* Thu Jan 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-104
- remove duplicate filename transition rules. - Call proper interface in sosreport.te. - Allow fetchmail to manage its keyring - Allow mail munin to create udp_sockets - Allow couchdb to sendto kernel unix domain sockets
This commit is contained in:
		
							parent
							
								
									525ad6557a
								
							
						
					
					
						commit
						72c96b37c5
					
				| @ -3222,7 +3222,7 @@ index 1dc7a85..c6f4da0 100644 | |||||||
| +	corecmd_shell_domtrans($1_seunshare_t, $1_t)
 | +	corecmd_shell_domtrans($1_seunshare_t, $1_t)
 | ||||||
|  ') |  ') | ||||||
| diff --git a/policy/modules/apps/seunshare.te b/policy/modules/apps/seunshare.te
 | diff --git a/policy/modules/apps/seunshare.te b/policy/modules/apps/seunshare.te
 | ||||||
| index 7590165..85186a9 100644
 | index 7590165..d81185e 100644
 | ||||||
| --- a/policy/modules/apps/seunshare.te
 | --- a/policy/modules/apps/seunshare.te
 | ||||||
| +++ b/policy/modules/apps/seunshare.te
 | +++ b/policy/modules/apps/seunshare.te
 | ||||||
| @@ -5,40 +5,65 @@ policy_module(seunshare, 1.1.0)
 | @@ -5,40 +5,65 @@ policy_module(seunshare, 1.1.0)
 | ||||||
| @ -3240,7 +3240,7 @@ index 7590165..85186a9 100644 | |||||||
|  # seunshare local policy |  # seunshare local policy | ||||||
|  # |  # | ||||||
| +allow seunshare_domain self:capability { fowner setgid setuid dac_override setpcap sys_admin sys_nice };
 | +allow seunshare_domain self:capability { fowner setgid setuid dac_override setpcap sys_admin sys_nice };
 | ||||||
| +allow seunshare_domain self:process { fork setexec signal getcap setcap setsched };
 | +allow seunshare_domain self:process { fork setexec signal getcap setcap setcurrent setsched };
 | ||||||
|   |   | ||||||
| -allow seunshare_t self:capability { setuid dac_override setpcap sys_admin };
 | -allow seunshare_t self:capability { setuid dac_override setpcap sys_admin };
 | ||||||
| -allow seunshare_t self:process { setexec signal getcap setcap };
 | -allow seunshare_t self:process { setexec signal getcap setcap };
 | ||||||
|  | |||||||
| @ -16390,7 +16390,7 @@ index 715a826..a1cbdb2 100644 | |||||||
| +	')
 | +	')
 | ||||||
|  ') |  ') | ||||||
| diff --git a/couchdb.te b/couchdb.te
 | diff --git a/couchdb.te b/couchdb.te
 | ||||||
| index ae1c1b1..6238c82 100644
 | index ae1c1b1..a3af6c9 100644
 | ||||||
| --- a/couchdb.te
 | --- a/couchdb.te
 | ||||||
| +++ b/couchdb.te
 | +++ b/couchdb.te
 | ||||||
| @@ -27,18 +27,21 @@ files_type(couchdb_var_lib_t)
 | @@ -27,18 +27,21 @@ files_type(couchdb_var_lib_t)
 | ||||||
| @ -16418,7 +16418,7 @@ index ae1c1b1..6238c82 100644 | |||||||
|   |   | ||||||
|  manage_dirs_pattern(couchdb_t, couchdb_log_t, couchdb_log_t) |  manage_dirs_pattern(couchdb_t, couchdb_log_t, couchdb_log_t) | ||||||
|  append_files_pattern(couchdb_t, couchdb_log_t, couchdb_log_t) |  append_files_pattern(couchdb_t, couchdb_log_t, couchdb_log_t) | ||||||
| @@ -56,11 +59,12 @@ files_var_lib_filetrans(couchdb_t, couchdb_var_lib_t, dir)
 | @@ -56,11 +59,13 @@ files_var_lib_filetrans(couchdb_t, couchdb_var_lib_t, dir)
 | ||||||
|   |   | ||||||
|  manage_dirs_pattern(couchdb_t, couchdb_var_run_t, couchdb_var_run_t) |  manage_dirs_pattern(couchdb_t, couchdb_var_run_t, couchdb_var_run_t) | ||||||
