- Fix up corecommands.fc to match upstream
- Make sure /lib/systemd/* is labeled init_exec_t - mount wants to setattr on all mountpoints - dovecot auth wants to read dovecot etc files - nscd daemon looks at the exe file of the comunicating daemon - openvpn wants to read utmp file - postfix apps now set sys_nice and lower limits - remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly - Also resolves nsswitch - Fix labels on /etc/hosts.* - Cleanup to make upsteam patch work - allow abrt to read etc_runtime_t
This commit is contained in:
parent
fc9bf2f03d
commit
ded1efb9d8
137
policy-F15.patch
137
policy-F15.patch
@ -8173,7 +8173,7 @@ index 099f57f..5843cad 100644
|
|||||||
+# broken kernel
|
+# broken kernel
|
||||||
+dontaudit can_change_object_identity can_change_object_identity:key link;
|
+dontaudit can_change_object_identity can_change_object_identity:key link;
|
||||||
diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
|
diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
|
||||||
index 3517db2..bd4c23d 100644
|
index 3517db2..4dd4bef 100644
|
||||||
--- a/policy/modules/kernel/files.fc
|
--- a/policy/modules/kernel/files.fc
|
||||||
+++ b/policy/modules/kernel/files.fc
|
+++ b/policy/modules/kernel/files.fc
|
||||||
@@ -18,6 +18,7 @@ ifdef(`distro_redhat',`
|
@@ -18,6 +18,7 @@ ifdef(`distro_redhat',`
|
||||||
@ -8269,12 +8269,14 @@ index 3517db2..bd4c23d 100644
|
|||||||
/var/tmp/.* <<none>>
|
/var/tmp/.* <<none>>
|
||||||
/var/tmp/lost\+found -d gen_context(system_u:object_r:lost_found_t,mls_systemhigh)
|
/var/tmp/lost\+found -d gen_context(system_u:object_r:lost_found_t,mls_systemhigh)
|
||||||
/var/tmp/lost\+found/.* <<none>>
|
/var/tmp/lost\+found/.* <<none>>
|
||||||
@@ -258,3 +268,5 @@ ifndef(`distro_redhat',`
|
@@ -258,3 +268,7 @@ ifndef(`distro_redhat',`
|
||||||
ifdef(`distro_debian',`
|
ifdef(`distro_debian',`
|
||||||
/var/run/motd -- gen_context(system_u:object_r:etc_runtime_t,s0)
|
/var/run/motd -- gen_context(system_u:object_r:etc_runtime_t,s0)
|
||||||
')
|
')
|
||||||
+/nsr(/.*)? gen_context(system_u:object_r:var_t,s0)
|
+/nsr(/.*)? gen_context(system_u:object_r:var_t,s0)
|
||||||
+/nsr/logs(/.*)? gen_context(system_u:object_r:var_log_t,s0)
|
+/nsr/logs(/.*)? gen_context(system_u:object_r:var_log_t,s0)
|
||||||
|
+
|
||||||
|
+/usr/lib/debug <<none>>
|
||||||
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
|
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
|
||||||
index 5302dac..9b828ee 100644
|
index 5302dac..9b828ee 100644
|
||||||
--- a/policy/modules/kernel/files.if
|
--- a/policy/modules/kernel/files.if
|
||||||
@ -9313,7 +9315,7 @@ index 59bae6a..2e55e71 100644
|
|||||||
+/dev/hugepages -d gen_context(system_u:object_r:hugetlbfs_t,s0)
|
+/dev/hugepages -d gen_context(system_u:object_r:hugetlbfs_t,s0)
|
||||||
+/dev/hugepages(/.*)? <<none>>
|
+/dev/hugepages(/.*)? <<none>>
|
||||||
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
|
diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if
|
||||||
index 437a42a..54a884b 100644
|
index 437a42a..b9e3aa9 100644
|
||||||
--- a/policy/modules/kernel/filesystem.if
|
--- a/policy/modules/kernel/filesystem.if
|
||||||
+++ b/policy/modules/kernel/filesystem.if
|
+++ b/policy/modules/kernel/filesystem.if
|
||||||
@@ -646,11 +646,31 @@ interface(`fs_search_cgroup_dirs',`
|
@@ -646,11 +646,31 @@ interface(`fs_search_cgroup_dirs',`
|
||||||
@ -9542,7 +9544,23 @@ index 437a42a..54a884b 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -2395,6 +2514,25 @@ interface(`fs_exec_nfs_files',`
