* Tue Dec 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-164
- Allow firewalld to create firewalld_var_run_t directory. BZ(1291243) - Add interface firewalld_read_pid_files() - Allow iptables to read firewalld pid files. BZ(1291243) - Allow the user cronjobs to run in their userdomain - Label ssdm binaries storedin /etc/sddm/ as bin_t. BZ(1288111) - Merge pull request #81 from rhatdan/rawhide-base - New access needed by systemd domains
This commit is contained in:
parent
ad3add7345
commit
f1750fb373
Binary file not shown.
@ -57,6 +57,16 @@ index 313d837..ef3c532 100644
|
||||
@echo "Success."
|
||||
|
||||
########################################
|
||||
diff --git a/config/appconfig-mcs/default_contexts b/config/appconfig-mcs/default_contexts
|
||||
index 801d97b..698d54c 100644
|
||||
--- a/config/appconfig-mcs/default_contexts
|
||||
+++ b/config/appconfig-mcs/default_contexts
|
||||
@@ -1,4 +1,4 @@
|
||||
-system_r:crond_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
|
||||
system_r:local_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
|
||||
system_r:remote_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 unconfined_r:unconfined_t:s0
|
||||
system_r:sshd_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
|
||||
diff --git a/config/appconfig-mcs/openssh_contexts b/config/appconfig-mcs/openssh_contexts
|
||||
new file mode 100644
|
||||
index 0000000..6de0b01
|
||||
@ -65,7 +75,7 @@ index 0000000..6de0b01
|
||||
@@ -0,0 +1 @@
|
||||
+privsep_preauth=sshd_net_t
|
||||
diff --git a/config/appconfig-mcs/staff_u_default_contexts b/config/appconfig-mcs/staff_u_default_contexts
|
||||
index 881a292..80110a4 100644
|
||||
index 881a292..5606c4e 100644
|
||||
--- a/config/appconfig-mcs/staff_u_default_contexts
|
||||
+++ b/config/appconfig-mcs/staff_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -73,7 +83,7 @@ index 881a292..80110a4 100644
|
||||
system_r:remote_login_t:s0 staff_r:staff_t:s0
|
||||
system_r:sshd_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0
|
||||
-system_r:crond_t:s0 staff_r:cronjob_t:s0
|
||||
+system_r:crond_t:s0 staff_r:staff_t:s0
|
||||
+system_r:crond_t:s0 staff_r:staff_t:s0 staff_r:cronjob_t:s0
|
||||
system_r:xdm_t:s0 staff_r:staff_t:s0
|
||||
staff_r:staff_su_t:s0 staff_r:staff_t:s0
|
||||
staff_r:staff_sudo_t:s0 staff_r:staff_t:s0
|
||||
@ -103,7 +113,7 @@ index 0000000..ff32acc
|
||||
@@ -0,0 +1 @@
|
||||
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
|
||||
diff --git a/config/appconfig-mcs/user_u_default_contexts b/config/appconfig-mcs/user_u_default_contexts
|
||||
index cacbc93..4f59f94 100644
|
||||
index cacbc93..56d6071 100644
|
||||
--- a/config/appconfig-mcs/user_u_default_contexts
|
||||
+++ b/config/appconfig-mcs/user_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -111,7 +121,7 @@ index cacbc93..4f59f94 100644
|
||||
system_r:remote_login_t:s0 user_r:user_t:s0
|
||||
system_r:sshd_t:s0 user_r:user_t:s0
|
||||
-system_r:crond_t:s0 user_r:cronjob_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0 user_r:cronjob_t:s0
|
||||
system_r:xdm_t:s0 user_r:user_t:s0
|
||||
user_r:user_su_t:s0 user_r:user_t:s0
|
||||
user_r:user_sudo_t:s0 user_r:user_t:s0
|
||||
@ -122,6 +132,16 @@ index d387b42..150f281 100644
|
||||
@@ -1 +1,2 @@
|
||||
system_u:system_r:svirt_t:s0
|
||||
+system_u:system_r:svirt_tcg_t:s0
|
||||
diff --git a/config/appconfig-mls/default_contexts b/config/appconfig-mls/default_contexts
|
||||
index 801d97b..698d54c 100644
|
||||
