* Fri Nov 27 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-97
- Allow reading of symlinks in /etc/puppet - Added TAGS to gitignore - I guess there can be content under /var/lib/lockdown #1167502 - Allow rhev-agentd to read /dev/.udev/db to make deploying hosted engine via iSCSI working. - Allow keystone to send a generic signal to own process. - Allow radius to bind tcp/1812 radius port. - Dontaudit list user_tmp files for system_mail_t - label virt-who as virtd_exec_t - Allow rhsmcertd to send a null signal to virt-who running as virtd_t - Add virt_signull() interface - Add missing alias for _content_rw_t - Allow .snapshots to be created in other directories, on all mountpoints - Allow spamd to access razor-agent.log - Add fixes for sfcb from libvirt-cim TestOnly bug. (#1152104) - Allow .snapshots to be created in other directories, on all mountpoints - Label tcp port 5280 as ejabberd port. BZ(1059930) - Make /usr/bin/vncserver running as unconfined_service_t - Label /etc/docker/certs.d as cert_t - Allow all systemd domains to search file systems
This commit is contained in:
parent
48f969d319
commit
e4d7a4020d
@ -5481,7 +5481,7 @@ index 8e0f9cd..b9f45b9 100644
|
|||||||
|
|
||||||
define(`create_packet_interfaces',``
|
define(`create_packet_interfaces',``
|
||||||
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
|
diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
|
||||||
index b191055..2f2f2b9 100644
|
index b191055..87df0ad 100644
|
||||||
--- a/policy/modules/kernel/corenetwork.te.in
|
--- a/policy/modules/kernel/corenetwork.te.in
|
||||||
+++ b/policy/modules/kernel/corenetwork.te.in
|
+++ b/policy/modules/kernel/corenetwork.te.in
|
||||||
@@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2)
|
@@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2)
|
||||||
@ -5659,12 +5659,13 @@ index b191055..2f2f2b9 100644
|
|||||||
network_port(iscsi, tcp,3260,s0)
|
network_port(iscsi, tcp,3260,s0)
|
||||||
network_port(isns, tcp,3205,s0, udp,3205,s0)
|
network_port(isns, tcp,3205,s0, udp,3205,s0)
|
||||||
network_port(jabber_client, tcp,5222,s0, tcp,5223,s0)
|
network_port(jabber_client, tcp,5222,s0, tcp,5223,s0)
|
||||||
network_port(jabber_interserver, tcp,5269,s0)
|
-network_port(jabber_interserver, tcp,5269,s0)
|
||||||
-network_port(jboss_iiop, tcp,3528,s0, udp,3528,s0)
|
-network_port(jboss_iiop, tcp,3528,s0, udp,3528,s0)
|
||||||
-network_port(kerberos, tcp,88,s0, udp,88,s0, tcp,750,s0, udp,750,s0)
|
-network_port(kerberos, tcp,88,s0, udp,88,s0, tcp,750,s0, udp,750,s0)
|
||||||
-network_port(kerberos_admin, tcp,464,s0, udp,464,s0, tcp,749,s0)
|
-network_port(kerberos_admin, tcp,464,s0, udp,464,s0, tcp,749,s0)
|
||||||
-network_port(kerberos_master, tcp,4444,s0, udp,4444,s0)
|
-network_port(kerberos_master, tcp,4444,s0, udp,4444,s0)
|
||||||
-network_port(kismet, tcp,2501,s0)
|
-network_port(kismet, tcp,2501,s0)
|
||||||
|
+network_port(jabber_interserver, tcp,5269,s0, tcp,5280,s0)
|
||||||
+network_port(jabber_router, tcp,5347,s0)
|
+network_port(jabber_router, tcp,5347,s0)
|
||||||
+network_port(jacorb, tcp,3528,s0, tcp,3529,s0)
|
+network_port(jacorb, tcp,3528,s0, tcp,3529,s0)
|
||||||
+network_port(jboss_debug, tcp,8787,s0, udp,8787,s0)
|
+network_port(jboss_debug, tcp,8787,s0, udp,8787,s0)
|
||||||
@ -8755,7 +8756,7 @@ index 0b1a871..f260e6f 100644
|
|||||||
+allow devices_unconfined_type device_node:{ file chr_file } ~{ execmod entrypoint };
|
+allow devices_unconfined_type device_node:{ file chr_file } ~{ execmod entrypoint };
|
||||||
+allow devices_unconfined_type mtrr_device_t:file ~{ execmod entrypoint };
|
+allow devices_unconfined_type mtrr_device_t:file ~{ execmod entrypoint };
|
||||||
diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
|
diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
|
||||||
index 6a1e4d1..1b9b0b5 100644
|
index 6a1e4d1..7ac2831 100644
|
||||||
--- a/policy/modules/kernel/domain.if
|
--- a/policy/modules/kernel/domain.if
|
||||||
+++ b/policy/modules/kernel/domain.if
|
+++ b/policy/modules/kernel/domain.if
|
||||||
@@ -76,33 +76,8 @@ interface(`domain_type',`
|
@@ -76,33 +76,8 @@ interface(`domain_type',`
|
||||||
@ -8830,7 +8831,33 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## Send a stop signal to all domains.