|
@@ -2331,6 +2450,7 @@ interface(`fs_read_nfs_files',`
|
||||||
|
type nfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
+ fs_search_auto_mountpoints($1)
|
||||||
|
allow $1 nfs_t:dir list_dir_perms;
|
||||||
|
read_files_pattern($1, nfs_t, nfs_t)
|
||||||
|
')
|
||||||
|
@@ -2369,6 +2489,7 @@ interface(`fs_write_nfs_files',`
|
||||||
|
type nfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
+ fs_search_auto_mountpoints($1)
|
||||||
|
allow $1 nfs_t:dir list_dir_perms;
|
||||||
|
write_files_pattern($1, nfs_t, nfs_t)
|
||||||
|
')
|
||||||
|
@@ -2395,6 +2516,25 @@ interface(`fs_exec_nfs_files',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -9568,7 +9586,7 @@ index 437a42a..54a884b 100644
|
|||||||
## Append files
|
## Append files
|
||||||
## on a NFS filesystem.
|
## on a NFS filesystem.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -2435,6 +2573,24 @@ interface(`fs_dontaudit_append_nfs_files',`
|
@@ -2435,6 +2575,24 @@ interface(`fs_dontaudit_append_nfs_files',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -9593,7 +9611,7 @@ index 437a42a..54a884b 100644
|
|||||||
## Do not audit attempts to read or
|
## Do not audit attempts to read or
|
||||||
## write files on a NFS filesystem.
|
## write files on a NFS filesystem.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -2449,7 +2605,7 @@ interface(`fs_dontaudit_rw_nfs_files',`
|
@@ -2449,7 +2607,7 @@ interface(`fs_dontaudit_rw_nfs_files',`
|
||||||
type nfs_t;
|
type nfs_t;
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -9602,7 +9620,7 @@ index 437a42a..54a884b 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -2637,6 +2793,24 @@ interface(`fs_dontaudit_read_removable_files',`
|
@@ -2637,6 +2795,24 @@ interface(`fs_dontaudit_read_removable_files',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -9627,7 +9645,23 @@ index 437a42a..54a884b 100644
|
|||||||
## Read removable storage symbolic links.
|
## Read removable storage symbolic links.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -2845,7 +3019,7 @@ interface(`fs_dontaudit_manage_nfs_files',`
|
@@ -2779,6 +2955,7 @@ interface(`fs_manage_nfs_dirs',`
|
||||||
|
type nfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
+ fs_search_auto_mountpoints($1)
|
||||||
|
allow $1 nfs_t:dir manage_dir_perms;
|
||||||
|
')
|
||||||
|
|
||||||
|
@@ -2819,6 +2996,7 @@ interface(`fs_manage_nfs_files',`
|
||||||
|
type nfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
+ fs_search_auto_mountpoints($1)
|
||||||
|
manage_files_pattern($1, nfs_t, nfs_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
@@ -2845,7 +3023,7 @@ interface(`fs_dontaudit_manage_nfs_files',`
|
||||||
#########################################
|
#########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Create, read, write, and delete symbolic links
|
## Create, read, write, and delete symbolic links
|
||||||
@ -9636,7 +9670,15 @@ index 437a42a..54a884b 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -3970,6 +4144,42 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
|
@@ -2859,6 +3037,7 @@ interface(`fs_manage_nfs_symlinks',`
|
||||||
|
type nfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
+ fs_search_auto_mountpoints($1)
|
||||||
|
manage_lnk_files_pattern($1, nfs_t, nfs_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
@@ -3970,6 +4149,42 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -9679,7 +9721,7 @@ index 437a42a..54a884b 100644
