diff --git a/Changelog b/Changelog index afa8aa4..dc1ff70 100644 --- a/Changelog +++ b/Changelog @@ -1,3 +1,4 @@ +- Patch to confine ldconfig in the targeted policy from Dan Walsh. - Man page updates from Dan Walsh. - Two patches from Paul Moore to for ipsec to remove redundant rules and have setkey read the config file. diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc index bf20fdc..9572732 100644 --- a/policy/modules/system/libraries.fc +++ b/policy/modules/system/libraries.fc @@ -203,12 +203,6 @@ ifdef(`distro_redhat',` /usr/lib(64)?/.*/program/libsoffice\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/(.*/)?pcsc/drivers(/.*)?/lib(cm2020|cm4000|SCR24x)\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/firefox.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/mozilla.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/seamonkey.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/sunbird.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/lib(64)?/thunderbird.*\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) - # Fedora Extras packages: ladspa, imlib2, ocaml /usr/lib(64)?/ladspa/analogue_osc_1416\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib(64)?/ladspa/bandpass_a_iir_1893\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te index 5106897..41c7879 100644 --- a/policy/modules/system/libraries.te +++ b/policy/modules/system/libraries.te @@ -1,5 +1,5 @@ -policy_module(libraries,1.5.3) +policy_module(libraries,1.5.4) ######################################## # @@ -18,6 +18,14 @@ files_type(ld_so_cache_t) type ld_so_t; files_type(ld_so_t) +type ldconfig_t; +type ldconfig_exec_t; +init_system_domain(ldconfig_t,ldconfig_exec_t) +role system_r types ldconfig_t; + +type ldconfig_tmp_t; +files_tmp_file(ldconfig_tmp_t) + # # lib_t is the type of files in the system lib directories. # @@ -46,14 +54,16 @@ files_type(textrel_shlib_t) # # ldconfig local policy # -type ldconfig_t; -type ldconfig_exec_t; -init_system_domain(ldconfig_t,ldconfig_exec_t) -role system_r types ldconfig_t; + +allow ldconfig_t self:capability sys_chroot; allow ldconfig_t ld_so_cache_t:file manage_file_perms; files_etc_filetrans(ldconfig_t,ld_so_cache_t,file) +manage_dirs_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t) +manage_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t) +files_tmp_filetrans(ldconfig_t, ldconfig_tmp_t, { file dir }) + manage_lnk_files_pattern(ldconfig_t,lib_t,lib_t) kernel_read_system_state(ldconfig_t) @@ -74,6 +84,8 @@ init_use_script_ptys(ldconfig_t) libs_use_ld_so(ldconfig_t) libs_use_shared_libs(ldconfig_t) +miscfiles_read_localization(ldconfig_t) + logging_send_syslog_msg(ldconfig_t) userdom_use_all_users_fds(ldconfig_t) @@ -86,7 +98,9 @@ ifdef(`hide_broken_symptoms',` ifdef(`targeted_policy',` allow ldconfig_t lib_t:file read_file_perms; - unconfined_domain(ldconfig_t) + files_read_generic_tmp_symlinks(ldconfig_t) + term_dontaudit_use_generic_ptys(ldconfig_t) + term_dontaudit_use_unallocated_ttys(ldconfig_t) ') optional_policy(`