|
## Send a stop signal to all domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -631,7 +626,7 @@ interface(`domain_read_all_domains_state',`
|
@@ -571,6 +566,25 @@ interface(`domain_kill_all_domains',`
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
+## Destroy all domains semaphores
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+## <rolecap/>
|
||||||
|
+#
|
||||||
|
+interface(`domain_destroy_all_semaphores',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ attribute domain;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ allow $1 domain:sem destroy;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
|
## Search the process state directory (/proc/pid) of all domains.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
@@ -631,7 +645,7 @@ interface(`domain_read_all_domains_state',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -8839,7 +8866,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -655,7 +650,7 @@ interface(`domain_getattr_all_domains',`
|
@@ -655,7 +669,7 @@ interface(`domain_getattr_all_domains',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -8848,7 +8875,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@@ -1356,6 +1351,24 @@ interface(`domain_manage_all_entry_files',`
|
@@ -1356,6 +1370,24 @@ interface(`domain_manage_all_entry_files',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -8873,7 +8900,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## Relabel to and from all entry point
|
## Relabel to and from all entry point
|
||||||
## file types.
|
## file types.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -1421,7 +1434,7 @@ interface(`domain_entry_file_spec_domtrans',`
|
@@ -1421,7 +1453,7 @@ interface(`domain_entry_file_spec_domtrans',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Ability to mmap a low area of the address
|
## Ability to mmap a low area of the address
|
||||||
## space conditionally, as configured by
|
## space conditionally, as configured by
|
||||||
@ -8882,7 +8909,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## Preventing such mappings helps protect against
|
## Preventing such mappings helps protect against
|
||||||
## exploiting null deref bugs in the kernel.
|
## exploiting null deref bugs in the kernel.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -1448,7 +1461,7 @@ interface(`domain_mmap_low',`
|
@@ -1448,7 +1480,7 @@ interface(`domain_mmap_low',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Ability to mmap a low area of the address
|
## Ability to mmap a low area of the address
|
||||||
## space unconditionally, as configured
|
## space unconditionally, as configured
|
||||||
@ -8891,7 +8918,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## Preventing such mappings helps protect against
|
## Preventing such mappings helps protect against
|
||||||
## exploiting null deref bugs in the kernel.
|
## exploiting null deref bugs in the kernel.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -1508,6 +1521,24 @@ interface(`domain_unconfined_signal',`
|
@@ -1508,6 +1540,24 @@ interface(`domain_unconfined_signal',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -8916,7 +8943,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