|  manage_files_pattern(couchdb_t, couchdb_var_run_t, couchdb_var_run_t) |  manage_files_pattern(couchdb_t, couchdb_var_run_t, couchdb_var_run_t) | ||||||
| @ -16429,10 +16429,11 @@ index ae1c1b1..6238c82 100644 | |||||||
|   |   | ||||||
|  kernel_read_system_state(couchdb_t) |  kernel_read_system_state(couchdb_t) | ||||||
| +kernel_read_fs_sysctls(couchdb_t)
 | +kernel_read_fs_sysctls(couchdb_t)
 | ||||||
|  | +kernel_dgram_send(couchdb_t)
 | ||||||
|   |   | ||||||
|  corecmd_exec_bin(couchdb_t) |  corecmd_exec_bin(couchdb_t) | ||||||
|  corecmd_exec_shell(couchdb_t) |  corecmd_exec_shell(couchdb_t) | ||||||
| @@ -75,14 +79,23 @@ corenet_sendrecv_couchdb_server_packets(couchdb_t)
 | @@ -75,14 +80,23 @@ corenet_sendrecv_couchdb_server_packets(couchdb_t)
 | ||||||
|  corenet_tcp_bind_couchdb_port(couchdb_t) |  corenet_tcp_bind_couchdb_port(couchdb_t) | ||||||
|  corenet_tcp_sendrecv_couchdb_port(couchdb_t) |  corenet_tcp_sendrecv_couchdb_port(couchdb_t) | ||||||
|   |   | ||||||
| @ -27906,10 +27907,10 @@ index c3f7916..cab3954 100644 | |||||||
|  	admin_pattern($1, fetchmail_etc_t) |  	admin_pattern($1, fetchmail_etc_t) | ||||||
|   |   | ||||||
| diff --git a/fetchmail.te b/fetchmail.te
 | diff --git a/fetchmail.te b/fetchmail.te
 | ||||||
| index 742559a..a6c5c24 100644
 | index 742559a..57711b3 100644
 | ||||||
| --- a/fetchmail.te
 | --- a/fetchmail.te
 | ||||||
| +++ b/fetchmail.te
 | +++ b/fetchmail.te
 | ||||||
| @@ -32,14 +32,17 @@ files_type(fetchmail_uidl_cache_t)
 | @@ -32,14 +32,18 @@ files_type(fetchmail_uidl_cache_t)
 | ||||||
|  # |  # | ||||||
|  # Local policy |  # Local policy | ||||||
|  # |  # | ||||||
| @ -27918,6 +27919,7 @@ index 742559a..a6c5c24 100644 | |||||||
|  dontaudit fetchmail_t self:capability sys_tty_config; |  dontaudit fetchmail_t self:capability sys_tty_config; | ||||||
|  allow fetchmail_t self:process { signal_perms setrlimit }; |  allow fetchmail_t self:process { signal_perms setrlimit }; | ||||||
|  allow fetchmail_t self:unix_stream_socket { accept listen }; |  allow fetchmail_t self:unix_stream_socket { accept listen }; | ||||||
|  | +allow fetchmail_t self:key manage_key_perms;
 | ||||||
|   |   | ||||||
|  allow fetchmail_t fetchmail_etc_t:file read_file_perms; |  allow fetchmail_t fetchmail_etc_t:file read_file_perms; | ||||||
|   |   | ||||||
| @ -27928,7 +27930,7 @@ index 742559a..a6c5c24 100644 | |||||||
|   |   | ||||||
|  manage_dirs_pattern(fetchmail_t, fetchmail_log_t, fetchmail_log_t) |  manage_dirs_pattern(fetchmail_t, fetchmail_log_t, fetchmail_log_t) | ||||||
|  append_files_pattern(fetchmail_t, fetchmail_log_t, fetchmail_log_t) |  append_files_pattern(fetchmail_t, fetchmail_log_t, fetchmail_log_t) | ||||||
| @@ -63,7 +66,6 @@ kernel_dontaudit_read_system_state(fetchmail_t)
 | @@ -63,7 +67,6 @@ kernel_dontaudit_read_system_state(fetchmail_t)
 | ||||||
|  corecmd_exec_bin(fetchmail_t) |  corecmd_exec_bin(fetchmail_t) | ||||||
|  corecmd_exec_shell(fetchmail_t) |  corecmd_exec_shell(fetchmail_t) | ||||||
|   |   | ||||||
| @ -27936,7 +27938,7 @@ index 742559a..a6c5c24 100644 | |||||||
|  corenet_all_recvfrom_netlabel(fetchmail_t) |  corenet_all_recvfrom_netlabel(fetchmail_t) | ||||||
|  corenet_tcp_sendrecv_generic_if(fetchmail_t) |  corenet_tcp_sendrecv_generic_if(fetchmail_t) | ||||||
|  corenet_tcp_sendrecv_generic_node(fetchmail_t) |  corenet_tcp_sendrecv_generic_node(fetchmail_t) | ||||||