|
|||||||
## Relabel character nodes on tmpfs filesystems.
|
## Relabel character nodes on tmpfs filesystems.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -4252,6 +4462,8 @@ interface(`fs_mount_all_fs',`
|
@@ -4252,6 +4467,8 @@ interface(`fs_mount_all_fs',`
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 filesystem_type:filesystem mount;
|
allow $1 filesystem_type:filesystem mount;
|
||||||
@ -9688,7 +9730,7 @@ index 437a42a..54a884b 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -4662,3 +4874,24 @@ interface(`fs_unconfined',`
|
@@ -4662,3 +4879,24 @@ interface(`fs_unconfined',`
|
||||||
|
|
||||||
typeattribute $1 filesystem_unconfined_type;
|
typeattribute $1 filesystem_unconfined_type;
|
||||||
')
|
')
|
||||||
@ -14885,6 +14927,19 @@ index 4deca04..0bde225 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
diff --git a/policy/modules/services/bitlbee.te b/policy/modules/services/bitlbee.te
|
||||||
|
index 5f239ca..29de096 100644
|
||||||
|
--- a/policy/modules/services/bitlbee.te
|
||||||
|
+++ b/policy/modules/services/bitlbee.te
|
||||||
|
@@ -28,7 +28,7 @@ files_type(bitlbee_var_t)
|
||||||
|
#
|
||||||
|
|
||||||
|
allow bitlbee_t self:capability { setgid setuid };
|
||||||
|
-allow bitlbee_t self:process signal;
|
||||||
|
+allow bitlbee_t self:process { setsched signal };
|
||||||
|
allow bitlbee_t self:udp_socket create_socket_perms;
|
||||||
|
allow bitlbee_t self:tcp_socket { create_stream_socket_perms connected_stream_socket_perms };
|
||||||
|
allow bitlbee_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
|
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
|
||||||
index 3e45431..fa57a6f 100644
|
index 3e45431..fa57a6f 100644
|
||||||
--- a/policy/modules/services/bluetooth.if
|
--- a/policy/modules/services/bluetooth.if
|
||||||
@ -15908,7 +15963,7 @@ index 7a6e5ba..d664be8 100644
|
|||||||
admin_pattern($1, certmonger_var_run_t)
|
admin_pattern($1, certmonger_var_run_t)
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/services/certmonger.te b/policy/modules/services/certmonger.te
|
diff --git a/policy/modules/services/certmonger.te b/policy/modules/services/certmonger.te
|
||||||
index 1a65b5e..e281c74 100644
|
index 1a65b5e..1bc0bc7 100644
|
||||||
--- a/policy/modules/services/certmonger.te
|
--- a/policy/modules/services/certmonger.te
|
||||||
+++ b/policy/modules/services/certmonger.te
|
+++ b/policy/modules/services/certmonger.te
|
||||||
@@ -24,6 +24,7 @@ files_type(certmonger_var_lib_t)
|
@@ -24,6 +24,7 @@ files_type(certmonger_var_lib_t)
|
||||||
@ -15919,7 +15974,7 @@ index 1a65b5e..e281c74 100644
|
|||||||
allow certmonger_t self:process { getsched setsched sigkill };
|
allow certmonger_t self:process { getsched setsched sigkill };
|
||||||
allow certmonger_t self:fifo_file rw_file_perms;
|
allow certmonger_t self:fifo_file rw_file_perms;
|
||||||
allow certmonger_t self:unix_stream_socket create_stream_socket_perms;
|
allow certmonger_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
@@ -32,7 +33,7 @@ allow certmonger_t self:netlink_route_socket r_netlink_socket_perms;
|
@@ -32,16 +33,19 @@ allow certmonger_t self:netlink_route_socket r_netlink_socket_perms;
|
||||||
|
|
||||||
manage_dirs_pattern(certmonger_t, certmonger_var_lib_t, certmonger_var_lib_t)
|