## Unconfined access to domains.
|
## Unconfined access to domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -1530,4 +1561,63 @@ interface(`domain_unconfined',`
|
@@ -1530,4 +1580,63 @@ interface(`domain_unconfined',`
|
||||||
typeattribute $1 can_change_object_identity;
|
typeattribute $1 can_change_object_identity;
|
||||||
typeattribute $1 set_curr_context;
|
typeattribute $1 set_curr_context;
|
||||||
typeattribute $1 process_uncond_exempt;
|
typeattribute $1 process_uncond_exempt;
|
||||||
@ -8981,7 +9008,7 @@ index 6a1e4d1..1b9b0b5 100644
|
|||||||
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
||||||
index cf04cb5..c2776d0 100644
|
index cf04cb5..a0d747a 100644
|
||||||
--- a/policy/modules/kernel/domain.te
|
--- a/policy/modules/kernel/domain.te
|
||||||
+++ b/policy/modules/kernel/domain.te
|
+++ b/policy/modules/kernel/domain.te
|
||||||
@@ -4,17 +4,41 @@ policy_module(domain, 1.11.0)
|
@@ -4,17 +4,41 @@ policy_module(domain, 1.11.0)
|
||||||
@ -9130,7 +9157,7 @@ index cf04cb5..c2776d0 100644
|
|||||||
|
|
||||||
# Create/access any System V IPC objects.
|
# Create/access any System V IPC objects.
|
||||||
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
||||||
@@ -166,5 +238,352 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
@@ -166,5 +238,356 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
||||||
# act on all domains keys
|
# act on all domains keys
|
||||||
allow unconfined_domain_type domain:key *;
|
allow unconfined_domain_type domain:key *;
|
||||||
|
|
||||||
@ -9159,6 +9186,10 @@ index cf04cb5..c2776d0 100644
|
|||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
|
+ snapper_filetrans_named_content(named_filetrans_domain)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
+ seutil_filetrans_named_content(named_filetrans_domain)
|
+ seutil_filetrans_named_content(named_filetrans_domain)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
@ -20428,7 +20459,7 @@ index 0000000..63bc797
|
|||||||
+logging_stream_connect_syslog(sysadm_t)
|
+logging_stream_connect_syslog(sysadm_t)
|
||||||
diff --git a/policy/modules/roles/unconfineduser.fc b/policy/modules/roles/unconfineduser.fc
|
diff --git a/policy/modules/roles/unconfineduser.fc b/policy/modules/roles/unconfineduser.fc
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..0e8654b
|
index 0000000..b680867
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/roles/unconfineduser.fc
|
+++ b/policy/modules/roles/unconfineduser.fc
|
||||||
@@ -0,0 +1,8 @@
|
@@ -0,0 +1,8 @@
|
||||||
@ -20436,7 +20467,7 @@ index 0000000..0e8654b
|
|||||||
+# e.g.:
|
+# e.g.:
|
||||||
+# /usr/local/bin/appsrv -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
+# /usr/local/bin/appsrv -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
||||||
+# For the time being until someone writes a sane policy, we need initrc to transition to unconfined_t
|
+# For the time being until someone writes a sane policy, we need initrc to transition to unconfined_t
|
||||||
+/usr/bin/vncserver -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
+#/usr/bin/vncserver -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
||||||
+
|
+
|
||||||
+/usr/sbin/xrdp -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
+/usr/sbin/xrdp -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
||||||
+/usr/sbin/xrdp-sesman -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
+/usr/sbin/xrdp-sesman -- gen_context(system_u:object_r:unconfined_exec_t,s0)
|
||||||
@ -27255,7 +27286,7 @@ index 2479587..890e1e2 100644
|
|||||||
/var/(db|adm)/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
|
/var/(db|adm)/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
|
||||||
/var/lib/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
|
/var/lib/sudo(/.*)? gen_context(system_u:object_r:pam_var_run_t,s0)
|
||||||
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
|
diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
|
||||||
index 3efd5b6..f645c21 100644
|
index 3efd5b6..9e85ea0 100644
|
||||||
--- a/policy/modules/system/authlogin.if
|
--- a/policy/modules/system/authlogin.if
|
||||||
+++ b/policy/modules/system/authlogin.if
|
+++ b/policy/modules/system/authlogin.if
|
||||||
@@ -23,11 +23,17 @@ interface(`auth_role',`
|
@@ -23,11 +23,17 @@ interface(`auth_role',`
|
||||||
@ -27317,7 +27348,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -95,69 +117,68 @@ interface(`auth_use_pam',`
|
@@ -95,69 +117,67 @@ interface(`auth_use_pam',`
|
||||||
interface(`auth_login_pgm_domain',`
|
interface(`auth_login_pgm_domain',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type var_auth_t, auth_cache_t;
|
type var_auth_t, auth_cache_t;
|
||||||
@ -27375,7 +27406,6 @@ index 3efd5b6..f645c21 100644
|
|||||||
mls_file_downgrade($1)
|
mls_file_downgrade($1)
|
||||||
mls_process_set_level($1)
|
mls_process_set_level($1)
|
||||||
+ mls_process_write_to_clearance($1)
|
+ mls_process_write_to_clearance($1)
|
||||||
+ mls_process_write_all_levels($1)
|
|
||||||
mls_fd_share_all_levels($1)
|
mls_fd_share_all_levels($1)
|
||||||
|
|
||||||
auth_use_pam($1)
|
auth_use_pam($1)
|
||||||
@ -27427,7 +27457,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -231,6 +252,25 @@ interface(`auth_domtrans_login_program',`
|
@@ -231,6 +251,25 @@ interface(`auth_domtrans_login_program',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -27453,7 +27483,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## Execute a login_program in the target domain,
