* Fri Jun 23 2017 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-261
- Allow boinc_t nsswitch - Dontaudit firewalld to write to lib_t dirs - Allow modemmanager_t domain to write to raw_ip file labeled as sysfs_t - Allow thumb_t domain to allow create dgram sockets - Disable mysqld_safe_t secure mode environment cleansing - Allow couple rules needed to start targetd daemon with SELinux in enforcing mode - Allow dirsrv domain setrlimit - Dontaudit staff_t user read admin_home_t files. - Add interface lvm_manage_metadata - Add permission open to files_read_inherited_tmp_files() interface
This commit is contained in:
parent
c8dc4505f7
commit
959229d1e3
Binary file not shown.
@ -11114,7 +11114,7 @@ index b876c48..2e591a5 100644
|
|||||||
+
|
+
|
||||||
+/sysroot/ostree/deploy/.*-atomic/deploy(/.*)? gen_context(system_u:object_r:root_t,s0)
|
+/sysroot/ostree/deploy/.*-atomic/deploy(/.*)? gen_context(system_u:object_r:root_t,s0)
|
||||||
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
|
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
|
||||||
index f962f76..b64717f 100644
|
index f962f76..4785fe8 100644
|
||||||
--- a/policy/modules/kernel/files.if
|
--- a/policy/modules/kernel/files.if
|
||||||
+++ b/policy/modules/kernel/files.if
|
+++ b/policy/modules/kernel/files.if
|
||||||
@@ -19,6 +19,136 @@
|
@@ -19,6 +19,136 @@
|
||||||
@ -13574,7 +13574,7 @@ index f962f76..b64717f 100644
|
|||||||
+ attribute tmpfile;
|
+ attribute tmpfile;
|
||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ allow $1 tmpfile:file { append read_inherited_file_perms };
|
+ allow $1 tmpfile:file { append open read_inherited_file_perms };
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -23945,7 +23945,7 @@ index 234a940..a92415a 100644
|
|||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
|
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
|
||||||
index 0fef1fc..c3c0f6d 100644
|
index 0fef1fc..25e60c8 100644
|
||||||
--- a/policy/modules/roles/staff.te
|
--- a/policy/modules/roles/staff.te
|
||||||
+++ b/policy/modules/roles/staff.te
|
+++ b/policy/modules/roles/staff.te
|
||||||
@@ -8,12 +8,73 @@ policy_module(staff, 2.4.0)
|
@@ -8,12 +8,73 @@ policy_module(staff, 2.4.0)
|
||||||
@ -24152,7 +24152,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -35,15 +213,31 @@ optional_policy(`
|
@@ -35,20 +213,74 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24186,10 +24186,12 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -52,11 +246,61 @@ optional_policy(`
|
sysadm_role_change(staff_r)
|
||||||
')
|
userdom_dontaudit_use_user_terminals(staff_t)
|
||||||
|
+ userdom_dontaudit_read_admin_home_files(staff_t)
|
||||||
optional_policy(`
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ systemd_read_unit_files(staff_t)
|
+ systemd_read_unit_files(staff_t)
|
||||||
+ systemd_exec_systemctl(staff_t)
|
+ systemd_exec_systemctl(staff_t)
|
||||||
+')
|
+')
|
||||||
@ -24224,10 +24226,10 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
+ virt_getattr_exec(staff_t)
|
+ virt_getattr_exec(staff_t)
|
||||||
+ virt_search_images(staff_t)
|
+ virt_search_images(staff_t)
|
||||||
+ virt_stream_connect(staff_t)
|
+ virt_stream_connect(staff_t)
|
||||||
+')
|
')
|
||||||
+
|
|
||||||
+optional_policy(`
|
optional_policy(`
|
||||||
vlock_run(staff_t, staff_r)
|
@@ -56,7 +288,20 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24249,7 +24251,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifndef(`distro_redhat',`
|
ifndef(`distro_redhat',`
|
||||||
@@ -65,10 +309,6 @@ ifndef(`distro_redhat',`
|
@@ -65,10 +310,6 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24260,7 +24262,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
cdrecord_role(staff_r, staff_t)
|