manage_dirs_pattern(certmonger_t, certmonger_var_lib_t, certmonger_var_lib_t)
|
||||||
manage_files_pattern(certmonger_t, certmonger_var_lib_t, certmonger_var_lib_t)
|
manage_files_pattern(certmonger_t, certmonger_var_lib_t, certmonger_var_lib_t)
|
||||||
@ -15928,7 +15983,19 @@ index 1a65b5e..e281c74 100644
|
|||||||
|
|
||||||
manage_dirs_pattern(certmonger_t, certmonger_var_run_t, certmonger_var_run_t)
|
manage_dirs_pattern(certmonger_t, certmonger_var_run_t, certmonger_var_run_t)
|
||||||
manage_files_pattern(certmonger_t, certmonger_var_run_t, certmonger_var_run_t)
|
manage_files_pattern(certmonger_t, certmonger_var_run_t, certmonger_var_run_t)
|
||||||
@@ -51,6 +52,8 @@ files_read_etc_files(certmonger_t)
|
files_pid_filetrans(certmonger_t, certmonger_var_run_t, { file dir })
|
||||||
|
|
||||||
|
+corecmd_exec_bin(certmonger_t)
|
||||||
|
+
|
||||||
|
corenet_tcp_sendrecv_generic_if(certmonger_t)
|
||||||
|
corenet_tcp_sendrecv_generic_node(certmonger_t)
|
||||||
|
corenet_tcp_sendrecv_all_ports(certmonger_t)
|
||||||
|
corenet_tcp_connect_certmaster_port(certmonger_t)
|
||||||
|
+corenet_tcp_connect_http_port(certmonger_t)
|
||||||
|
|
||||||
|
dev_read_urand(certmonger_t)
|
||||||
|
|
||||||
|
@@ -51,6 +55,8 @@ files_read_etc_files(certmonger_t)
|
||||||
files_read_usr_files(certmonger_t)
|
files_read_usr_files(certmonger_t)
|
||||||
files_list_tmp(certmonger_t)
|
files_list_tmp(certmonger_t)
|
||||||
|
|
||||||
@ -15937,7 +16004,7 @@ index 1a65b5e..e281c74 100644
|
|||||||
logging_send_syslog_msg(certmonger_t)
|
logging_send_syslog_msg(certmonger_t)
|
||||||
|
|
||||||
miscfiles_read_localization(certmonger_t)
|
miscfiles_read_localization(certmonger_t)
|
||||||
@@ -58,6 +61,16 @@ miscfiles_manage_generic_cert_files(certmonger_t)
|
@@ -58,6 +64,16 @@ miscfiles_manage_generic_cert_files(certmonger_t)
|
||||||
|
|
||||||
sysnet_dns_name_resolve(certmonger_t)
|
sysnet_dns_name_resolve(certmonger_t)
|
||||||
|
|
||||||
@ -15954,7 +16021,7 @@ index 1a65b5e..e281c74 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
dbus_system_bus_client(certmonger_t)
|
dbus_system_bus_client(certmonger_t)
|
||||||
dbus_connect_system_bus(certmonger_t)
|
dbus_connect_system_bus(certmonger_t)
|
||||||
@@ -68,5 +81,7 @@ optional_policy(`
|
@@ -68,5 +84,7 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -29139,7 +29206,7 @@ index 2855a44..0456b11 100644
|
|||||||
type puppet_tmp_t;
|
type puppet_tmp_t;
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
|
diff --git a/policy/modules/services/puppet.te b/policy/modules/services/puppet.te
|
||||||
index 64c5f95..80c1f5d 100644
|
index 64c5f95..76da005 100644
|
||||||
--- a/policy/modules/services/puppet.te
|
--- a/policy/modules/services/puppet.te
|
||||||
+++ b/policy/modules/services/puppet.te
|
+++ b/policy/modules/services/puppet.te
|
||||||
@@ -6,10 +6,10 @@ policy_module(puppet, 1.0.0)
|
@@ -6,10 +6,10 @@ policy_module(puppet, 1.0.0)
|
||||||
@ -29198,7 +29265,7 @@ index 64c5f95..80c1f5d 100644
|
|||||||
|
|
||||||
corecmd_exec_bin(puppetmaster_t)
|
corecmd_exec_bin(puppetmaster_t)
|
||||||
corecmd_exec_shell(puppetmaster_t)
|
corecmd_exec_shell(puppetmaster_t)
|
||||||
@@ -214,13 +219,19 @@ domain_read_all_domains_state(puppetmaster_t)
|
@@ -214,13 +219,20 @@ domain_read_all_domains_state(puppetmaster_t)
|
||||||
files_read_etc_files(puppetmaster_t)