|
## Execute a login_program in the target domain,
|
||||||
## with a range transition.
|
## with a range transition.
|
||||||
## </summary>
|
## </summary>
|
||||||
@@ -322,6 +362,24 @@ interface(`auth_rw_cache',`
|
@@ -322,6 +361,24 @@ interface(`auth_rw_cache',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -27478,7 +27508,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## Manage authentication cache
|
## Manage authentication cache
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -402,6 +460,8 @@ interface(`auth_domtrans_chk_passwd',`
|
@@ -402,6 +459,8 @@ interface(`auth_domtrans_chk_passwd',`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
samba_stream_connect_winbind($1)
|
samba_stream_connect_winbind($1)
|
||||||
')
|
')
|
||||||
@ -27487,7 +27517,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -428,6 +488,24 @@ interface(`auth_domtrans_chkpwd',`
|
@@ -428,6 +487,24 @@ interface(`auth_domtrans_chkpwd',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -27512,7 +27542,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## Execute chkpwd programs in the chkpwd domain.
|
## Execute chkpwd programs in the chkpwd domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -448,6 +526,25 @@ interface(`auth_run_chk_passwd',`
|
@@ -448,6 +525,25 @@ interface(`auth_run_chk_passwd',`
|
||||||
|
|
||||||
auth_domtrans_chk_passwd($1)
|
auth_domtrans_chk_passwd($1)
|
||||||
role $2 types chkpwd_t;
|
role $2 types chkpwd_t;
|
||||||
@ -27538,7 +27568,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -467,7 +564,6 @@ interface(`auth_domtrans_upd_passwd',`
|
@@ -467,7 +563,6 @@ interface(`auth_domtrans_upd_passwd',`
|
||||||
|
|
||||||
domtrans_pattern($1, updpwd_exec_t, updpwd_t)
|
domtrans_pattern($1, updpwd_exec_t, updpwd_t)
|
||||||
auth_dontaudit_read_shadow($1)
|
auth_dontaudit_read_shadow($1)
|
||||||
@ -27546,7 +27576,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -664,6 +760,10 @@ interface(`auth_manage_shadow',`
|
@@ -664,6 +759,10 @@ interface(`auth_manage_shadow',`
|
||||||
|
|
||||||
allow $1 shadow_t:file manage_file_perms;
|
allow $1 shadow_t:file manage_file_perms;
|
||||||
typeattribute $1 can_read_shadow_passwords, can_write_shadow_passwords;
|
typeattribute $1 can_read_shadow_passwords, can_write_shadow_passwords;
|
||||||
@ -27557,7 +27587,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@@ -763,7 +863,50 @@ interface(`auth_rw_faillog',`
|
@@ -763,7 +862,50 @@ interface(`auth_rw_faillog',`
|
||||||
')
|
')
|
||||||
|
|
||||||
logging_search_logs($1)
|
logging_search_logs($1)
|
||||||
@ -27609,7 +27639,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@@ -824,9 +967,29 @@ interface(`auth_rw_lastlog',`
|
@@ -824,9 +966,29 @@ interface(`auth_rw_lastlog',`
|
||||||
allow $1 lastlog_t:file { rw_file_perms lock setattr };
|
allow $1 lastlog_t:file { rw_file_perms lock setattr };
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -27640,7 +27670,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -834,12 +997,27 @@ interface(`auth_rw_lastlog',`
|
@@ -834,12 +996,27 @@ interface(`auth_rw_lastlog',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -27671,7 +27701,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -854,15 +1032,15 @@ interface(`auth_domtrans_pam',`
|
@@ -854,15 +1031,15 @@ interface(`auth_domtrans_pam',`