--- a/config/appconfig-mls/default_contexts
|
||||
+++ b/config/appconfig-mls/default_contexts
|
||||
@@ -1,4 +1,4 @@
|
||||
-system_r:crond_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0
|
||||
system_r:local_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
|
||||
system_r:remote_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 unconfined_r:unconfined_t:s0
|
||||
system_r:sshd_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0
|
||||
diff --git a/config/appconfig-mls/openssh_contexts b/config/appconfig-mls/openssh_contexts
|
||||
new file mode 100644
|
||||
index 0000000..6de0b01
|
||||
@ -130,7 +150,7 @@ index 0000000..6de0b01
|
||||
@@ -0,0 +1 @@
|
||||
+privsep_preauth=sshd_net_t
|
||||
diff --git a/config/appconfig-mls/staff_u_default_contexts b/config/appconfig-mls/staff_u_default_contexts
|
||||
index 881a292..80110a4 100644
|
||||
index 881a292..5606c4e 100644
|
||||
--- a/config/appconfig-mls/staff_u_default_contexts
|
||||
+++ b/config/appconfig-mls/staff_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -138,7 +158,7 @@ index 881a292..80110a4 100644
|
||||
system_r:remote_login_t:s0 staff_r:staff_t:s0
|
||||
system_r:sshd_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0
|
||||
-system_r:crond_t:s0 staff_r:cronjob_t:s0
|
||||
+system_r:crond_t:s0 staff_r:staff_t:s0
|
||||
+system_r:crond_t:s0 staff_r:staff_t:s0 staff_r:cronjob_t:s0
|
||||
system_r:xdm_t:s0 staff_r:staff_t:s0
|
||||
staff_r:staff_su_t:s0 staff_r:staff_t:s0
|
||||
staff_r:staff_sudo_t:s0 staff_r:staff_t:s0
|
||||
@ -150,7 +170,7 @@ index 0000000..ff32acc
|
||||
@@ -0,0 +1 @@
|
||||
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
|
||||
diff --git a/config/appconfig-mls/user_u_default_contexts b/config/appconfig-mls/user_u_default_contexts
|
||||
index cacbc93..4f59f94 100644
|
||||
index cacbc93..56d6071 100644
|
||||
--- a/config/appconfig-mls/user_u_default_contexts
|
||||
+++ b/config/appconfig-mls/user_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -158,10 +178,20 @@ index cacbc93..4f59f94 100644
|
||||
system_r:remote_login_t:s0 user_r:user_t:s0
|
||||
system_r:sshd_t:s0 user_r:user_t:s0
|
||||
-system_r:crond_t:s0 user_r:cronjob_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0
|
||||
+system_r:crond_t:s0 user_r:user_t:s0 user_r:cronjob_t:s0
|
||||
system_r:xdm_t:s0 user_r:user_t:s0
|
||||
user_r:user_su_t:s0 user_r:user_t:s0
|
||||
user_r:user_sudo_t:s0 user_r:user_t:s0
|
||||
diff --git a/config/appconfig-standard/default_contexts b/config/appconfig-standard/default_contexts
|
||||
index 64a0a90..25ee341 100644
|
||||
--- a/config/appconfig-standard/default_contexts
|
||||
+++ b/config/appconfig-standard/default_contexts
|
||||
@@ -1,4 +1,4 @@
|
||||
-system_r:crond_t user_r:cronjob_t staff_r:cronjob_t sysadm_r:cronjob_t system_r:system_cronjob_t unconfined_r:unconfined_cronjob_t
|
||||
+system_r:crond_t user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t user_r:cronjob_t staff_r:cronjob_t sysadm_r:cronjob_t system_r:system_cronjob_t unconfined_r:unconfined_cronjob_t
|
||||
system_r:local_login_t user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t
|
||||
system_r:remote_login_t user_r:user_t staff_r:staff_t unconfined_r:unconfined_t
|
||||
system_r:sshd_t user_r:user_t staff_r:staff_t sysadm_r:sysadm_t unconfined_r:unconfined_t
|
||||
diff --git a/config/appconfig-standard/openssh_contexts b/config/appconfig-standard/openssh_contexts
|
||||
new file mode 100644
|
||||
index 0000000..6de0b01
|
||||