|
files_read_etc_files(puppetmaster_t)
|
||||||
files_search_var_lib(puppetmaster_t)
|
files_search_var_lib(puppetmaster_t)
|
||||||
|
|
||||||
@ -29207,9 +29274,10 @@ index 64c5f95..80c1f5d 100644
|
|||||||
logging_send_syslog_msg(puppetmaster_t)
|
logging_send_syslog_msg(puppetmaster_t)
|
||||||
|
|
||||||
miscfiles_read_localization(puppetmaster_t)
|
miscfiles_read_localization(puppetmaster_t)
|
||||||
|
+miscfiles_read_certs(puppetmaster_t)
|
||||||
+seutil_read_file_contexts(puppetmaster_t)
|
|
||||||
+
|
+
|
||||||
|
+seutil_read_file_contexts(puppetmaster_t)
|
||||||
|
|
||||||
sysnet_dns_name_resolve(puppetmaster_t)
|
sysnet_dns_name_resolve(puppetmaster_t)
|
||||||
sysnet_run_ifconfig(puppetmaster_t, system_r)
|
sysnet_run_ifconfig(puppetmaster_t, system_r)
|
||||||
|
|
||||||
@ -29218,6 +29286,15 @@ index 64c5f95..80c1f5d 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
hostname_exec(puppetmaster_t)
|
hostname_exec(puppetmaster_t)
|
||||||
')
|
')
|
||||||
|
@@ -231,3 +243,8 @@ optional_policy(`
|
||||||
|
rpm_exec(puppetmaster_t)
|
||||||
|
rpm_read_db(puppetmaster_t)
|
||||||
|
')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ usermanage_domtrans_groupadd(puppetmaster_t)
|
||||||
|
+ usermanage_domtrans_useradd(puppetmaster_t)
|
||||||
|
+')
|
||||||
diff --git a/policy/modules/services/pyzor.fc b/policy/modules/services/pyzor.fc
|
diff --git a/policy/modules/services/pyzor.fc b/policy/modules/services/pyzor.fc
|
||||||
index d4a7750..705196e 100644
|
index d4a7750..705196e 100644
|
||||||
--- a/policy/modules/services/pyzor.fc
|
--- a/policy/modules/services/pyzor.fc
|
||||||
@ -29866,10 +29943,10 @@ index 0000000..c403abc
|
|||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/services/qpidd.te b/policy/modules/services/qpidd.te
|
diff --git a/policy/modules/services/qpidd.te b/policy/modules/services/qpidd.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..43639a0
|
index 0000000..d9c56d4
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/services/qpidd.te
|
+++ b/policy/modules/services/qpidd.te
|
||||||
@@ -0,0 +1,59 @@
|
@@ -0,0 +1,64 @@
|
||||||
+policy_module(qpidd, 1.0.0)
|
+policy_module(qpidd, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -29929,6 +30006,11 @@ index 0000000..43639a0
|
|||||||
+miscfiles_read_localization(qpidd_t)
|
+miscfiles_read_localization(qpidd_t)
|
||||||
+
|
+
|
||||||
+sysnet_dns_name_resolve(qpidd_t)
|
+sysnet_dns_name_resolve(qpidd_t)
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ corosync_stream_connect(qpidd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
diff --git a/policy/modules/services/radius.if b/policy/modules/services/radius.if
|
diff --git a/policy/modules/services/radius.if b/policy/modules/services/radius.if
|
||||||
index 9a78598..8f132e7 100644
|
index 9a78598..8f132e7 100644
|
||||||
--- a/policy/modules/services/radius.if
|
--- a/policy/modules/services/radius.if
|
||||||
@ -39262,7 +39344,7 @@ index 88df85d..2fa3974 100644
|
|||||||
ssh_sigchld(application_domain_type)
|
ssh_sigchld(application_domain_type)
|
||||||
ssh_rw_stream_sockets(application_domain_type)
|
ssh_rw_stream_sockets(application_domain_type)
|
||||||
diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
|
diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
|
||||||