|
||||||
#
|
#
|
||||||
interface(`auth_signal_pam',`
|
interface(`auth_signal_pam',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
@ -27690,7 +27720,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -875,13 +1053,33 @@ interface(`auth_signal_pam',`
|
@@ -875,13 +1052,33 @@ interface(`auth_signal_pam',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -27728,7 +27758,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -959,9 +1157,30 @@ interface(`auth_manage_var_auth',`
|
@@ -959,9 +1156,30 @@ interface(`auth_manage_var_auth',`
|
||||||
')
|
')
|
||||||
|
|
||||||
files_search_var($1)
|
files_search_var($1)
|
||||||
@ -27762,7 +27792,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1040,6 +1259,10 @@ interface(`auth_manage_pam_pid',`
|
@@ -1040,6 +1258,10 @@ interface(`auth_manage_pam_pid',`
|
||||||
files_search_pids($1)
|
files_search_pids($1)
|
||||||
allow $1 pam_var_run_t:dir manage_dir_perms;
|
allow $1 pam_var_run_t:dir manage_dir_perms;
|
||||||
allow $1 pam_var_run_t:file manage_file_perms;
|
allow $1 pam_var_run_t:file manage_file_perms;
|
||||||
@ -27773,7 +27803,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1176,6 +1399,7 @@ interface(`auth_manage_pam_console_data',`
|
@@ -1176,6 +1398,7 @@ interface(`auth_manage_pam_console_data',`
|
||||||
files_search_pids($1)
|
files_search_pids($1)
|
||||||
manage_files_pattern($1, pam_var_console_t, pam_var_console_t)
|
manage_files_pattern($1, pam_var_console_t, pam_var_console_t)
|
||||||
manage_lnk_files_pattern($1, pam_var_console_t, pam_var_console_t)
|
manage_lnk_files_pattern($1, pam_var_console_t, pam_var_console_t)
|
||||||
@ -27781,7 +27811,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
@@ -1576,6 +1800,25 @@ interface(`auth_setattr_login_records',`
|
@@ -1576,6 +1799,25 @@ interface(`auth_setattr_login_records',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -27807,7 +27837,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
## Read login records files (/var/log/wtmp).
|
## Read login records files (/var/log/wtmp).
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
@@ -1726,24 +1969,7 @@ interface(`auth_manage_login_records',`
|
@@ -1726,24 +1968,7 @@ interface(`auth_manage_login_records',`
|
||||||
|
|
||||||
logging_rw_generic_log_dirs($1)
|
logging_rw_generic_log_dirs($1)
|
||||||
allow $1 wtmp_t:file manage_file_perms;
|
allow $1 wtmp_t:file manage_file_perms;
|
||||||
@ -27833,7 +27863,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1767,11 +1993,13 @@ interface(`auth_relabel_login_records',`
|
@@ -1767,11 +1992,13 @@ interface(`auth_relabel_login_records',`
|
||||||
## <infoflow type="both" weight="10"/>
|
## <infoflow type="both" weight="10"/>
|
||||||
#
|
#
|
||||||
interface(`auth_use_nsswitch',`
|
interface(`auth_use_nsswitch',`
|
||||||
@ -27850,7 +27880,7 @@ index 3efd5b6..f645c21 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1805,3 +2033,280 @@ interface(`auth_unconfined',`
|
@@ -1805,3 +2032,280 @@ interface(`auth_unconfined',`
|
||||||
typeattribute $1 can_write_shadow_passwords;
|
typeattribute $1 can_write_shadow_passwords;
|
||||||
typeattribute $1 can_relabelto_shadow_passwords;
|
typeattribute $1 can_relabelto_shadow_passwords;
|
||||||
')
|
')
|
||||||
@ -35546,15 +35576,16 @@ index 79048c4..ce6f0ce 100644