@ -170,7 +200,7 @@ index 0000000..6de0b01
|
||||
@@ -0,0 +1 @@
|
||||
+privsep_preauth=sshd_net_t
|
||||
diff --git a/config/appconfig-standard/staff_u_default_contexts b/config/appconfig-standard/staff_u_default_contexts
|
||||
index c2a5ea8..f63999e 100644
|
||||
index c2a5ea8..300694c 100644
|
||||
--- a/config/appconfig-standard/staff_u_default_contexts
|
||||
+++ b/config/appconfig-standard/staff_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -178,7 +208,7 @@ index c2a5ea8..f63999e 100644
|
||||
system_r:remote_login_t staff_r:staff_t
|
||||
system_r:sshd_t staff_r:staff_t sysadm_r:sysadm_t
|
||||
-system_r:crond_t staff_r:cronjob_t
|
||||
+system_r:crond_t staff_r:staff_t
|
||||
+system_r:crond_t staff_r:staff_t staff_r:cronjob_t
|
||||
system_r:xdm_t staff_r:staff_t
|
||||
staff_r:staff_su_t staff_r:staff_t
|
||||
staff_r:staff_sudo_t staff_r:staff_t
|
||||
@ -208,7 +238,7 @@ index 0000000..ff32acc
|
||||
@@ -0,0 +1 @@
|
||||
+runtime=system_u:object_r:systemd_runtime_unit_file_t:s0
|
||||
diff --git a/config/appconfig-standard/user_u_default_contexts b/config/appconfig-standard/user_u_default_contexts
|
||||
index f5bfac3..639555b 100644
|
||||
index f5bfac3..63b7eec 100644
|
||||
--- a/config/appconfig-standard/user_u_default_contexts
|
||||
+++ b/config/appconfig-standard/user_u_default_contexts
|
||||
@@ -1,7 +1,7 @@
|
||||
@ -216,7 +246,7 @@ index f5bfac3..639555b 100644
|
||||
system_r:remote_login_t user_r:user_t
|
||||
system_r:sshd_t user_r:user_t
|
||||
-system_r:crond_t user_r:cronjob_t
|
||||
+system_r:crond_t user_r:user_t
|
||||
+system_r:crond_t user_r:user_t user_r:cronjob_t
|
||||
system_r:xdm_t user_r:user_t
|
||||
user_r:user_su_t user_r:user_t
|
||||
user_r:user_sudo_t user_r:user_t
|
||||
@ -3465,7 +3495,7 @@ index 7590165..d81185e 100644
|
||||
+ fs_mounton_fusefs(seunshare_domain)
|
||||
')
|
||||
diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
|
||||
index 33e0f8d..e16fba2 100644
|
||||
index 33e0f8d..9502a72 100644
|
||||
--- a/policy/modules/kernel/corecommands.fc
|
||||
+++ b/policy/modules/kernel/corecommands.fc
|
||||
@@ -1,9 +1,10 @@
|
||||
@ -3497,7 +3527,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/etc/dhcp/dhclient\.d(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
/etc/hotplug/.*agent -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -67,18 +71,28 @@ ifdef(`distro_redhat',`
|
||||
@@ -67,18 +71,33 @@ ifdef(`distro_redhat',`
|
||||
/etc/hotplug\.d/default/default.* gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
/etc/kde/env(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3510,6 +3540,11 @@ index 33e0f8d..e16fba2 100644
|
||||
+/etc/lxdm/Post.* -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+/etc/lxdm/Pre.* -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+/etc/lxdm/Xsession -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+
|
||||
+/etc/sddm/Xsession -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+/etc/sddm/wayland-session -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+/etc/sddm/Xsetup -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+/etc/sddm/Xstop -- gen_context(system_u:object_r:bin_t,s0)
|
||||
+
|
||||
/etc/mail/make -- gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@ -3526,7 +3561,7 @@ index 33e0f8d..e16fba2 100644
|
||||
|
||||
/etc/netplug\.d(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@@ -101,8 +115,6 @@ ifdef(`distro_redhat',`
|
||||
@@ -101,8 +120,6 @@ ifdef(`distro_redhat',`
|
||||