cdrecord_role(staff_r, staff_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -78,10 +318,6 @@ ifndef(`distro_redhat',`
|
@@ -78,10 +319,6 @@ ifndef(`distro_redhat',`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
dbus_role_template(staff, staff_r, staff_t)
|
dbus_role_template(staff, staff_r, staff_t)
|
||||||
@ -24271,7 +24273,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -101,10 +337,6 @@ ifndef(`distro_redhat',`
|
@@ -101,10 +338,6 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24282,7 +24284,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
java_role(staff_r, staff_t)
|
java_role(staff_r, staff_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -125,10 +357,6 @@ ifndef(`distro_redhat',`
|
@@ -125,10 +358,6 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24293,7 +24295,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
pyzor_role(staff_r, staff_t)
|
pyzor_role(staff_r, staff_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -141,10 +369,6 @@ ifndef(`distro_redhat',`
|
@@ -141,10 +370,6 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -24304,7 +24306,7 @@ index 0fef1fc..c3c0f6d 100644
|
|||||||
spamassassin_role(staff_r, staff_t)
|
spamassassin_role(staff_r, staff_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -176,3 +400,24 @@ ifndef(`distro_redhat',`
|
@@ -176,3 +401,24 @@ ifndef(`distro_redhat',`
|
||||||
wireshark_role(staff_r, staff_t)
|
wireshark_role(staff_r, staff_t)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@ -40906,7 +40908,7 @@ index 6b91740..7724116 100644
|
|||||||
+
|
+
|
||||||
+/var/run/storaged(/.*)? gen_context(system_u:object_r:lvm_var_run_t,s0)
|
+/var/run/storaged(/.*)? gen_context(system_u:object_r:lvm_var_run_t,s0)
|
||||||
diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if
|
diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if
|
||||||
index 58bc27f..9e86fce 100644
|
index 58bc27f..842ce28 100644
|
||||||
--- a/policy/modules/system/lvm.if
|
--- a/policy/modules/system/lvm.if
|
||||||
+++ b/policy/modules/system/lvm.if
|
+++ b/policy/modules/system/lvm.if
|
||||||
@@ -1,5 +1,41 @@
|
@@ -1,5 +1,41 @@
|
||||||
@ -40951,7 +40953,7 @@ index 58bc27f..9e86fce 100644
|
|||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute lvm programs in the lvm domain.
|
## Execute lvm programs in the lvm domain.
|
||||||
@@ -86,6 +122,50 @@ interface(`lvm_read_config',`
|
@@ -86,6 +122,71 @@ interface(`lvm_read_config',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -40998,11 +41000,32 @@ index 58bc27f..9e86fce 100644
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
|
+## <summary>
|
||||||
|
+## Manage LVM metadata files.
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+## <rolecap/>
|
||||||
|
+#
|
||||||
|
+interface(`lvm_manage_metadata',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type lvm_metadata_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ allow $1 lvm_metadata_t:dir list_dir_perms;
|
||||||
|
+ manage_dirs_pattern($1, lvm_metadata_t, lvm_metadata_t)
|
||||||
|
+ manage_files_pattern($1, lvm_metadata_t, lvm_metadata_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
+## <summary>
|
+## <summary>
|
||||||
## Manage LVM configuration files.
|
## Manage LVM configuration files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -105,6 +185,25 @@ interface(`lvm_manage_config',`
|
@@ -105,6 +206,25 @@ interface(`lvm_manage_config',`
|
||||||
manage_files_pattern($1, lvm_etc_t, lvm_etc_t)
|
manage_files_pattern($1, lvm_etc_t, lvm_etc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -41028,7 +41051,7 @@ index 58bc27f..9e86fce 100644
|
|||||||
######################################
|
######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a domain transition to run clvmd.