|
|||||||
udev_read_pid_files(lvm_t)
|
udev_read_pid_files(lvm_t)
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc
|
diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc
|
||||||
index 9fe8e01..83acb32 100644
|
index 9fe8e01..3d71062 100644
|
||||||
--- a/policy/modules/system/miscfiles.fc
|
--- a/policy/modules/system/miscfiles.fc
|
||||||
+++ b/policy/modules/system/miscfiles.fc
|
+++ b/policy/modules/system/miscfiles.fc
|
||||||
@@ -9,11 +9,13 @@ ifdef(`distro_gentoo',`
|
@@ -9,11 +9,14 @@ ifdef(`distro_gentoo',`
|
||||||
# /etc
|
# /etc
|
||||||
#
|
#
|
||||||
/etc/avahi/etc/localtime -- gen_context(system_u:object_r:locale_t,s0)
|
/etc/avahi/etc/localtime -- gen_context(system_u:object_r:locale_t,s0)
|
||||||
-/etc/httpd/alias/[^/]*\.db(\.[^/]*)* -- gen_context(system_u:object_r:cert_t,s0)
|
-/etc/httpd/alias/[^/]*\.db(\.[^/]*)* -- gen_context(system_u:object_r:cert_t,s0)
|
||||||
-/etc/localtime -- gen_context(system_u:object_r:locale_t,s0)
|
-/etc/localtime -- gen_context(system_u:object_r:locale_t,s0)
|
||||||
|
+/etc/docker/certs\.d(/.*)? gen_context(system_u:object_r:cert_t,s0)
|
||||||
+/etc/httpd/alias(/.*)? gen_context(system_u:object_r:cert_t,s0)
|
+/etc/httpd/alias(/.*)? gen_context(system_u:object_r:cert_t,s0)
|
||||||
+/etc/localtime gen_context(system_u:object_r:locale_t,s0)
|
+/etc/localtime gen_context(system_u:object_r:locale_t,s0)
|
||||||
+/etc/locale.conf -- gen_context(system_u:object_r:locale_t,s0)
|
+/etc/locale.conf -- gen_context(system_u:object_r:locale_t,s0)
|
||||||
@ -35565,7 +35596,7 @@ index 9fe8e01..83acb32 100644
|
|||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
/etc/sysconfig/clock -- gen_context(system_u:object_r:locale_t,s0)
|
/etc/sysconfig/clock -- gen_context(system_u:object_r:locale_t,s0)
|
||||||
@@ -37,24 +39,20 @@ ifdef(`distro_redhat',`
|
@@ -37,24 +40,20 @@ ifdef(`distro_redhat',`
|
||||||
|
|
||||||
/usr/lib/perl5/man(/.*)? gen_context(system_u:object_r:man_t,s0)
|
/usr/lib/perl5/man(/.*)? gen_context(system_u:object_r:man_t,s0)
|
||||||
|
|
||||||
@ -35595,7 +35626,7 @@ index 9fe8e01..83acb32 100644
|
|||||||
|
|
||||||
/usr/X11R6/lib/X11/fonts(/.*)? gen_context(system_u:object_r:fonts_t,s0)
|
/usr/X11R6/lib/X11/fonts(/.*)? gen_context(system_u:object_r:fonts_t,s0)
|
||||||
|
|
||||||
@@ -77,7 +75,7 @@ ifdef(`distro_redhat',`
|
@@ -77,7 +76,7 @@ ifdef(`distro_redhat',`
|
||||||
|
|
||||||
/var/cache/fontconfig(/.*)? gen_context(system_u:object_r:fonts_cache_t,s0)
|
/var/cache/fontconfig(/.*)? gen_context(system_u:object_r:fonts_cache_t,s0)
|
||||||
/var/cache/fonts(/.*)? gen_context(system_u:object_r:tetex_data_t,s0)
|
/var/cache/fonts(/.*)? gen_context(system_u:object_r:tetex_data_t,s0)
|
||||||
@ -35604,7 +35635,7 @@ index 9fe8e01..83acb32 100644
|
|||||||
|
|
||||||
/var/named/chroot/etc/pki(/.*)? gen_context(system_u:object_r:cert_t,s0)
|
/var/named/chroot/etc/pki(/.*)? gen_context(system_u:object_r:cert_t,s0)
|
||||||
|
|
||||||
@@ -90,6 +88,7 @@ ifdef(`distro_debian',`
|
@@ -90,6 +89,7 @@ ifdef(`distro_debian',`
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
@ -41338,10 +41369,10 @@ index 0000000..d2a8fc7
|
|||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..a75ffd3
|
index 0000000..769e942
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/system/systemd.te