|
||||
/etc/rc\.d/init\.d/functions -- gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@ -3535,7 +3570,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/etc/sysconfig/crond -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/etc/sysconfig/init -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/etc/sysconfig/libvirtd -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -116,6 +128,9 @@ ifdef(`distro_redhat',`
|
||||
@@ -116,6 +133,9 @@ ifdef(`distro_redhat',`
|
||||
|
||||
/etc/vmware-tools(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@ -3545,7 +3580,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/etc/X11/xdm/GiveConsole -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/etc/X11/xdm/TakeConsole -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/etc/X11/xdm/Xsetup_0 -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -135,10 +150,12 @@ ifdef(`distro_debian',`
|
||||
@@ -135,10 +155,12 @@ ifdef(`distro_debian',`
|
||||
/lib/nut/.* -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/lib/readahead(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3559,7 +3594,7 @@ index 33e0f8d..e16fba2 100644
|
||||
|
||||
ifdef(`distro_gentoo',`
|
||||
/lib/dhcpcd/dhcpcd-run-hooks -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -149,10 +166,12 @@ ifdef(`distro_gentoo',`
|
||||
@@ -149,10 +171,12 @@ ifdef(`distro_gentoo',`
|
||||
/lib/rcscripts/net\.modules\.d/helpers\.d/udhcpc-.* -- gen_context(system_u:object_r:bin_t,s0)
|
||||
')
|
||||
|
||||
@ -3573,7 +3608,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/sbin/.* gen_context(system_u:object_r:bin_t,s0)
|
||||
/sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -168,6 +187,7 @@ ifdef(`distro_gentoo',`
|
||||
@@ -168,6 +192,7 @@ ifdef(`distro_gentoo',`
|
||||
/opt/(.*/)?sbin(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
/opt/google/talkplugin(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3581,7 +3616,7 @@ index 33e0f8d..e16fba2 100644
|
||||
|
||||
/opt/gutenprint/cups/lib/filter(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@@ -179,34 +199,50 @@ ifdef(`distro_gentoo',`
|
||||
@@ -179,34 +204,50 @@ ifdef(`distro_gentoo',`
|
||||
/opt/vmware/workstation/lib/lib/wrapper-gtk24\.sh -- gen_context(system_u:object_r:bin_t,s0)
|
||||
')
|
||||
|
||||
@ -3641,7 +3676,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/lib/dpkg/.+ -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/emacsen-common/.* gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/gimp/.*/plug-ins(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -218,19 +254,32 @@ ifdef(`distro_gentoo',`
|
||||
@@ -218,19 +259,32 @@ ifdef(`distro_gentoo',`
|
||||
/usr/lib/mailman/mail(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/mediawiki/math/texvc.* gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/misc/sftp-server -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3681,7 +3716,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/lib/xfce4/exo-1/exo-compose-mail-1 -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/xfce4/exo-1/exo-helper-1 -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/xfce4/panel/migrate -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -245,26 +294,40 @@ ifdef(`distro_gentoo',`
|
||||
@@ -245,26 +299,40 @@ ifdef(`distro_gentoo',`
|
||||
