diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch index 32c7dd4..5dab7e5 100644 --- a/policy-rawhide-base.patch +++ b/policy-rawhide-base.patch @@ -3239,7 +3239,7 @@ index 7590165..19aaaed 100644 + fs_mounton_fusefs(seunshare_domain) +') diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc -index 644d4d7..f9bcd44 100644 +index 644d4d7..6e7dd83 100644 --- a/policy/modules/kernel/corecommands.fc +++ b/policy/modules/kernel/corecommands.fc @@ -1,9 +1,10 @@ @@ -3423,7 +3423,7 @@ index 644d4d7..f9bcd44 100644 /usr/lib/rpm/rpmq -- gen_context(system_u:object_r:bin_t,s0) /usr/lib/rpm/rpmv -- gen_context(system_u:object_r:bin_t,s0) +/usr/lib/tumbler-[^/]*/tumblerd -- gen_context(system_u:object_r:bin_t,s0) -+/usr/lib/security/pam_krb5/pam_krb5_storetmp -- gen_context(system_u:object_r:bin_t,s0) ++/usr/lib/security/pam_krb5(/.*)? -- gen_context(system_u:object_r:bin_t,s0) /usr/lib/sftp-server -- gen_context(system_u:object_r:bin_t,s0) -/usr/lib/vte/gnome-pty-helper -- gen_context(system_u:object_r:bin_t,s0) +/usr/lib/systemd/system-sleep(/.*)? gen_context(system_u:object_r:bin_t,s0) @@ -27646,7 +27646,7 @@ index 24e7804..c4155c7 100644 + files_etc_filetrans($1, machineid_t, file, "machine-id" ) +') diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te -index dd3be8d..729cc4f 100644 +index dd3be8d..c56175f 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -11,10 +11,24 @@ gen_require(` @@ -27735,16 +27735,7 @@ index dd3be8d..729cc4f 100644 type initrc_exec_t, init_script_file_type; domain_type(initrc_t) domain_entry_file(initrc_t, initrc_exec_t) -@@ -66,6 +99,8 @@ role system_r types initrc_t; - # of the below init_upstart tunable - # but this has a typeattribute in it - corecmd_shell_entry_type(initrc_t) -+corecmd_bin_entry_type(initrc_t) -+corecmd_bin_domtrans(init_t, initrc_t) - - type initrc_devpts_t; - term_pty(initrc_devpts_t) -@@ -98,7 +133,8 @@ ifdef(`enable_mls',` +@@ -98,7 +131,8 @@ ifdef(`enable_mls',` # # Use capabilities. old rule: @@ -27754,7 +27745,7 @@ index dd3be8d..729cc4f 100644 # is ~sys_module really needed? observed: # sys_boot # sys_tty_config -@@ -110,12 +146,33 @@ allow init_t self:fifo_file rw_fifo_file_perms; +@@ -110,12 +144,33 @@ allow init_t self:fifo_file rw_fifo_file_perms; # Re-exec itself can_exec(init_t, init_exec_t) @@ -27794,7 +27785,7 @@ index dd3be8d..729cc4f 100644 allow init_t initctl_t:fifo_file manage_fifo_file_perms; dev_filetrans(init_t, initctl_t, fifo_file) -@@ -125,13 +182,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr }; +@@ -125,13 +180,17 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr }; kernel_read_system_state(init_t) kernel_share_state(init_t) @@ -27813,7 +27804,7 @@ index dd3be8d..729cc4f 100644 domain_getpgid_all_domains(init_t) domain_kill_all_domains(init_t) -@@ -139,14 +200,20 @@ domain_signal_all_domains(init_t) +@@ -139,14 +198,20 @@ domain_signal_all_domains(init_t) domain_signull_all_domains(init_t) domain_sigstop_all_domains(init_t) domain_sigchld_all_domains(init_t) @@ -27834,7 +27825,7 @@ index dd3be8d..729cc4f 100644 # file descriptors inherited from the rootfs: files_dontaudit_rw_root_files(init_t) files_dontaudit_rw_root_chr_files(init_t) -@@ -156,28 +223,49 @@ fs_list_inotifyfs(init_t) +@@ -156,28 +221,49 @@ fs_list_inotifyfs(init_t) fs_write_ramfs_sockets(init_t) mcs_process_set_categories(init_t) @@ -27887,7 +27878,7 @@ index dd3be8d..729cc4f 100644 ifdef(`distro_gentoo',` allow init_t self:process { getcap setcap }; -@@ -186,29 +274,186 @@ ifdef(`distro_gentoo',` +@@ -186,29 +272,187 @@ ifdef(`distro_gentoo',` ') ifdef(`distro_redhat',` @@ -28051,6 +28042,7 @@ index dd3be8d..729cc4f 100644 + +auth_use_nsswitch(init_t) +auth_rw_login_records(init_t) ++auth_domtrans_chk_passwd(init_t) + +optional_policy(` + lvm_rw_pipes(init_t) @@ -28082,7 +28074,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -216,7 +461,29 @@ optional_policy(` +@@ -216,7 +460,29 @@ optional_policy(` ') optional_policy(` @@ -28112,7 +28104,7 @@ index dd3be8d..729cc4f 100644 ') ######################################## -@@ -225,8 +492,9 @@ optional_policy(` +@@ -225,8 +491,9 @@ optional_policy(` # allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched }; @@ -28124,7 +28116,7 @@ index dd3be8d..729cc4f 100644 allow initrc_t self:passwd rootok; allow initrc_t self:key manage_key_perms; -@@ -257,12 +525,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t) +@@ -257,12 +524,16 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t) allow initrc_t initrc_var_run_t:file manage_file_perms; files_pid_filetrans(initrc_t, initrc_var_run_t, file) @@ -28141,7 +28133,7 @@ index dd3be8d..729cc4f 100644 manage_dirs_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t) manage_files_pattern(initrc_t, initrc_var_log_t, initrc_var_log_t) -@@ -278,23 +550,36 @@ kernel_change_ring_buffer_level(initrc_t) +@@ -278,23 +549,36 @@ kernel_change_ring_buffer_level(initrc_t) kernel_clear_ring_buffer(initrc_t) kernel_get_sysvipc_info(initrc_t) kernel_read_all_sysctls(initrc_t) @@ -28184,7 +28176,7 @@ index dd3be8d..729cc4f 100644 corenet_tcp_sendrecv_all_ports(initrc_t) corenet_udp_sendrecv_all_ports(initrc_t) corenet_tcp_connect_all_ports(initrc_t) -@@ -302,9 +587,11 @@ corenet_sendrecv_all_client_packets(initrc_t) +@@ -302,9 +586,11 @@ corenet_sendrecv_all_client_packets(initrc_t) dev_read_rand(initrc_t) dev_read_urand(initrc_t) @@ -28196,7 +28188,7 @@ index dd3be8d..729cc4f 100644 dev_rw_sysfs(initrc_t) dev_list_usbfs(initrc_t) dev_read_framebuffer(initrc_t) -@@ -312,8 +599,10 @@ dev_write_framebuffer(initrc_t) +@@ -312,8 +598,10 @@ dev_write_framebuffer(initrc_t) dev_read_realtime_clock(initrc_t) dev_read_sound_mixer(initrc_t) dev_write_sound_mixer(initrc_t) @@ -28207,7 +28199,7 @@ index dd3be8d..729cc4f 100644 dev_delete_lvm_control_dev(initrc_t) dev_manage_generic_symlinks(initrc_t) dev_manage_generic_files(initrc_t) -@@ -321,8 +610,7 @@ dev_manage_generic_files(initrc_t) +@@ -321,8 +609,7 @@ dev_manage_generic_files(initrc_t) dev_delete_generic_symlinks(initrc_t) dev_getattr_all_blk_files(initrc_t) dev_getattr_all_chr_files(initrc_t) @@ -28217,7 +28209,7 @@ index dd3be8d..729cc4f 100644 domain_kill_all_domains(initrc_t) domain_signal_all_domains(initrc_t) -@@ -331,7 +619,6 @@ domain_sigstop_all_domains(initrc_t) +@@ -331,7 +618,6 @@ domain_sigstop_all_domains(initrc_t) domain_sigchld_all_domains(initrc_t) domain_read_all_domains_state(initrc_t) domain_getattr_all_domains(initrc_t) @@ -28225,7 +28217,7 @@ index dd3be8d..729cc4f 100644 domain_getsession_all_domains(initrc_t) domain_use_interactive_fds(initrc_t) # for lsof which is used by alsa shutdown: -@@ -339,6 +626,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t) +@@ -339,6 +625,7 @@ domain_dontaudit_getattr_all_udp_sockets(initrc_t) domain_dontaudit_getattr_all_tcp_sockets(initrc_t) domain_dontaudit_getattr_all_dgram_sockets(initrc_t) domain_dontaudit_getattr_all_pipes(initrc_t) @@ -28233,7 +28225,7 @@ index dd3be8d..729cc4f 100644 files_getattr_all_dirs(initrc_t) files_getattr_all_files(initrc_t) -@@ -346,14 +634,15 @@ files_getattr_all_symlinks(initrc_t) +@@ -346,14 +633,15 @@ files_getattr_all_symlinks(initrc_t) files_getattr_all_pipes(initrc_t) files_getattr_all_sockets(initrc_t) files_purge_tmp(initrc_t) @@ -28251,7 +28243,7 @@ index dd3be8d..729cc4f 100644 files_read_usr_files(initrc_t) files_manage_urandom_seed(initrc_t) files_manage_generic_spool(initrc_t) -@@ -363,8 +652,12 @@ files_list_isid_type_dirs(initrc_t) +@@ -363,8 +651,12 @@ files_list_isid_type_dirs(initrc_t) files_mounton_isid_type_dirs(initrc_t) files_list_default(initrc_t) files_mounton_default(initrc_t) @@ -28265,7 +28257,7 @@ index dd3be8d..729cc4f 100644 fs_list_inotifyfs(initrc_t) fs_register_binary_executable_type(initrc_t) # rhgb-console writes to ramfs -@@ -374,10 +667,11 @@ fs_mount_all_fs(initrc_t) +@@ -374,10 +666,11 @@ fs_mount_all_fs(initrc_t) fs_unmount_all_fs(initrc_t) fs_remount_all_fs(initrc_t) fs_getattr_all_fs(initrc_t) @@ -28279,7 +28271,7 @@ index dd3be8d..729cc4f 100644 mcs_process_set_categories(initrc_t) mls_file_read_all_levels(initrc_t) -@@ -386,6 +680,7 @@ mls_process_read_up(initrc_t) +@@ -386,6 +679,7 @@ mls_process_read_up(initrc_t) mls_process_write_down(initrc_t) mls_rangetrans_source(initrc_t) mls_fd_share_all_levels(initrc_t) @@ -28287,7 +28279,7 @@ index dd3be8d..729cc4f 100644 selinux_get_enforce_mode(initrc_t) -@@ -397,6 +692,7 @@ term_use_all_terms(initrc_t) +@@ -397,6 +691,7 @@ term_use_all_terms(initrc_t) term_reset_tty_labels(initrc_t) auth_rw_login_records(initrc_t) @@ -28295,7 +28287,7 @@ index dd3be8d..729cc4f 100644 auth_setattr_login_records(initrc_t) auth_rw_lastlog(initrc_t) auth_read_pam_pid(initrc_t) -@@ -415,20 +711,18 @@ logging_read_all_logs(initrc_t) +@@ -415,20 +710,18 @@ logging_read_all_logs(initrc_t) logging_append_all_logs(initrc_t) logging_read_audit_config(initrc_t) @@ -28319,7 +28311,7 @@ index dd3be8d..729cc4f 100644 ifdef(`distro_debian',` dev_setattr_generic_dirs(initrc_t) -@@ -450,7 +744,6 @@ ifdef(`distro_gentoo',` +@@ -450,7 +743,6 @@ ifdef(`distro_gentoo',` allow initrc_t self:process setfscreate; dev_create_null_dev(initrc_t) dev_create_zero_dev(initrc_t) @@ -28327,7 +28319,7 @@ index dd3be8d..729cc4f 100644 term_create_console_dev(initrc_t) # unfortunately /sbin/rc does stupid tricks -@@ -485,6 +778,10 @@ ifdef(`distro_gentoo',` +@@ -485,6 +777,10 @@ ifdef(`distro_gentoo',` sysnet_setattr_config(initrc_t) optional_policy(` @@ -28338,7 +28330,7 @@ index dd3be8d..729cc4f 100644 alsa_read_lib(initrc_t) ') -@@ -505,7 +802,7 @@ ifdef(`distro_redhat',` +@@ -505,7 +801,7 @@ ifdef(`distro_redhat',` # Red Hat systems seem to have a stray # fd open from the initrd @@ -28347,7 +28339,7 @@ index dd3be8d..729cc4f 100644 