|
+++ b/policy/modules/system/systemd.te
|
||||||
@@ -0,0 +1,700 @@
|
@@ -0,0 +1,703 @@
|
||||||
+policy_module(systemd, 1.0.0)
|
+policy_module(systemd, 1.0.0)
|
||||||
+
|
+
|
||||||
+#######################################
|
+#######################################
|
||||||
@ -41482,6 +41513,7 @@ index 0000000..a75ffd3
|
|||||||
+domain_signal_all_domains(systemd_logind_t)
|
+domain_signal_all_domains(systemd_logind_t)
|
||||||
+domain_signull_all_domains(systemd_logind_t)
|
+domain_signull_all_domains(systemd_logind_t)
|
||||||
+domain_kill_all_domains(systemd_logind_t)
|
+domain_kill_all_domains(systemd_logind_t)
|
||||||
|
+domain_destroy_all_semaphores(systemd_logind_t)
|
||||||
+
|
+
|
||||||
+# /etc/udev/udev.conf should probably have a private type if only for confined administration
|
+# /etc/udev/udev.conf should probably have a private type if only for confined administration
|
||||||
+# /etc/nsswitch.conf
|
+# /etc/nsswitch.conf
|
||||||
@ -42016,6 +42048,8 @@ index 0000000..a75ffd3
|
|||||||
+
|
+
|
||||||
+dev_read_urand(systemd_domain)
|
+dev_read_urand(systemd_domain)
|
||||||
+
|
+
|
||||||
|
+fs_search_all(systemd_domain)
|
||||||
|
+
|
||||||
+files_read_etc_files(systemd_domain)
|
+files_read_etc_files(systemd_domain)
|
||||||
+files_read_etc_runtime_files(systemd_domain)
|
+files_read_etc_runtime_files(systemd_domain)
|
||||||
+files_read_usr_files(systemd_domain)
|
+files_read_usr_files(systemd_domain)
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 96%{?dist}
|
Release: 97%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -604,6 +604,27 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Nov 27 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-97
|
||||||
|
- Allow reading of symlinks in /etc/puppet
|
||||||
|
- Added TAGS to gitignore
|
||||||
|
- I guess there can be content under /var/lib/lockdown #1167502
|
||||||
|
- Allow rhev-agentd to read /dev/.udev/db to make deploying hosted engine via iSCSI working.
|
||||||
|
- Allow keystone to send a generic signal to own process.
|
||||||
|
- Allow radius to bind tcp/1812 radius port.
|
||||||
|
- Dontaudit list user_tmp files for system_mail_t
|
||||||
|
- label virt-who as virtd_exec_t
|
||||||
|
- Allow rhsmcertd to send a null signal to virt-who running as virtd_t
|
||||||
|
- Add virt_signull() interface
|
||||||
|
- Add missing alias for _content_rw_t
|
||||||
|
- Allow .snapshots to be created in other directories, on all mountpoints
|
||||||
|
- Allow spamd to access razor-agent.log
|
||||||
|
- Add fixes for sfcb from libvirt-cim TestOnly bug. (#1152104)
|
||||||
|
- Allow .snapshots to be created in other directories, on all mountpoints
|
||||||
|
- Label tcp port 5280 as ejabberd port. BZ(1059930)
|
||||||
|
- Make /usr/bin/vncserver running as unconfined_service_t
|
||||||
|
- Label /etc/docker/certs.d as cert_t
|
||||||
|
- Allow all systemd domains to search file systems
|
||||||
|
|
||||||
* Thu Nov 20 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-96
|
* Thu Nov 20 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-96
|
||||||
- Allow NetworkManager stream connect on openvpn. BZ(1165110)
|
- Allow NetworkManager stream connect on openvpn. BZ(1165110)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user