|
## Execute a domain transition to run clvmd.
|
||||||
@@ -123,3 +222,175 @@ interface(`lvm_domtrans_clvmd',`
|
@@ -123,3 +243,175 @@ interface(`lvm_domtrans_clvmd',`
|
||||||
corecmd_search_bin($1)
|
corecmd_search_bin($1)
|
||||||
domtrans_pattern($1, clvmd_exec_t, clvmd_t)
|
domtrans_pattern($1, clvmd_exec_t, clvmd_t)
|
||||||
')
|
')
|
||||||
|
@ -10917,7 +10917,7 @@ index 02fefaa..308616e 100644
|
|||||||
+ ')
|
+ ')
|
||||||
')
|
')
|
||||||
diff --git a/boinc.te b/boinc.te
|
diff --git a/boinc.te b/boinc.te
|
||||||
index 687d4c4..bce6267 100644
|
index 687d4c4..ff57137 100644
|
||||||
--- a/boinc.te
|
--- a/boinc.te
|
||||||
+++ b/boinc.te
|
+++ b/boinc.te
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,4 +1,4 @@
|
||||||
@ -11112,7 +11112,7 @@ index 687d4c4..bce6267 100644
|
|||||||
-files_read_usr_files(boinc_t)
|
-files_read_usr_files(boinc_t)
|
||||||
|
|
||||||
-fs_getattr_all_fs(boinc_t)
|
-fs_getattr_all_fs(boinc_t)
|
||||||
+auth_read_passwd(boinc_t)
|
+auth_use_nsswitch(boinc_t)
|
||||||
|
|
||||||
term_getattr_all_ptys(boinc_t)
|
term_getattr_all_ptys(boinc_t)
|
||||||
term_getattr_unallocated_ttys(boinc_t)
|
term_getattr_unallocated_ttys(boinc_t)
|
||||||
@ -25555,7 +25555,7 @@ index 0000000..b3784d8
|
|||||||
+')
|
+')
|
||||||
diff --git a/dirsrv.te b/dirsrv.te
|
diff --git a/dirsrv.te b/dirsrv.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..fa74f85
|
index 0000000..6cca2dd
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/dirsrv.te
|
+++ b/dirsrv.te
|
||||||
@@ -0,0 +1,204 @@
|
@@ -0,0 +1,204 @@
|
||||||
@ -25611,7 +25611,7 @@ index 0000000..fa74f85
|
|||||||
+#
|
+#
|
||||||
+# dirsrv local policy
|
+# dirsrv local policy
|
||||||
+#
|
+#
|
||||||
+allow dirsrv_t self:process { getsched setsched setfscreate signal_perms};
|
+allow dirsrv_t self:process { getsched setsched setfscreate setrlimit signal_perms};
|
||||||
+allow dirsrv_t self:capability { sys_nice setuid setgid fsetid chown dac_override fowner };
|
+allow dirsrv_t self:capability { sys_nice setuid setgid fsetid chown dac_override fowner };
|
||||||
+allow dirsrv_t self:fifo_file manage_fifo_file_perms;
|
+allow dirsrv_t self:fifo_file manage_fifo_file_perms;
|
||||||
+allow dirsrv_t self:sem create_sem_perms;
|
+allow dirsrv_t self:sem create_sem_perms;
|
||||||
@ -29362,7 +29362,7 @@ index c62c567..a74f123 100644
|
|||||||
+ allow $1 firewalld_unit_file_t:service all_service_perms;
|
+ allow $1 firewalld_unit_file_t:service all_service_perms;
|
||||||
')
|
')
|
||||||
diff --git a/firewalld.te b/firewalld.te
|
diff --git a/firewalld.te b/firewalld.te
|
||||||
index 98072a3..0235724 100644
|
index 98072a3..e6904e2 100644
|
||||||
--- a/firewalld.te
|
--- a/firewalld.te
|
||||||
+++ b/firewalld.te
|
+++ b/firewalld.te
|
||||||
@@ -21,9 +21,15 @@ logging_log_file(firewalld_var_log_t)
|
@@ -21,9 +21,15 @@ logging_log_file(firewalld_var_log_t)
|
||||||
@ -29413,7 +29413,7 @@ index 98072a3..0235724 100644
|
|||||||
corecmd_exec_bin(firewalld_t)
|
corecmd_exec_bin(firewalld_t)
|
||||||
corecmd_exec_shell(firewalld_t)
|
corecmd_exec_shell(firewalld_t)
|
||||||
|
|
||||||
@@ -63,20 +79,26 @@ dev_search_sysfs(firewalld_t)
|
@@ -63,20 +79,27 @@ dev_search_sysfs(firewalld_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(firewalld_t)
|
domain_use_interactive_fds(firewalld_t)
|
||||||
|
|
||||||
@ -29430,6 +29430,7 @@ index 98072a3..0235724 100644
|
|||||||
|
|
||||||
-miscfiles_read_localization(firewalld_t)
|
-miscfiles_read_localization(firewalld_t)
|
||||||
+libs_exec_ldconfig(firewalld_t)
|
+libs_exec_ldconfig(firewalld_t)
|
||||||
|
+libs_dontaudit_write_lib_dirs(firewalld_t)
|
||||||
|
|
||||||
-seutil_exec_setfiles(firewalld_t)
|
-seutil_exec_setfiles(firewalld_t)
|
||||||
-seutil_read_file_contexts(firewalld_t)
|
-seutil_read_file_contexts(firewalld_t)
|