/usr/lib/debug/sbin(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/debug/usr/bin(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/lib/debug/usr/sbin(/.*)? -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3727,7 +3762,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/sbin/scponlyc -- gen_context(system_u:object_r:shell_exec_t,s0)
|
||||
/usr/sbin/sesh -- gen_context(system_u:object_r:shell_exec_t,s0)
|
||||
/usr/sbin/smrsh -- gen_context(system_u:object_r:shell_exec_t,s0)
|
||||
@@ -280,10 +343,14 @@ ifdef(`distro_gentoo',`
|
||||
@@ -280,10 +348,14 @@ ifdef(`distro_gentoo',`
|
||||
/usr/share/cluster/.*\.sh gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/cluster/ocf-shellfuncs -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/cluster/svclib_nfslock -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3742,7 +3777,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/share/gnucash/finance-quote-check -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/gnucash/finance-quote-helper -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/hal/device-manager/hal-device-manager -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -298,16 +365,22 @@ ifdef(`distro_gentoo',`
|
||||
@@ -298,16 +370,22 @@ ifdef(`distro_gentoo',`
|
||||
/usr/share/selinux/devel/policygentool -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/smolt/client(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/shorewall/compiler\.pl -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3767,7 +3802,7 @@ index 33e0f8d..e16fba2 100644
|
||||
|
||||
ifdef(`distro_debian',`
|
||||
/usr/lib/ConsoleKit/.* -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -325,20 +398,27 @@ ifdef(`distro_redhat', `
|
||||
@@ -325,20 +403,27 @@ ifdef(`distro_redhat', `
|
||||
/etc/gdm/[^/]+ -d gen_context(system_u:object_r:bin_t,s0)
|
||||
/etc/gdm/[^/]+/.* gen_context(system_u:object_r:bin_t,s0)
|
||||
|
||||
@ -3796,7 +3831,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/share/pwlib/make/ptlib-config -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/pydict/pydict\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/rhn/rhn_applet/applet\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -346,6 +426,7 @@ ifdef(`distro_redhat', `
|
||||
@@ -346,6 +431,7 @@ ifdef(`distro_redhat', `
|
||||
/usr/share/ssl/misc(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/switchdesk/switchdesk-gui\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/system-config-date/system-config-date\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@ -3804,7 +3839,7 @@ index 33e0f8d..e16fba2 100644
|
||||
/usr/share/system-config-selinux/polgen\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/system-config-selinux/system-config-selinux\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||
/usr/share/system-config-display/system-config-display -- gen_context(system_u:object_r:bin_t,s0)
|
||||
@@ -387,17 +468,34 @@ ifdef(`distro_suse', `
|
||||
@@ -387,17 +473,34 @@ ifdef(`distro_suse', `
|
||||
#
|
||||
# /var
|
||||
#
|
||||
@ -36131,7 +36166,7 @@ index c42fbc3..bf211db 100644
|
||||
+ files_pid_filetrans($1, iptables_var_run_t, file, "xtables.lock")
|
||||
+')
|
||||
diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te
|
||||
index be8ed1e..3c2729f 100644
|
||||
index be8ed1e..660ef80 100644
|
||||
--- a/policy/modules/system/iptables.te
|
||||
+++ b/policy/modules/system/iptables.te
|
||||
@@ -16,15 +16,18 @@ role iptables_roles types iptables_t;
|
||||
@ -36244,11 +36279,12 @@ index be8ed1e..3c2729f 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -110,6 +125,11 @@ optional_policy(`
|
||||