| @@ -84,15 +86,23 @@ fs_search_auto_mountpoints(fetchmail_t)
 | @@ -84,15 +87,23 @@ fs_search_auto_mountpoints(fetchmail_t)
 | ||||||
|   |   | ||||||
|  domain_use_interactive_fds(fetchmail_t) |  domain_use_interactive_fds(fetchmail_t) | ||||||
|   |   | ||||||
| @ -47378,7 +47380,7 @@ index 6fcfc31..91adcaf 100644 | |||||||
| +/var/run/mongo.*	                gen_context(system_u:object_r:mongod_var_run_t,s0)
 | +/var/run/mongo.*	                gen_context(system_u:object_r:mongod_var_run_t,s0)
 | ||||||
| +/var/run/aeolus/dbomatic\.pid   --  gen_context(system_u:object_r:mongod_var_run_t,s0)
 | +/var/run/aeolus/dbomatic\.pid   --  gen_context(system_u:object_r:mongod_var_run_t,s0)
 | ||||||
| diff --git a/mongodb.te b/mongodb.te
 | diff --git a/mongodb.te b/mongodb.te
 | ||||||
| index 169f236..dec8a95 100644
 | index 169f236..907b24c 100644
 | ||||||
| --- a/mongodb.te
 | --- a/mongodb.te
 | ||||||
| +++ b/mongodb.te
 | +++ b/mongodb.te
 | ||||||
| @@ -21,19 +21,25 @@ files_type(mongod_var_lib_t)
 | @@ -21,19 +21,25 @@ files_type(mongod_var_lib_t)
 | ||||||
| @ -47395,7 +47397,7 @@ index 169f236..dec8a95 100644 | |||||||
|   |   | ||||||
| -allow mongod_t self:process signal;
 | -allow mongod_t self:process signal;
 | ||||||
| +
 | +
 | ||||||
| +allow mongod_t self:process { setsched signal };
 | +allow mongod_t self:process { setsched signal execmem };
 | ||||||
|  allow mongod_t self:fifo_file rw_fifo_file_perms; |  allow mongod_t self:fifo_file rw_fifo_file_perms; | ||||||
|   |   | ||||||
| -manage_dirs_pattern(mongod_t, mongod_log_t, mongod_log_t)
 | -manage_dirs_pattern(mongod_t, mongod_log_t, mongod_log_t)
 | ||||||
| @ -52207,7 +52209,7 @@ index b744fe3..cb0e2af 100644 | |||||||
| +	admin_pattern($1, munin_content_t)
 | +	admin_pattern($1, munin_content_t)
 | ||||||
|  ') |  ') | ||||||
| diff --git a/munin.te b/munin.te
 | diff --git a/munin.te b/munin.te
 | ||||||
| index b708708..aebb4c1 100644
 | index b708708..dd6e04b 100644
 | ||||||
| --- a/munin.te
 | --- a/munin.te
 | ||||||
| +++ b/munin.te
 | +++ b/munin.te
 | ||||||
| @@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
 | @@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
 | ||||||
| @ -52353,12 +52355,13 @@ index b708708..aebb4c1 100644 | |||||||
|  #################################### |  #################################### | ||||||
|  # |  # | ||||||
|  # Mail local policy |  # Mail local policy | ||||||
| @@ -279,27 +273,38 @@ optional_policy(`
 | @@ -279,27 +273,39 @@ optional_policy(`
 | ||||||
|   |   | ||||||
|  allow mail_munin_plugin_t self:capability dac_override; |  allow mail_munin_plugin_t self:capability dac_override; | ||||||
|   |   | ||||||
| +allow mail_munin_plugin_t self:tcp_socket create_stream_socket_perms;
 | +allow mail_munin_plugin_t self:tcp_socket create_stream_socket_perms;
 | ||||||
| +allow mail_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms;
 | +allow mail_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms;
 | ||||||
|  | +allow mail_munin_plugin_t self:udp_socket create_socket_perms;
 | ||||||
| +
 | +
 | ||||||
|  rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) |  rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) | ||||||
|   |   | ||||||
| @ -52396,7 +52399,7 @@ index b708708..aebb4c1 100644 | |||||||