||||||
@ -29447,7 +29448,7 @@ index 98072a3..0235724 100644
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
dbus_system_domain(firewalld_t, firewalld_exec_t)
|
dbus_system_domain(firewalld_t, firewalld_exec_t)
|
||||||
@@ -91,10 +113,15 @@ optional_policy(`
|
@@ -91,10 +114,15 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
networkmanager_dbus_chat(firewalld_t)
|
networkmanager_dbus_chat(firewalld_t)
|
||||||
@ -51463,7 +51464,7 @@ index b1ac8b5..24782b3 100644
|
|||||||
+ ')
|
+ ')
|
||||||
+')
|
+')
|
||||||
diff --git a/modemmanager.te b/modemmanager.te
|
diff --git a/modemmanager.te b/modemmanager.te
|
||||||
index d15eb5b..2055876 100644
|
index d15eb5b..ad481ce 100644
|
||||||
--- a/modemmanager.te
|
--- a/modemmanager.te
|
||||||
+++ b/modemmanager.te
|
+++ b/modemmanager.te
|
||||||
@@ -11,6 +11,9 @@ init_daemon_domain(modemmanager_t, modemmanager_exec_t)
|
@@ -11,6 +11,9 @@ init_daemon_domain(modemmanager_t, modemmanager_exec_t)
|
||||||
@ -51486,16 +51487,17 @@ index d15eb5b..2055876 100644
|
|||||||
|
|
||||||
kernel_read_system_state(modemmanager_t)
|
kernel_read_system_state(modemmanager_t)
|
||||||
|
|
||||||
|
-dev_read_sysfs(modemmanager_t)
|
||||||
|
-dev_rw_modem(modemmanager_t)
|
||||||
+auth_read_passwd(modemmanager_t)
|
+auth_read_passwd(modemmanager_t)
|
||||||
+
|
|
||||||
+corecmd_exec_bin(modemmanager_t)
|
|
||||||
+
|
|
||||||
dev_read_sysfs(modemmanager_t)
|
|
||||||
+dev_read_urand(modemmanager_t)
|
|
||||||
dev_rw_modem(modemmanager_t)
|
|
||||||
|
|
||||||
-files_read_etc_files(modemmanager_t)
|
-files_read_etc_files(modemmanager_t)
|
||||||
-
|
+corecmd_exec_bin(modemmanager_t)
|
||||||
|
+
|
||||||
|
+dev_rw_sysfs(modemmanager_t)
|
||||||
|
+dev_read_urand(modemmanager_t)
|
||||||
|
+dev_rw_modem(modemmanager_t)
|
||||||
|
|
||||||
term_use_generic_ptys(modemmanager_t)
|
term_use_generic_ptys(modemmanager_t)
|
||||||
term_use_unallocated_ttys(modemmanager_t)
|
term_use_unallocated_ttys(modemmanager_t)
|
||||||
+term_use_usb_ttys(modemmanager_t)
|
+term_use_usb_ttys(modemmanager_t)
|
||||||
@ -57508,7 +57510,7 @@ index 687af38..5381f1b 100644
|
|||||||
+ mysql_stream_connect($1)
|
+ mysql_stream_connect($1)
|
||||||
')
|
')
|
||||||
diff --git a/mysql.te b/mysql.te
|
diff --git a/mysql.te b/mysql.te
|
||||||
index 7584bbe..1443a3a 100644
|
index 7584bbe..318ee4d 100644
|
||||||
--- a/mysql.te
|
--- a/mysql.te
|
||||||
+++ b/mysql.te
|
+++ b/mysql.te
|
||||||
@@ -6,20 +6,22 @@ policy_module(mysql, 1.14.1)
|
@@ -6,20 +6,22 @@ policy_module(mysql, 1.14.1)
|
||||||
@ -57707,7 +57709,7 @@ index 7584bbe..1443a3a 100644
|
|||||||
allow mysqld_safe_t self:fifo_file rw_fifo_file_perms;
|
allow mysqld_safe_t self:fifo_file rw_fifo_file_perms;
|
||||||
|
|
||||||
-allow mysqld_safe_t mysqld_t:process signull;
|
-allow mysqld_safe_t mysqld_t:process signull;
|
||||||
+allow mysqld_safe_t mysqld_t:process { rlimitinh };
|
+allow mysqld_safe_t mysqld_t:process { rlimitinh noatsecure };
|
||||||
|
|
||||||
read_lnk_files_pattern(mysqld_safe_t, mysqld_db_t, mysqld_db_t)
|
read_lnk_files_pattern(mysqld_safe_t, mysqld_db_t, mysqld_db_t)
|
||||||
-manage_files_pattern(mysqld_safe_t, mysqld_db_t, mysqld_db_t)
|
-manage_files_pattern(mysqld_safe_t, mysqld_db_t, mysqld_db_t)
|
||||||
@ -107947,10 +107949,10 @@ index 0000000..a6e216c
|
|||||||
+
|
+
|
||||||
diff --git a/targetd.te b/targetd.te
|
diff --git a/targetd.te b/targetd.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..0315421
|
index 0000000..4cc8557
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/targetd.te
|
+++ b/targetd.te
|
||||||
@@ -0,0 +1,81 @@
|
@@ -0,0 +1,91 @@
|
||||||
+policy_module(targetd, 1.0.0)
|
+policy_module(targetd, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -107995,6 +107997,7 @@ index 0000000..0315421
|
|||||||
+kernel_get_sysvipc_info(targetd_t)