@@ -110,6 +125,12 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
+ firewalld_read_config(iptables_t)
|
||||
+ firewalld_read_pid_files(iptables_t)
|
||||
+ firewalld_dontaudit_write_tmp_files(iptables_t)
|
||||
+')
|
||||
+
|
||||
@ -36256,7 +36292,7 @@ index be8ed1e..3c2729f 100644
|
||||
modutils_run_insmod(iptables_t, iptables_roles)
|
||||
')
|
||||
|
||||
@@ -124,6 +144,16 @@ optional_policy(`
|
||||
@@ -124,6 +145,16 @@ optional_policy(`
|
||||
|
||||
optional_policy(`
|
||||
psad_rw_tmp_files(iptables_t)
|
||||
@ -36273,7 +36309,7 @@ index be8ed1e..3c2729f 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -135,9 +165,9 @@ optional_policy(`
|
||||
@@ -135,9 +166,9 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -45222,10 +45258,10 @@ index 0000000..c253b33
|
||||
+')
|
||||
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
||||
new file mode 100644
|
||||
index 0000000..decb7c3
|
||||
index 0000000..56ba5a6
|
||||
--- /dev/null
|
||||
+++ b/policy/modules/system/systemd.te
|
||||
@@ -0,0 +1,822 @@
|
||||
@@ -0,0 +1,824 @@
|
||||
+policy_module(systemd, 1.0.0)
|
||||
+
|
||||
+#######################################
|
||||
@ -45892,6 +45928,7 @@ index 0000000..decb7c3
|
||||
+#
|
||||
+
|
||||
+allow systemd_rfkill_t self:capability net_admin;
|
||||
+allow systemd_rfkill_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||
+
|
||||
+manage_files_pattern(systemd_rfkill_t, systemd_rfkill_var_lib_t, systemd_rfkill_var_lib_t)
|
||||
+
|
||||
@ -46021,6 +46058,7 @@ index 0000000..decb7c3
|
||||
+dev_read_urand(systemd_domain)
|
||||
+
|
||||
+fs_search_all(systemd_domain)
|
||||
+fs_getattr_all_fs(systemd_domain)
|
||||
+
|
||||
+files_read_etc_files(systemd_domain)
|
||||
+files_read_etc_runtime_files(systemd_domain)
|
||||
|
@ -3166,10 +3166,10 @@ index 0000000..36251b9
|
||||
+')
|
||||
diff --git a/antivirus.te b/antivirus.te
|
||||
new file mode 100644
|
||||
index 0000000..12349f3
|
||||
index 0000000..d8b04b5
|
||||
--- /dev/null
|
||||
+++ b/antivirus.te
|
||||
@@ -0,0 +1,272 @@
|
||||
@@ -0,0 +1,273 @@
|
||||
+policy_module(antivirus, 1.0.0)
|
||||
+
|
||||
+########################################
|
||||
@ -3284,6 +3284,7 @@ index 0000000..12349f3
|
||||
+
|
||||
+corenet_all_recvfrom_netlabel(antivirus_t)
|
||||
+corenet_tcp_bind_all_unreserved_ports(antivirus_t)
|
||||
+corenet_dontaudit_tcp_bind_all_reserved_ports(antivirus_t)
|
||||
+corenet_tcp_sendrecv_generic_if(antivirus_t)
|
||||
+corenet_udp_sendrecv_generic_if(antivirus_t)
|
||||
+corenet_tcp_sendrecv_generic_node(antivirus_domain)
|
||||
@ -28268,7 +28269,7 @@ index 21d7b84..0e272bd 100644
|
||||
|
||||
/etc/firewalld(/.*)? gen_context(system_u:object_r:firewalld_etc_rw_t,s0)
|
||||
diff --git a/firewalld.if b/firewalld.if
|
||||
index c62c567..6460877 100644
|
||||
index c62c567..2d9e254 100644
|
||||
--- a/firewalld.if
|
||||
+++ b/firewalld.if
|
||||
@@ -2,7 +2,7 @@
|
||||
@ -28349,7 +28350,7 @@ index c62c567..6460877 100644
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
@@ -51,18 +93,18 @@ interface(`firewalld_dbus_chat',`
|
||||
@@ -51,18 +93,37 @@ interface(`firewalld_dbus_chat',`
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
@ -28367,12 +28368,31 @@ index c62c567..6460877 100644
|
||||
## <summary>
|
||||
-## All of the rules required to
|
||||
-## administrate an firewalld environment.
|
||||
+## Read firewalld PID files.
|
||||
+## </summary>
|
||||
+## <param name="domain">
|
||||
+## <summary>
|
||||
+## Domain allowed access.