files_dontaudit_read_root_files(initrc_t) # These seem to be from the initrd -@@ -520,6 +817,7 @@ ifdef(`distro_redhat',` +@@ -520,6 +816,7 @@ ifdef(`distro_redhat',` files_create_boot_dirs(initrc_t) files_create_boot_flag(initrc_t) files_rw_boot_symlinks(initrc_t) @@ -28355,7 +28347,7 @@ index dd3be8d..729cc4f 100644 # wants to read /.fonts directory files_read_default_files(initrc_t) files_mountpoint(initrc_tmp_t) -@@ -540,6 +838,7 @@ ifdef(`distro_redhat',` +@@ -540,6 +837,7 @@ ifdef(`distro_redhat',` miscfiles_rw_localization(initrc_t) miscfiles_setattr_localization(initrc_t) miscfiles_relabel_localization(initrc_t) @@ -28363,7 +28355,7 @@ index dd3be8d..729cc4f 100644 miscfiles_read_fonts(initrc_t) miscfiles_read_hwdata(initrc_t) -@@ -549,8 +848,44 @@ ifdef(`distro_redhat',` +@@ -549,8 +847,44 @@ ifdef(`distro_redhat',` ') optional_policy(` @@ -28408,7 +28400,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -558,14 +893,31 @@ ifdef(`distro_redhat',` +@@ -558,14 +892,31 @@ ifdef(`distro_redhat',` rpc_write_exports(initrc_t) rpc_manage_nfs_state_data(initrc_t) ') @@ -28440,7 +28432,7 @@ index dd3be8d..729cc4f 100644 ') ') -@@ -576,6 +928,39 @@ ifdef(`distro_suse',` +@@ -576,6 +927,39 @@ ifdef(`distro_suse',` ') ') @@ -28480,7 +28472,7 @@ index dd3be8d..729cc4f 100644 optional_policy(` amavis_search_lib(initrc_t) amavis_setattr_pid_files(initrc_t) -@@ -588,6 +973,8 @@ optional_policy(` +@@ -588,6 +972,8 @@ optional_policy(` optional_policy(` apache_read_config(initrc_t) apache_list_modules(initrc_t) @@ -28489,7 +28481,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -609,6 +996,7 @@ optional_policy(` +@@ -609,6 +995,7 @@ optional_policy(` optional_policy(` cgroup_stream_connect_cgred(initrc_t) @@ -28497,7 +28489,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -625,6 +1013,17 @@ optional_policy(` +@@ -625,6 +1012,17 @@ optional_policy(` ') optional_policy(` @@ -28515,7 +28507,7 @@ index dd3be8d..729cc4f 100644 dev_getattr_printer_dev(initrc_t) cups_read_log(initrc_t) -@@ -641,9 +1040,13 @@ optional_policy(` +@@ -641,9 +1039,13 @@ optional_policy(` dbus_connect_system_bus(initrc_t) dbus_system_bus_client(initrc_t) dbus_read_config(initrc_t) @@ -28529,7 +28521,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -656,15 +1059,11 @@ optional_policy(` +@@ -656,15 +1058,11 @@ optional_policy(` ') optional_policy(` @@ -28547,7 +28539,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -685,6 +1084,15 @@ optional_policy(` +@@ -685,6 +1083,15 @@ optional_policy(` ') optional_policy(` @@ -28563,7 +28555,7 @@ index dd3be8d..729cc4f 100644 inn_exec_config(initrc_t) ') -@@ -725,6 +1133,7 @@ optional_policy(` +@@ -725,6 +1132,7 @@ optional_policy(` lpd_list_spool(initrc_t) lpd_read_config(initrc_t) @@ -28571,7 +28563,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -742,7 +1151,13 @@ optional_policy(` +@@ -742,7 +1150,13 @@ optional_policy(` ') optional_policy(` @@ -28586,7 +28578,7 @@ index dd3be8d..729cc4f 100644 mta_dontaudit_read_spool_symlinks(initrc_t) ') -@@ -765,6 +1180,10 @@ optional_policy(` +@@ -765,6 +1179,10 @@ optional_policy(` ') optional_policy(` @@ -28597,7 +28589,7 @@ index dd3be8d..729cc4f 100644 postgresql_manage_db(initrc_t) postgresql_read_config(initrc_t) ') -@@ -774,10 +1193,20 @@ optional_policy(` +@@ -774,10 +1192,20 @@ optional_policy(` ') optional_policy(` @@ -28618,7 +28610,7 @@ index dd3be8d..729cc4f 100644 quota_manage_flags(initrc_t) ') -@@ -786,6 +1215,10 @@ optional_policy(` +@@ -786,6 +1214,10 @@ optional_policy(` ') optional_policy(` @@ -28629,7 +28621,7 @@ index dd3be8d..729cc4f 100644 fs_write_ramfs_sockets(initrc_t) fs_search_ramfs(initrc_t) -@@ -807,8 +1240,6 @@ optional_policy(` +@@ -807,8 +1239,6 @@ optional_policy(` # bash tries ioctl for some reason files_dontaudit_ioctl_all_pids(initrc_t) @@ -28638,7 +28630,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -817,6 +1248,10 @@ optional_policy(` +@@ -817,6 +1247,10 @@ optional_policy(` ') optional_policy(` @@ -28649,7 +28641,7 @@ index dd3be8d..729cc4f 100644 # shorewall-init script run /var/lib/shorewall/firewall shorewall_lib_domtrans(initrc_t) ') -@@ -826,10 +1261,12 @@ optional_policy(` +@@ -826,10 +1260,12 @@ optional_policy(` squid_manage_logs(initrc_t) ') @@ -28662,7 +28654,7 @@ index dd3be8d..729cc4f 100644 optional_policy(` ssh_dontaudit_read_server_keys(initrc_t) -@@ -856,12 +1293,28 @@ optional_policy(` +@@ -856,12 +1292,28 @@ optional_policy(` ') optional_policy(` @@ -28692,7 +28684,7 @@ index dd3be8d..729cc4f 100644 ifdef(`distro_redhat',` # system-config-services causes avc messages that should be dontaudited -@@ -871,6 +1324,18 @@ optional_policy(` +@@ -871,6 +1323,18 @@ optional_policy(` optional_policy(` mono_domtrans(initrc_t) ') @@ -28711,7 +28703,7 @@ index dd3be8d..729cc4f 100644 ') optional_policy(` -@@ -886,6 +1351,10 @@ optional_policy(` +@@ -886,6 +1350,10 @@ optional_policy(` ') optional_policy(` @@ -28722,7 +28714,7 @@ index dd3be8d..729cc4f 100644 # Set device ownerships/modes. xserver_setattr_console_pipes(initrc_t) -@@ -896,3 +1365,196 @@ optional_policy(` +@@ -896,3 +1364,196 @@ optional_policy(` optional_policy(` zebra_read_config(initrc_t) ') diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch index bcccef1..f479fe8 100644 --- a/policy-rawhide-contrib.patch +++ b/policy-rawhide-contrib.patch @@ -2957,10 +2957,10 @@ index 0000000..fd48ed9 + spamassassin_read_pid_files(antivirus_domain) +') diff --git a/apache.fc b/apache.fc -index 550a69e..53e5708 100644 +index 550a69e..842225c 100644 --- a/apache.fc +++ b/apache.fc -@@ -1,161 +1,196 @@ +@@ -1,161 +1,199 @@ -HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0) -HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0) +HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0) @@ -3024,6 +3024,7 @@ index 550a69e..53e5708 100644 -/usr/.*\.cgi -- gen_context(system_u:object_r:httpd_sys_script_exec_t,s0) +/srv/([^/]*/)?www(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0) ++/srv/([^/]*/)?www/logs(/.*)? gen_context(system_u:object_r:httpd_log_t,s0) +/srv/gallery2(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0) -/usr/bin/htsslpass -- gen_context(system_u:object_r:httpd_helper_exec_t,s0) @@ -3166,6 +3167,8 @@ index 550a69e..53e5708 100644 +/var/lib/mod_security(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0) +/var/lib/nginx(/.*)? gen_context(system_u:object_r:httpd_var_lib_t,s0) +/var/lib/php/session(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0) ++/var/lib/php/wsdlcache(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0) ++ /var/lib/squirrelmail/prefs(/.*)? gen_context(system_u:object_r:httpd_squirrelmail_t,s0) -/var/lib/stickshift/.httpd.d(/.*)? gen_context(system_u:object_r:httpd_config_t,s0) -/var/lib/svn(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) @@ -3230,6 +3233,7 @@ index 550a69e..53e5708 100644 +/var/www/[^/]*/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0) +/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0) +/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0) ++/var/www/miq/vmdb/log(/.*)? gen_context(system_u:object_r:httpd_log_t,s0) +/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0) -/var/run/apache.* gen_context(system_u:object_r:httpd_var_run_t,s0) @@ -3292,7 +3296,6 @@ index 550a69e..53e5708 100644 +/var/www/svn/conf(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0) + +/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0) -+ +/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0) +/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0) diff --git a/apache.if b/apache.if @@ -10778,10 +10781,10 @@ index 0000000..5977d96 +') diff --git a/chrome.te b/chrome.te new file mode 100644 -index 0000000..25f2d55 +index 0000000..406f3a0 --- /dev/null +++ b/chrome.te -@@ -0,0 +1,238 @@ +@@ -0,0 +1,242 @@ +policy_module(chrome,1.0.0) + +######################################## @@ -10958,6 +10961,10 @@ index 0000000..25f2d55 +') + +optional_policy(` ++ cups_stream_connect(chrome_sandbox_t) ++') ++ ++optional_policy(` + sandbox_use_ptys(chrome_sandbox_t) +') + @@ -23744,7 +23751,7 @@ index c3f7916..cab3954 100644 admin_pattern($1, fetchmail_etc_t) diff --git a/fetchmail.te b/fetchmail.te -index f0388cb..8e7f99e 100644 +index f0388cb..2e94f0e 100644 --- a/fetchmail.te +++ b/fetchmail.te @@ -32,15 +32,13 @@ files_type(fetchmail_uidl_cache_t) @@ -23786,7 +23793,7 @@ index f0388cb..8e7f99e 100644 corenet_all_recvfrom_netlabel(fetchmail_t) corenet_tcp_sendrecv_generic_if(fetchmail_t) corenet_tcp_sendrecv_generic_node(fetchmail_t) -@@ -84,15 +86,19 @@ fs_search_auto_mountpoints(fetchmail_t) +@@ -84,15 +86,23 @@ fs_search_auto_mountpoints(fetchmail_t) domain_use_interactive_fds(fetchmail_t) @@ -23804,6 +23811,10 @@ index f0388cb..8e7f99e 100644 -userdom_search_user_home_dirs(fetchmail_t) + +optional_policy(` ++ mta_send_mail(fetchmail_t) ++') ++ ++optional_policy(` + kerberos_use(fetchmail_t) +') @@ -30375,7 +30386,7 @@ index ac00fb0..36ef2e5 100644 + userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs") ') diff --git a/irc.te b/irc.te -index ecad9c7..86d790f 100644 +index ecad9c7..e413e5a 100644 --- a/irc.te +++ b/irc.te @@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t @@ -30449,7 +30460,7 @@ index ecad9c7..86d790f 100644 fs_getattr_all_fs(irc_t) fs_search_auto_mountpoints(irc_t) -@@ -106,13 +120,15 @@ auth_use_nsswitch(irc_t) +@@ -106,15 +120,18 @@ auth_use_nsswitch(irc_t) init_read_utmp(irc_t) init_dontaudit_lock_utmp(irc_t) @@ -30466,8 +30477,11 @@ index ecad9c7..86d790f 100644 +userdom_use_inherited_user_terminals(irc_t) tunable_policy(`irc_use_any_tcp_ports',` ++ allow irc_t self:tcp_socket create_stream_socket_perms; corenet_sendrecv_all_server_packets(irc_t) -@@ -122,18 +138,71 @@ tunable_policy(`irc_use_any_tcp_ports',` + corenet_tcp_bind_all_unreserved_ports(irc_t) + corenet_sendrecv_all_client_packets(irc_t) +@@ -122,18 +139,71 @@ tunable_policy(`irc_use_any_tcp_ports',` corenet_tcp_sendrecv_all_ports(irc_t) ') @@ -39971,7 +39985,7 @@ index 6194b80..bb32d40 100644 ') + diff --git a/mozilla.te b/mozilla.te -index 6a306ee..2108bc7 100644 +index 6a306ee..a74ab9d 100644 --- a/mozilla.te +++ b/mozilla.te @@ -1,4 +1,4 @@ @@ -40242,11 +40256,11 @@ index 6a306ee..2108bc7 100644 miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t) -userdom_use_user_ptys(mozilla_t) -+userdom_use_inherited_user_ptys(mozilla_t) - +- -userdom_manage_user_tmp_dirs(mozilla_t) -userdom_manage_user_tmp_files(mozilla_t) -- ++userdom_use_inherited_user_ptys(mozilla_t) + -userdom_manage_user_home_content_dirs(mozilla_t) -userdom_manage_user_home_content_files(mozilla_t) -userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file }) @@ -40415,7 +40429,7 @@ index 6a306ee..2108bc7 100644 ') optional_policy(` -@@ -300,221 +324,184 @@ optional_policy(` +@@ -300,259 +324,234 @@ optional_policy(` ######################################## # @@ -40498,12 +40512,12 @@ index 6a306ee..2108bc7 100644 allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms; -allow mozilla_plugin_t mozilla_plugin_rw_t:file read_file_perms; -allow mozilla_plugin_t mozilla_plugin_rw_t:lnk_file read_lnk_file_perms; -- --dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t) --stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t) +read_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t) +read_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t) +-dgram_send_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t) +-stream_connect_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_t) +- -can_exec(mozilla_plugin_t, { mozilla_exec_t mozilla_plugin_home_t mozilla_plugin_tmp_t }) +can_exec(mozilla_plugin_t, mozilla_exec_t) @@ -40673,12 +40687,12 @@ index 6a306ee..2108bc7 100644 -userdom_manage_user_tmp_dirs(mozilla_plugin_t) -userdom_manage_user_tmp_files(mozilla_plugin_t) -- ++systemd_read_logind_sessions_files(mozilla_plugin_t) + -userdom_manage_user_home_content_dirs(mozilla_plugin_t) -userdom_manage_user_home_content_files(mozilla_plugin_t) -userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file }) -+systemd_read_logind_sessions_files(mozilla_plugin_t) - +- -userdom_write_user_tmp_sockets(mozilla_plugin_t) +term_getattr_all_ttys(mozilla_plugin_t) +term_getattr_all_ptys(mozilla_plugin_t) @@ -40702,14 +40716,22 @@ index 6a306ee..2108bc7 100644 -ifndef(`enable_mls',` - fs_list_dos(mozilla_plugin_t) - fs_read_dos_files(mozilla_plugin_t) -- ++userdom_read_user_home_content_files(mozilla_plugin_t) ++userdom_read_user_home_content_symlinks(mozilla_plugin_t) ++userdom_read_home_certs(mozilla_plugin_t) ++userdom_read_home_audio_files(mozilla_plugin_t) ++userdom_exec_user_tmp_files(mozilla_plugin_t) + - fs_search_removable(mozilla_plugin_t) - fs_read_removable_files(mozilla_plugin_t) - fs_read_removable_symlinks(mozilla_plugin_t) -- ++userdom_home_manager(mozilla_plugin_t) + - fs_read_iso9660_files(mozilla_plugin_t) --') -- ++tunable_policy(`mozilla_plugin_can_network_connect',` ++ corenet_tcp_connect_all_ports(mozilla_plugin_t) + ') + -tunable_policy(`allow_execmem',` - allow mozilla_plugin_t self:process execmem; -') @@ -40717,43 +40739,46 @@ index 6a306ee..2108bc7 100644 -tunable_policy(`mozilla_execstack',` - allow mozilla_plugin_t self:process { execmem execstack }; -') -+userdom_read_user_home_content_files(mozilla_plugin_t) -+userdom_read_user_home_content_symlinks(mozilla_plugin_t) -+userdom_read_home_certs(mozilla_plugin_t) -+userdom_read_home_audio_files(mozilla_plugin_t) -+userdom_exec_user_tmp_files(mozilla_plugin_t) - +- -tunable_policy(`use_nfs_home_dirs',` - fs_manage_nfs_dirs(mozilla_plugin_t) - fs_manage_nfs_files(mozilla_plugin_t) - fs_manage_nfs_symlinks(mozilla_plugin_t) --') -+userdom_home_manager(mozilla_plugin_t) ++optional_policy(` ++ alsa_read_rw_config(mozilla_plugin_t) ++ alsa_read_home_files(mozilla_plugin_t) + ') -tunable_policy(`use_samba_home_dirs',` - fs_manage_cifs_dirs(mozilla_plugin_t) - fs_manage_cifs_files(mozilla_plugin_t) - fs_manage_cifs_symlinks(mozilla_plugin_t) -+tunable_policy(`mozilla_plugin_can_network_connect',` -+ corenet_tcp_connect_all_ports(mozilla_plugin_t) ++optional_policy(` ++ apache_list_modules(mozilla_plugin_t) ') optional_policy(` -@@ -523,36 +510,44 @@ optional_policy(` +- alsa_read_rw_config(mozilla_plugin_t) +- alsa_read_home_files(mozilla_plugin_t) ++ cups_stream_connect(mozilla_plugin_t) ') optional_policy(` - automount_dontaudit_getattr_tmp_dirs(mozilla_plugin_t) -+ apache_list_modules(mozilla_plugin_t) ++ dbus_system_bus_client(mozilla_plugin_t) ++ dbus_session_bus_client(mozilla_plugin_t) ++ dbus_connect_session_bus(mozilla_plugin_t) ++ dbus_read_lib_files(mozilla_plugin_t) ') optional_policy(` - dbus_all_session_bus_client(mozilla_plugin_t) - dbus_connect_all_session_bus(mozilla_plugin_t) - dbus_system_bus_client(mozilla_plugin_t) -+ dbus_session_bus_client(mozilla_plugin_t) -+ dbus_connect_session_bus(mozilla_plugin_t) -+ dbus_read_lib_files(mozilla_plugin_t) +- dbus_system_bus_client(mozilla_plugin_t) ++ gnome_manage_config(mozilla_plugin_t) ++ gnome_read_usr_config(mozilla_plugin_t) ++ gnome_filetrans_home_content(mozilla_plugin_t) ++ gnome_exec_gstreamer_home_files(mozilla_plugin_t) ') optional_policy(` @@ -40761,13 +40786,6 @@ index 6a306ee..2108bc7 100644 - gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome") - gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2") - gnome_home_filetrans_gnome_home(mozilla_plugin_t, dir, ".gnome2_private") -+ gnome_manage_config(mozilla_plugin_t) -+ gnome_read_usr_config(mozilla_plugin_t) -+ gnome_filetrans_home_content(mozilla_plugin_t) -+ gnome_exec_gstreamer_home_files(mozilla_plugin_t) -+') -+ -+optional_policy(` + gpm_dontaudit_getattr_gpmctl(mozilla_plugin_t) ') @@ -40797,7 +40815,7 @@ index 6a306ee..2108bc7 100644 ') optional_policy(` -@@ -560,7 +555,7 @@ optional_policy(` +@@ -560,7 +559,7 @@ optional_policy(` ') optional_policy(` @@ -40806,7 +40824,7 @@ index 6a306ee..2108bc7 100644 ') optional_policy(` -@@ -568,108 +563,128 @@ optional_policy(` +@@ -568,108 +567,128 @@ optional_policy(` ') optional_policy(` @@ -40993,10 +41011,16 @@ index 6a306ee..2108bc7 100644 + fs_manage_dos_files(mozilla_plugin_t) ') diff --git a/mpd.fc b/mpd.fc -index 313ce52..6aa46d2 100644 +index 313ce52..ae93e07 100644 --- a/mpd.fc +++ b/mpd.fc -@@ -9,3 +9,5 @@ +@@ -1,3 +1,5 @@ ++HOME_DIR/\.mpd(/.*)? gen_context(system_u:object_r:mpd_home_t,s0) ++ + /etc/mpd\.conf -- gen_context(system_u:object_r:mpd_etc_t,s0) + + /etc/rc\.d/init\.d/mpd -- gen_context(system_u:object_r:mpd_initrc_exec_t,s0) +@@ -9,3 +11,5 @@ /var/lib/mpd/playlists(/.*)? gen_context(system_u:object_r:mpd_data_t,s0) /var/log/mpd(/.*)? gen_context(system_u:object_r:mpd_log_t,s0) @@ -41048,13 +41072,16 @@ index 5fa77c7..2e01c7d 100644 domain_system_change_exemption($1) role_transition $2 mpd_initrc_exec_t system_r; diff --git a/mpd.te b/mpd.te -index 7c8afcc..29d8881 100644 +index 7c8afcc..41f4352 100644 --- a/mpd.te +++ b/mpd.te -@@ -62,18 +62,22 @@ files_type(mpd_var_lib_t) +@@ -62,18 +62,25 @@ files_type(mpd_var_lib_t) type mpd_user_data_t; userdom_user_home_content(mpd_user_data_t) # customizable ++type mpd_home_t; ++userdom_user_home_content(mpd_home_t) ++ +type mpd_var_run_t; +files_pid_file(mpd_var_run_t) + @@ -41075,7 +41102,7 @@ index 7c8afcc..29d8881 100644 allow mpd_t mpd_data_t:dir manage_dir_perms; allow mpd_t mpd_data_t:file manage_file_perms; -@@ -104,13 +108,18 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t) +@@ -104,13 +111,22 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t) manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t) files_var_lib_filetrans(mpd_t, mpd_var_lib_t, dir) @@ -41085,6 +41112,10 @@ index 7c8afcc..29d8881 100644 +manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t) +files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file }) + ++manage_files_pattern(mpd_t, mpd_home_t, mpd_home_t) ++manage_dirs_pattern(mpd_t, mpd_home_t, mpd_home_t) ++manage_lnk_files_pattern(mpd_t, mpd_home_t, mpd_home_t) ++ kernel_getattr_proc(mpd_t) kernel_read_system_state(mpd_t) kernel_read_kernel_sysctls(mpd_t) @@ -41095,7 +41126,7 @@ index 7c8afcc..29d8881 100644 corenet_all_recvfrom_netlabel(mpd_t) corenet_tcp_sendrecv_generic_if(mpd_t) corenet_tcp_sendrecv_generic_node(mpd_t) -@@ -139,9 +148,9 @@ dev_read_sound(mpd_t) +@@ -139,9 +155,9 @@ dev_read_sound(mpd_t) dev_write_sound(mpd_t) dev_read_sysfs(mpd_t) @@ -41106,7 +41137,7 @@ index 7c8afcc..29d8881 100644 fs_list_inotifyfs(mpd_t) fs_rw_anon_inodefs_files(mpd_t) fs_search_auto_mountpoints(mpd_t) -@@ -150,7 +159,9 @@ auth_use_nsswitch(mpd_t) +@@ -150,7 +166,9 @@ auth_use_nsswitch(mpd_t) logging_send_syslog_msg(mpd_t) @@ -41117,7 +41148,7 @@ index 7c8afcc..29d8881 100644 tunable_policy(`mpd_enable_homedirs',` userdom_search_user_home_dirs(mpd_t) -@@ -191,7 +202,7 @@ optional_policy(` +@@ -191,7 +209,7 @@ optional_policy(` ') optional_policy(` @@ -41126,7 +41157,7 @@ index 7c8afcc..29d8881 100644 ') optional_policy(` -@@ -199,6 +210,16 @@ optional_policy(` +@@ -199,6 +217,16 @@ optional_policy(` ') optional_policy(` @@ -51833,7 +51864,7 @@ index 0000000..fdc4a03 +') diff --git a/openshift.te b/openshift.te new file mode 100644 -index 0000000..9724884 +index 0000000..55c843c --- /dev/null +++ b/openshift.te @@ -0,0 +1,549 @@ @@ -52383,7 +52414,7 @@ index 0000000..9724884 +') + +optional_policy(` -+ ssh_exec_keygen(openshift_cron_t) ++ ssh_domtrans_keygen(openshift_cron_t) + ssh_dontaudit_read_server_keys(openshift_cron_t) +') diff --git