index 1c4b1e7..2997dd7 100644
|
index 1c4b1e7..8d326d4 100644
|
||||||
--- a/policy/modules/system/authlogin.fc
|
--- a/policy/modules/system/authlogin.fc
|
||||||
+++ b/policy/modules/system/authlogin.fc
|
+++ b/policy/modules/system/authlogin.fc
|
||||||
@@ -10,6 +10,7 @@
|
@@ -10,6 +10,7 @@
|
||||||
@ -39273,7 +39355,7 @@ index 1c4b1e7..2997dd7 100644
|
|||||||
/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0)
|
/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0)
|
||||||
/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
|
/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
|
||||||
ifdef(`distro_suse', `
|
ifdef(`distro_suse', `
|
||||||
@@ -27,6 +28,7 @@ ifdef(`distro_gentoo', `
|
@@ -27,12 +28,14 @@ ifdef(`distro_gentoo', `
|
||||||
|
|
||||||
/var/db/shadow.* -- gen_context(system_u:object_r:shadow_t,s0)
|
/var/db/shadow.* -- gen_context(system_u:object_r:shadow_t,s0)
|
||||||
|
|
||||||
@ -39281,6 +39363,13 @@ index 1c4b1e7..2997dd7 100644
|
|||||||
/var/lib/abl(/.*)? gen_context(system_u:object_r:var_auth_t,s0)
|
/var/lib/abl(/.*)? gen_context(system_u:object_r:var_auth_t,s0)
|
||||||
/var/lib/pam_ssh(/.*)? gen_context(system_u:object_r:var_auth_t,s0)
|
/var/lib/pam_ssh(/.*)? gen_context(system_u:object_r:var_auth_t,s0)
|
||||||
|
|
||||||
|
/var/log/btmp.* -- gen_context(system_u:object_r:faillog_t,s0)
|
||||||
|
/var/log/dmesg -- gen_context(system_u:object_r:var_log_t,s0)
|
||||||
|
/var/log/faillog -- gen_context(system_u:object_r:faillog_t,s0)
|
||||||
|
+/var/log/faillock(/.*)? gen_context(system_u:object_r:faillog_t,s0)
|
||||||
|
/var/log/lastlog -- gen_context(system_u:object_r:lastlog_t,s0)
|
||||||
|
/var/log/syslog -- gen_context(system_u:object_r:var_log_t,s0)
|
||||||
|
/var/log/tallylog -- gen_context(system_u:object_r:faillog_t,s0)
|
||||||
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
|
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
|
||||||
index bea0ade..6f47773 100644
|
index bea0ade..6f47773 100644
|
||||||
--- a/policy/modules/system/authlogin.if
|
--- a/policy/modules/system/authlogin.if
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.9.8
|
Version: 3.9.8
|
||||||
Release: 2%{?dist}
|
Release: 3%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -471,6 +471,20 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Nov 9 2010 Dan Walsh <dwalsh@redhat.com> 3.9.8-3
|
||||||
|
- Fix up corecommands.fc to match upstream
|
||||||
|
- Make sure /lib/systemd/* is labeled init_exec_t
|
||||||
|
- mount wants to setattr on all mountpoints
|
||||||
|
- dovecot auth wants to read dovecot etc files
|
||||||
|
- nscd daemon looks at the exe file of the comunicating daemon
|
||||||
|
- openvpn wants to read utmp file
|
||||||
|
- postfix apps now set sys_nice and lower limits
|
||||||
|
- remote_login (telnetd/login) wants to use telnetd_devpts_t and user_devpts_t to work correctly
|
||||||
|
- Also resolves nsswitch
|
||||||
|
- Fix labels on /etc/hosts.*
|
||||||
|
- Cleanup to make upsteam patch work
|
||||||
|
- allow abrt to read etc_runtime_t
|
||||||
|
|
||||||
* Fri Nov 5 2010 Dan Walsh <dwalsh@redhat.com> 3.9.8-2
|
* Fri Nov 5 2010 Dan Walsh <dwalsh@redhat.com> 3.9.8-2
|
||||||
- Add conflicts for dirsrv package
|
- Add conflicts for dirsrv package
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user