|  ') |  ') | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @@ -339,7 +344,7 @@ dev_read_rand(services_munin_plugin_t)
 | @@ -339,7 +345,7 @@ dev_read_rand(services_munin_plugin_t)
 | ||||||
|  sysnet_read_config(services_munin_plugin_t) |  sysnet_read_config(services_munin_plugin_t) | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @ -52405,7 +52408,7 @@ index b708708..aebb4c1 100644 | |||||||
|  ') |  ') | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @@ -348,6 +353,10 @@ optional_policy(`
 | @@ -348,6 +354,10 @@ optional_policy(`
 | ||||||
|  ') |  ') | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @ -52416,7 +52419,7 @@ index b708708..aebb4c1 100644 | |||||||
|  	lpd_exec_lpr(services_munin_plugin_t) |  	lpd_exec_lpr(services_munin_plugin_t) | ||||||
|  ') |  ') | ||||||
|   |   | ||||||
| @@ -361,7 +370,11 @@ optional_policy(`
 | @@ -361,7 +371,11 @@ optional_policy(`
 | ||||||
|  ') |  ') | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @ -52429,7 +52432,7 @@ index b708708..aebb4c1 100644 | |||||||
|  ') |  ') | ||||||
|   |   | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
| @@ -393,6 +406,7 @@ read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)
 | @@ -393,6 +407,7 @@ read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t)
 | ||||||
|   |   | ||||||
|  kernel_read_network_state(system_munin_plugin_t) |  kernel_read_network_state(system_munin_plugin_t) | ||||||
|  kernel_read_all_sysctls(system_munin_plugin_t) |  kernel_read_all_sysctls(system_munin_plugin_t) | ||||||
| @ -52437,7 +52440,7 @@ index b708708..aebb4c1 100644 | |||||||
|   |   | ||||||
|  dev_read_sysfs(system_munin_plugin_t) |  dev_read_sysfs(system_munin_plugin_t) | ||||||
|  dev_read_urand(system_munin_plugin_t) |  dev_read_urand(system_munin_plugin_t) | ||||||
| @@ -421,3 +435,33 @@ optional_policy(`
 | @@ -421,3 +436,33 @@ optional_policy(`
 | ||||||
|  optional_policy(` |  optional_policy(` | ||||||
|  	unconfined_domain(unconfined_munin_plugin_t) |  	unconfined_domain(unconfined_munin_plugin_t) | ||||||
|  ') |  ') | ||||||
|  | |||||||
| @ -19,7 +19,7 @@ | |||||||
| Summary: SELinux policy configuration | Summary: SELinux policy configuration | ||||||
| Name: selinux-policy | Name: selinux-policy | ||||||
| Version: 3.13.1 | Version: 3.13.1 | ||||||
| Release: 103%{?dist} | Release: 104%{?dist} | ||||||
| License: GPLv2+ | License: GPLv2+ | ||||||
| Group: System Environment/Base | Group: System Environment/Base | ||||||
| Source: serefpolicy-%{version}.tgz | Source: serefpolicy-%{version}.tgz | ||||||
| @ -605,6 +605,13 @@ SELinux Reference policy mls base module. | |||||||
| %endif | %endif | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Thu Jan 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-104 | ||||||
|  | - remove duplicate filename transition rules. | ||||||
|  | - Call proper interface in sosreport.te. | ||||||
|  | - Allow fetchmail to manage its keyring | ||||||
|  | - Allow mail munin to create udp_sockets | ||||||
|  | - Allow couchdb to sendto kernel unix domain sockets | ||||||
|  | 
 | ||||||
| * Sat Jan 3 2015 Dan Walsh <dwalsh@redhat.com> 3.13.1-103 | * Sat Jan 3 2015 Dan Walsh <dwalsh@redhat.com> 3.13.1-103 | ||||||
| - Add /etc/selinux/targeted/contexts/openssh_contexts | - Add /etc/selinux/targeted/contexts/openssh_contexts | ||||||
| 
 | 
 | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user