a/openvpn.fc b/openvpn.fc @@ -53732,7 +53763,7 @@ index bf59ef7..c050b37 100644 + manage_dirs_pattern($1, passenger_tmp_t, passenger_tmp_t) ') diff --git a/passenger.te b/passenger.te -index 4e114ff..6691677 100644 +index 4e114ff..1b1cb71 100644 --- a/passenger.te +++ b/passenger.te @@ -1,4 +1,4 @@ @@ -53783,7 +53814,7 @@ index 4e114ff..6691677 100644 manage_dirs_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t) manage_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t) -@@ -45,19 +50,20 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t) +@@ -45,19 +50,22 @@ manage_fifo_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t) manage_sock_files_pattern(passenger_t, passenger_var_run_t, passenger_var_run_t) files_pid_filetrans(passenger_t, passenger_var_run_t, { file dir sock_file }) @@ -53796,6 +53827,8 @@ index 4e114ff..6691677 100644 kernel_read_system_state(passenger_t) kernel_read_kernel_sysctls(passenger_t) ++kernel_read_network_state(passenger_t) ++kernel_read_net_sysctls(passenger_t) corenet_all_recvfrom_netlabel(passenger_t) -corenet_all_recvfrom_unlabeled(passenger_t) @@ -53809,7 +53842,7 @@ index 4e114ff..6691677 100644 corecmd_exec_bin(passenger_t) corecmd_exec_shell(passenger_t) -@@ -66,8 +72,6 @@ dev_read_urand(passenger_t) +@@ -66,14 +74,14 @@ dev_read_urand(passenger_t) domain_read_all_domains_state(passenger_t) @@ -53818,7 +53851,15 @@ index 4e114ff..6691677 100644 auth_use_nsswitch(passenger_t) logging_send_syslog_msg(passenger_t) -@@ -90,14 +94,21 @@ optional_policy(` + + miscfiles_read_localization(passenger_t) + ++sysnet_exec_ifconfig(passenger_t) ++ + userdom_dontaudit_use_user_terminals(passenger_t) + + optional_policy(` +@@ -90,14 +98,21 @@ optional_policy(` ') optional_policy(` @@ -63265,7 +63306,7 @@ index 4ecda09..8c0b242 100644 +/var/log/puppet(/.*)? gen_context(system_u:object_r:puppet_log_t,s0) +/var/run/puppet(/.*)? gen_context(system_u:object_r:puppet_var_run_t,s0) diff --git a/puppet.if b/puppet.if -index 7cb8b1f..46650f0 100644 +index 7cb8b1f..9422c90 100644 --- a/puppet.if +++ b/puppet.if @@ -1,4 +1,32 @@ @@ -63293,11 +63334,11 @@ index 7cb8b1f..46650f0 100644 +# +interface(`puppet_domtrans_master',` + gen_require(` -+ type puppetmaster_t, puppetmaster_t_exec_t; ++ type puppetmaster_t, puppetmaster_exec_t; + ') + + corecmd_search_bin($1) -+ domtrans_pattern($1, puppetmaster_t_exec_t, puppetmaster_t) ++ domtrans_pattern($1, puppetmaster_exec_t, puppetmaster_t) +') ######################################## @@ -63576,7 +63617,7 @@ index 7cb8b1f..46650f0 100644 - files_search_var_lib($1) - admin_pattern($1, puppet_var_lib_t) -+ logging_search_logs($1) ++ files_search_etc($1) + list_dirs_pattern($1, puppet_etc_t, puppet_etc_t) + read_files_pattern($1, puppet_etc_t, puppet_etc_t) +') @@ -82749,7 +82790,7 @@ index 634c6b4..e1edfd9 100644 ######################################## diff --git a/sosreport.te b/sosreport.te -index 703efa3..f9d6ed6 100644 +index 703efa3..9610be1 100644 --- a/sosreport.te +++ b/sosreport.te @@ -19,6 +19,9 @@ files_tmp_file(sosreport_tmp_t) @@ -82814,7 +82855,7 @@ index 703efa3..f9d6ed6 100644 files_read_var_lib_files(sosreport_t) files_read_var_symlinks(sosreport_t) files_read_kernel_modules(sosreport_t) -@@ -79,27 +95,41 @@ files_manage_etc_runtime_files(sosreport_t) +@@ -79,27 +95,42 @@ files_manage_etc_runtime_files(sosreport_t) files_etc_filetrans_etc_runtime(sosreport_t, file) fs_getattr_all_fs(sosreport_t) @@ -82833,6 +82874,7 @@ index 703efa3..f9d6ed6 100644 +files_read_non_security_files(sosreport_t) + auth_use_nsswitch(sosreport_t) ++auth_dontaudit_read_shadow(sosreport_t) init_domtrans_script(sosreport_t) +init_getattr_initctl(sosreport_t) @@ -82858,7 +82900,7 @@ index 703efa3..f9d6ed6 100644 ') optional_policy(` -@@ -111,6 +141,11 @@ optional_policy(` +@@ -111,6 +142,11 @@ optional_policy(` ') optional_policy(` @@ -86063,10 +86105,10 @@ index b42ec1d..91b8f71 100644 tcsd_initrc_domtrans($1) domain_system_change_exemption($1) diff --git a/tcsd.te b/tcsd.te -index ac8213a..20fa71f 100644 +index ac8213a..14da480 100644 --- a/tcsd.te +++ b/tcsd.te -@@ -41,10 +41,6 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t) +@@ -41,10 +41,8 @@ corenet_tcp_sendrecv_tcs_port(tcsd_t) dev_read_urand(tcsd_t) dev_rw_tpm(tcsd_t) @@ -86074,9 +86116,11 @@ index ac8213a..20fa71f 100644 - auth_use_nsswitch(tcsd_t) - logging_send_syslog_msg(tcsd_t) -- +-logging_send_syslog_msg(tcsd_t) ++init_read_utmp(tcsd_t) + -miscfiles_read_localization(tcsd_t) ++logging_send_syslog_msg(tcsd_t) diff --git a/telepathy.fc b/telepathy.fc index c7de0cf..03fc880 100644 --- a/telepathy.fc @@ -92543,7 +92587,7 @@ index 9dec06c..4e31afe 100644 + allow $1 svirt_image_t:chr_file rw_file_perms; ') diff --git a/virt.te b/virt.te -index 1f22fba..348df8f 100644 +index 1f22fba..50f7cf9 100644 --- a/virt.te +++ b/virt.te @@ -1,94 +1,104 @@ @@ -94302,7 +94346,7 @@ index 1f22fba..348df8f 100644 allow virt_bridgehelper_t self:process { setcap getcap }; allow virt_bridgehelper_t self:capability { setpcap setgid setuid net_admin }; allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms; -@@ -1198,5 +1352,122 @@ kernel_read_network_state(virt_bridgehelper_t) +@@ -1198,5 +1352,123 @@ kernel_read_network_state(virt_bridgehelper_t) corenet_rw_tun_tap_dev(virt_bridgehelper_t) @@ -94419,6 +94463,7 @@ index 1f22fba..348df8f 100644 +# + +type svirt_socket_t; ++domain_type(svirt_socket_t) +role system_r types svirt_socket_t; +allow virtd_t svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms }; +allow virt_domain svirt_socket_t:unix_stream_socket { connectto create_stream_socket_perms }; @@ -97518,25 +97563,32 @@ index 36e32df..3d08962 100644 + manage_dirs_pattern($1, zarafa_var_lib_t, zarafa_var_lib_t) ') diff --git a/zarafa.te b/zarafa.te -index a4479b1..7a9f1b6 100644 +index a4479b1..a40d580 100644 --- a/zarafa.te +++ b/zarafa.te -@@ -1,4 +1,4 @@ +@@ -1,13 +1,18 @@ -policy_module(zarafa, 1.1.4) +policy_module(zarafa, 1.1.0) ######################################## # -@@ -6,8 +6,6 @@ policy_module(zarafa, 1.1.4) + # Declarations # ++## ++##

++## Allow zarafa domains to setrlimit/sys_rouserce. ++##

++##
++gen_tunable(zarafa_setrlimit, false) ++ attribute zarafa_domain; -attribute zarafa_logfile; -attribute zarafa_pidfile; zarafa_domain_template(deliver) -@@ -17,9 +15,6 @@ files_tmp_file(zarafa_deliver_tmp_t) +@@ -17,9 +22,6 @@ files_tmp_file(zarafa_deliver_tmp_t) type zarafa_etc_t; files_config_file(zarafa_etc_t) @@ -97546,7 +97598,7 @@ index a4479b1..7a9f1b6 100644 zarafa_domain_template(gateway) zarafa_domain_template(ical) zarafa_domain_template(indexer) -@@ -43,61 +38,74 @@ files_tmp_file(zarafa_var_lib_t) +@@ -43,61 +45,74 @@ files_tmp_file(zarafa_var_lib_t) ######################################## # @@ -97641,7 +97693,7 @@ index a4479b1..7a9f1b6 100644 manage_dirs_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t) manage_files_pattern(zarafa_server_t, zarafa_server_tmp_t, zarafa_server_tmp_t) files_tmp_filetrans(zarafa_server_t, zarafa_server_tmp_t, { file dir }) -@@ -109,70 +117,80 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file } +@@ -109,70 +124,85 @@ files_var_lib_filetrans(zarafa_server_t, zarafa_var_lib_t, { file dir lnk_file } stream_connect_pattern(zarafa_server_t, zarafa_indexer_var_run_t, zarafa_indexer_var_run_t, zarafa_indexer_t) @@ -97703,14 +97755,14 @@ index a4479b1..7a9f1b6 100644 # -# Zarafa domain local policy +# zarafa_gateway local policy -+# + # +corenet_tcp_bind_pop_port(zarafa_gateway_t) -+ + +####################################### +# +# zarafa-ical local policy - # - ++# ++ +corenet_tcp_bind_http_cache_port(zarafa_ical_t) + +###################################### @@ -97727,12 +97779,17 @@ index a4479b1..7a9f1b6 100644 +# bad permission on /etc/zarafa allow zarafa_domain self:capability { kill dac_override chown setgid setuid }; -allow zarafa_domain self:process { setrlimit signal }; -+allow zarafa_domain self:process { signal_perms setrlimit }; ++allow zarafa_domain self:process { signal_perms }; allow zarafa_domain self:fifo_file rw_fifo_file_perms; -allow zarafa_domain self:tcp_socket { accept listen }; -allow zarafa_domain self:unix_stream_socket { accept listen }; +allow zarafa_domain self:tcp_socket create_stream_socket_perms; +allow zarafa_domain self:unix_stream_socket create_stream_socket_perms; ++ ++tunable_policy(`zarafa_setrlimit',` ++ allow zarafa_domain self:capability sys_resource; ++ allow zarafa_domain self:process setrlimit; ++') stream_connect_pattern(zarafa_domain, zarafa_server_var_run_t, zarafa_server_var_run_t, zarafa_server_t) diff --git a/selinux-policy.spec b/selinux-policy.spec index b4b14da..8239e16 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.12.1 -Release: 80%{?dist} +Release: 81%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -570,6 +570,23 @@ SELinux Reference policy mls base module. %endif %changelog +* Thu Sep 19 2013 Miroslav Grepl 3.12.1-81 +- Dontaudit attempts by sosreport to read shadow_t +- Allow browser sandbox plugins to connect to cups to print +- Add new label mpd_home_t +- Label /srv/www/logs as httpd_log_t +- Add support for /var/lib/php/wsdlcache +- Add zarafa_setrlimit boolean +- Allow fetchmail to send mails +- Add labels for apache logs under miq package +- Allow irc_t to use tcp sockets +- fix labels in puppet.if +- Allow tcsd to read utmp file +- Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t to access host keys +- Define svirt_socket_t as a domain_type +- Take away transition from init_t to initrc_t when executing bin_t, allow init_t to run chk_passwd_t +- Fix label on pam_krb5 helper apps + * Thu Sep 12 2013 Miroslav Grepl 3.12.1-80 - Allow ldconfig to write to kdumpctl fifo files - allow neutron to connect to amqp ports