|
+kernel_get_sysvipc_info(targetd_t)
|
||||||
+kernel_read_system_state(targetd_t)
|
+kernel_read_system_state(targetd_t)
|
||||||
+kernel_read_network_state(targetd_t)
|
+kernel_read_network_state(targetd_t)
|
||||||
|
+kernel_load_module(targetd_t)
|
||||||
+
|
+
|
||||||
+rpc_read_exports(targetd_t)
|
+rpc_read_exports(targetd_t)
|
||||||
+
|
+
|
||||||
@ -108023,12 +108026,21 @@ index 0000000..0315421
|
|||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ lvm_read_config(targetd_t)
|
+ lvm_read_config(targetd_t)
|
||||||
+ lvm_write_metadata(targetd_t)
|
+ lvm_write_metadata(targetd_t)
|
||||||
|
+ lvm_manage_metadata(targetd_t)
|
||||||
+ lvm_manage_lock(targetd_t)
|
+ lvm_manage_lock(targetd_t)
|
||||||
+ lvm_rw_pipes(targetd_t)
|
+ lvm_rw_pipes(targetd_t)
|
||||||
+ lvm_stream_connect(targetd_t)
|
+ lvm_stream_connect(targetd_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
|
+ modutils_read_module_config(targetd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ rpc_manage_nfs_state_data(targetd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ udev_read_pid_files(targetd_t)
|
+ udev_read_pid_files(targetd_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
@ -110135,10 +110147,10 @@ index 0000000..9524b50
|
|||||||
+')
|
+')
|
||||||
diff --git a/thumb.te b/thumb.te
|
diff --git a/thumb.te b/thumb.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..ab916b7
|
index 0000000..d366c8b
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/thumb.te
|
+++ b/thumb.te
|
||||||
@@ -0,0 +1,167 @@
|
@@ -0,0 +1,168 @@
|
||||||
+policy_module(thumb, 1.0.0)
|
+policy_module(thumb, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -110177,6 +110189,7 @@ index 0000000..ab916b7
|
|||||||
+
|
+
|
||||||
+allow thumb_t self:fifo_file manage_fifo_file_perms;
|
+allow thumb_t self:fifo_file manage_fifo_file_perms;
|
||||||
+allow thumb_t self:unix_stream_socket create_stream_socket_perms;
|
+allow thumb_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
+allow thumb_t self:unix_dgram_socket create_socket_perms;
|
||||||
+allow thumb_t self:netlink_route_socket r_netlink_socket_perms;
|
+allow thumb_t self:netlink_route_socket r_netlink_socket_perms;
|
||||||
+allow thumb_t self:netlink_kobject_uevent_socket create_socket_perms;
|
+allow thumb_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||||
+allow thumb_t self:udp_socket create_socket_perms;
|
+allow thumb_t self:udp_socket create_socket_perms;
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 260%{?dist}
|
Release: 261%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -690,6 +690,18 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Jun 23 2017 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-261
|
||||||
|
- Allow boinc_t nsswitch
|
||||||
|
- Dontaudit firewalld to write to lib_t dirs
|
||||||
|
- Allow modemmanager_t domain to write to raw_ip file labeled as sysfs_t
|
||||||
|
- Allow thumb_t domain to allow create dgram sockets
|
||||||
|
- Disable mysqld_safe_t secure mode environment cleansing
|
||||||
|
- Allow couple rules needed to start targetd daemon with SELinux in enforcing mode
|
||||||
|
- Allow dirsrv domain setrlimit
|
||||||
|
- Dontaudit staff_t user read admin_home_t files.
|
||||||
|
- Add interface lvm_manage_metadata
|
||||||
|
- Add permission open to files_read_inherited_tmp_files() interface
|
||||||
|
|
||||||
* Mon Jun 19 2017 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-260
|
* Mon Jun 19 2017 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-260
|
||||||
- Allow sssd_t to read realmd lib files.
|
- Allow sssd_t to read realmd lib files.
|
||||||
- Fix init interface file. init_var_run_t is type not attribute
|
- Fix init interface file. init_var_run_t is type not attribute
|
||||||
|
Loading…
Reference in New Issue
Block a user