @@ optional_policy(`
@@ -589,6 +1076,8 @@ optional_policy(`
optional_policy(`
apache_read_config(initrc_t)
apache_list_modules(initrc_t)
@ -34845,7 +34864,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -610,6 +1098,7 @@ optional_policy(`
@@ -610,6 +1099,7 @@ optional_policy(`
optional_policy(`
cgroup_stream_connect_cgred(initrc_t)
@ -34853,7 +34872,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -626,6 +1115,17 @@ optional_policy(`
@@ -626,6 +1116,17 @@ optional_policy(`
')
optional_policy(`
@ -34871,7 +34890,7 @@ index 17eda24..34affdd 100644
dev_getattr_printer_dev(initrc_t)
cups_read_log(initrc_t)
@@ -642,9 +1142,13 @@ optional_policy(`
@@ -642,9 +1143,13 @@ optional_policy(`
dbus_connect_system_bus(initrc_t)
dbus_system_bus_client(initrc_t)
dbus_read_config(initrc_t)
@ -34885,7 +34904,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -657,15 +1161,11 @@ optional_policy(`
@@ -657,15 +1162,11 @@ optional_policy(`
')
optional_policy(`
@ -34903,7 +34922,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -686,6 +1186,15 @@ optional_policy(`
@@ -686,6 +1187,15 @@ optional_policy(`
')
optional_policy(`
@ -34919,7 +34938,7 @@ index 17eda24..34affdd 100644
inn_exec_config(initrc_t)
')
@@ -726,6 +1235,7 @@ optional_policy(`
@@ -726,6 +1236,7 @@ optional_policy(`
lpd_list_spool(initrc_t)
lpd_read_config(initrc_t)
@ -34927,7 +34946,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -743,7 +1253,13 @@ optional_policy(`
@@ -743,7 +1254,13 @@ optional_policy(`
')
optional_policy(`
@ -34942,7 +34961,7 @@ index 17eda24..34affdd 100644
mta_dontaudit_read_spool_symlinks(initrc_t)
')
@@ -766,6 +1282,10 @@ optional_policy(`
@@ -766,6 +1283,10 @@ optional_policy(`
')
optional_policy(`
@ -34953,7 +34972,7 @@ index 17eda24..34affdd 100644
postgresql_manage_db(initrc_t)
postgresql_read_config(initrc_t)
')
@@ -775,10 +1295,20 @@ optional_policy(`
@@ -775,10 +1296,20 @@ optional_policy(`
')
optional_policy(`
@ -34974,7 +34993,7 @@ index 17eda24..34affdd 100644
quota_manage_flags(initrc_t)
')
@@ -787,6 +1317,10 @@ optional_policy(`
@@ -787,6 +1318,10 @@ optional_policy(`
')
optional_policy(`
@ -34985,7 +35004,7 @@ index 17eda24..34affdd 100644
fs_write_ramfs_sockets(initrc_t)
fs_search_ramfs(initrc_t)
@@ -808,8 +1342,6 @@ optional_policy(`
@@ -808,8 +1343,6 @@ optional_policy(`
# bash tries ioctl for some reason
files_dontaudit_ioctl_all_pids(initrc_t)
@ -34994,7 +35013,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -818,6 +1350,10 @@ optional_policy(`
@@ -818,6 +1351,10 @@ optional_policy(`
')
optional_policy(`
@ -35005,7 +35024,7 @@ index 17eda24..34affdd 100644
# shorewall-init script run /var/lib/shorewall/firewall
shorewall_lib_domtrans(initrc_t)
')
@@ -827,10 +1363,12 @@ optional_policy(`
@@ -827,10 +1364,12 @@ optional_policy(`
squid_manage_logs(initrc_t)
')
@ -35018,7 +35037,7 @@ index 17eda24..34affdd 100644
optional_policy(`
ssh_dontaudit_read_server_keys(initrc_t)
@@ -857,21 +1395,60 @@ optional_policy(`
@@ -857,21 +1396,60 @@ optional_policy(`
')
optional_policy(`
@ -35080,7 +35099,7 @@ index 17eda24..34affdd 100644
')
optional_policy(`
@@ -887,6 +1464,10 @@ optional_policy(`
@@ -887,6 +1465,10 @@ optional_policy(`
')
optional_policy(`
@ -35091,7 +35110,7 @@ index 17eda24..34affdd 100644
# Set device ownerships/modes.
xserver_setattr_console_pipes(initrc_t)
@@ -897,3 +1478,218 @@ optional_policy(`
@@ -897,3 +1479,218 @@ optional_policy(`
optional_policy(`
zebra_read_config(initrc_t)
')

View File

@ -50403,7 +50403,7 @@ index 6194b80..e27c53d 100644
')
+
diff --git a/mozilla.te b/mozilla.te
index 11ac8e4..cee5091 100644
index 11ac8e4..b341bb0 100644
--- a/mozilla.te
+++ b/mozilla.te
@@ -6,17 +6,56 @@ policy_module(mozilla, 2.8.0)
@ -50419,7 +50419,7 @@ index 11ac8e4..cee5091 100644
+## </p>
## </desc>
-gen_tunable(mozilla_execstack, false)
+gen_tunable(mozilla_plugin_can_network_connect, false)
+gen_tunable(mozilla_plugin_can_network_connect, true)
+
+## <desc>
+## <p>

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.13.1
Release: 160%{?dist}
Release: 161%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@ -664,6 +664,9 @@ exit 0
%endif
%changelog
* Mon Nov 30 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-161
- Set default value as true in boolean mozilla_plugin_can_network_connect. BZ(1286177)
* Tue Nov 24 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-160
- Allow apcupsd sending mails about battery state. BZ(1274018)
- Allow pcp_pmcd_t domain transition to lvm_t. BZ(1277779)