|
||||
+## </summary>
|
||||
+## </param>
|
||||
+#
|
||||
+interface(`firewalld_read_pid_files',`
|
||||
+ gen_require(`
|
||||
+ type firewalld_var_run_t;
|
||||
+ ')
|
||||
+
|
||||
+ files_search_pids($1)
|
||||
+ allow $1 firewalld_var_run_t:file read_file_perms;
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
+## All of the rules required to administrate
|
||||
+## an firewalld environment
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
@@ -79,14 +121,18 @@ interface(`firewalld_dontaudit_rw_tmp_files',`
|
||||
@@ -79,14 +140,18 @@ interface(`firewalld_dontaudit_rw_tmp_files',`
|
||||
interface(`firewalld_admin',`
|
||||
gen_require(`
|
||||
type firewalld_t, firewalld_initrc_exec_t;
|
||||
@ -28394,7 +28414,7 @@ index c62c567..6460877 100644
|
||||
domain_system_change_exemption($1)
|
||||
role_transition $2 firewalld_initrc_exec_t system_r;
|
||||
allow $2 system_r;
|
||||
@@ -97,6 +143,9 @@ interface(`firewalld_admin',`
|
||||
@@ -97,6 +162,9 @@ interface(`firewalld_admin',`
|
||||
logging_search_logs($1)
|
||||
admin_pattern($1, firewalld_var_log_t)
|
||||
|
||||
@ -28407,7 +28427,7 @@ index c62c567..6460877 100644
|
||||
+ allow $1 firewalld_unit_file_t:service all_service_perms;
|
||||
')
|
||||
diff --git a/firewalld.te b/firewalld.te
|
||||
index 98072a3..1b550dd 100644
|
||||
index 98072a3..d5d852e 100644
|
||||
--- a/firewalld.te
|
||||
+++ b/firewalld.te
|
||||
@@ -21,9 +21,15 @@ logging_log_file(firewalld_var_log_t)
|
||||
@ -28435,7 +28455,7 @@ index 98072a3..1b550dd 100644
|
||||
|
||||
allow firewalld_t firewalld_var_log_t:file append_file_perms;
|
||||
allow firewalld_t firewalld_var_log_t:file create_file_perms;
|
||||
@@ -48,8 +56,13 @@ manage_files_pattern(firewalld_t, firewalld_tmp_t, firewalld_tmp_t)
|
||||
@@ -48,8 +56,14 @@ manage_files_pattern(firewalld_t, firewalld_tmp_t, firewalld_tmp_t)
|
||||
files_tmp_filetrans(firewalld_t, firewalld_tmp_t, file)
|
||||
allow firewalld_t firewalld_tmp_t:file mmap_file_perms;
|
||||
|
||||
@ -28444,12 +28464,14 @@ index 98072a3..1b550dd 100644
|
||||
+allow firewalld_t firewalld_tmpfs_t:file mmap_file_perms;
|
||||
+
|
||||
manage_files_pattern(firewalld_t, firewalld_var_run_t, firewalld_var_run_t)
|
||||
files_pid_filetrans(firewalld_t, firewalld_var_run_t, file)
|
||||
-files_pid_filetrans(firewalld_t, firewalld_var_run_t, file)
|
||||
+manage_dirs_pattern(firewalld_t, firewalld_var_run_t, firewalld_var_run_t)
|
||||
+files_pid_filetrans(firewalld_t, firewalld_var_run_t, { file dir })
|
||||
+can_exec(firewalld_t, firewalld_var_run_t)
|
||||
|
||||
kernel_read_network_state(firewalld_t)
|
||||
kernel_read_system_state(firewalld_t)
|
||||
@@ -63,20 +76,19 @@ dev_search_sysfs(firewalld_t)
|
||||
@@ -63,20 +77,19 @@ dev_search_sysfs(firewalld_t)
|
||||
|
||||
domain_use_interactive_fds(firewalld_t)
|
||||
|
||||
@ -28476,7 +28498,7 @@ index 98072a3..1b550dd 100644
|
||||
|
||||
optional_policy(`
|
||||
dbus_system_domain(firewalld_t, firewalld_exec_t)
|
||||
@@ -95,6 +107,10 @@ optional_policy(`
|
||||
@@ -95,6 +108,10 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -99807,7 +99829,7 @@ index 1499b0b..6950cab 100644
|
||||
- spamassassin_role($2, $1)
|
||||
')
|
||||
diff --git a/spamassassin.te b/spamassassin.te
|
||||
index cc58e35..2794505 100644
|
||||
index cc58e35..d20d0ed 100644
|
||||
--- a/spamassassin.te
|
||||
+++ b/spamassassin.te
|
||||
@@ -7,50 +7,23 @@ policy_module(spamassassin, 2.6.1)
|
||||
@ -100351,7 +100373,7 @@ index cc58e35..2794505 100644
|
||||
corenet_all_recvfrom_netlabel(spamd_t)
|
||||
corenet_tcp_sendrecv_generic_if(spamd_t)
|
||||
corenet_udp_sendrecv_generic_if(spamd_t)
|
||||
@@ -331,78 +450,59 @@ corenet_udp_sendrecv_generic_node(spamd_t)
|
||||
@@ -331,78 +450,60 @@ corenet_udp_sendrecv_generic_node(spamd_t)
|
||||
corenet_tcp_sendrecv_all_ports(spamd_t)
|
||||
corenet_udp_sendrecv_all_ports(spamd_t)
|
||||
corenet_tcp_bind_generic_node(spamd_t)
|
||||
@ -100361,6 +100383,7 @@ index cc58e35..2794505 100644
|
||||
corenet_tcp_bind_spamd_port(spamd_t)
|
||||
-
|
||||
-corenet_sendrecv_razor_client_packets(spamd_t)
|
||||
+corenet_tcp_connect_all_unreserved_ports(spamd_t)
|
||||
+corenet_tcp_connect_spamd_port(spamd_t)
|
||||
corenet_tcp_connect_razor_port(spamd_t)
|
||||
-
|
||||
@ -100455,7 +100478,7 @@ index cc58e35..2794505 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -421,21 +521,13 @@ optional_policy(`
|
||||
@@ -421,21 +522,13 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -100479,7 +100502,7 @@ index cc58e35..2794505 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -443,8 +535,8 @@ optional_policy(`
|
||||
@@ -443,8 +536,8 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -100489,7 +100512,7 @@ index cc58e35..2794505 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -455,7 +547,17 @@ optional_policy(`
|
||||
@@ -455,7 +548,17 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
razor_domtrans(spamd_t)
|
||||
razor_read_lib_files(spamd_t)
|
||||
@ -100508,7 +100531,7 @@ index cc58e35..2794505 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -463,9 +565,9 @@ optional_policy(`
|
||||
@@ -463,9 +566,9 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -100519,7 +100542,7 @@ index cc58e35..2794505 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -474,32 +576,32 @@ optional_policy(`
|
||||
@@ -474,32 +577,32 @@ optional_policy(`
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -100562,7 +100585,7 @@ index cc58e35..2794505 100644
|
||||
|
||||
corecmd_exec_bin(spamd_update_t)
|
||||
corecmd_exec_shell(spamd_update_t)
|
||||
@@ -508,25 +610,21 @@ dev_read_urand(spamd_update_t)
|
||||
@@ -508,25 +611,21 @@ dev_read_urand(spamd_update_t)
|
||||
|
||||
domain_use_interactive_fds(spamd_update_t)
|
||||
|
||||
|
@ -19,7 +19,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 3.13.1
|
||||
Release: 163%{?dist}
|
||||
Release: 164%{?dist}
|
||||
License: GPLv2+
|
||||
Group: System Environment/Base
|
||||
Source: serefpolicy-%{version}.tgz
|
||||
@ -664,6 +664,15 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Tue Dec 15 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-164
|
||||
- Allow firewalld to create firewalld_var_run_t directory. BZ(1291243)
|
||||
- Add interface firewalld_read_pid_files()
|
||||
- Allow iptables to read firewalld pid files. BZ(1291243)
|
||||
- Allow the user cronjobs to run in their userdomain
|
||||
- Label ssdm binaries storedin /etc/sddm/ as bin_t. BZ(1288111)
|
||||
- Merge pull request #81 from rhatdan/rawhide-base
|
||||
- New access needed by systemd domains
|
||||
|
||||
* Wed Dec 09 2015 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-163
|
||||
- Allow whack executed by sysadm SELinux user to access /var/run/pluto/pluto.ctl. It fixes "ipsec auto --status" executed by sysadm_t.
|
||||
- Add ipsec_read_pid() interface
|
||||
|
Loading…
Reference in New Issue
Block a user