diff --git a/policy/modules/apps/sandbox.te b/policy/modules/apps/sandbox.te index 2419a2a..89fcce3 100644 --- a/policy/modules/apps/sandbox.te +++ b/policy/modules/apps/sandbox.te @@ -152,6 +152,8 @@ allow sandbox_x_domain self:unix_dgram_socket { sendto create_socket_perms }; allow sandbox_x_domain self:unix_stream_socket create_stream_socket_perms; allow sandbox_x_domain self:process { signal_perms getsched setpgid execstack execmem }; +dontaudit sandbox_x_domain self:process signal; + allow sandbox_x_domain self:shm create_shm_perms; allow sandbox_x_domain self:unix_stream_socket { connectto create_stream_socket_perms }; allow sandbox_x_domain self:unix_dgram_socket { sendto create_socket_perms }; diff --git a/policy/modules/apps/telepathy.if b/policy/modules/apps/telepathy.if index 3d12484..21b65bc 100644 --- a/policy/modules/apps/telepathy.if +++ b/policy/modules/apps/telepathy.if @@ -29,7 +29,9 @@ template(`telepathy_domain_template',` files_tmp_file(telepathy_$1_tmp_t) ubac_constrained(telepathy_$1_tmp_t) - dbus_session_domain(telepathy_$1_t, telepathy_$1_exec_t) + ifdef(`TODO',` + dbus_session_domain(telepathy_$1_t, telepathy_$1_exec_t) + ') ') ####################################### diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index ba64143..6918ff2 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -580,6 +580,27 @@ interface(`apache_delete_cache_files',` ######################################## ## +## Allow the specified domain to search +## apache configuration dirs. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`apache_search_config',` + gen_require(` + type httpd_config_t; + ') + + files_search_etc($1) + allow $1 httpd_config_t:dir search_dir_perms; +') + +######################################## +## ## Allow the specified domain to read ## apache configuration files. ## diff --git a/policy/modules/services/boinc.te b/policy/modules/services/boinc.te index c9622ef..4bc3f06 100644 --- a/policy/modules/services/boinc.te +++ b/policy/modules/services/boinc.te @@ -122,6 +122,7 @@ allow boinc_project_t self:process { ptrace setsched signal signull sigkill sigs allow boinc_project_t self:process { execmem execstack }; allow boinc_project_t self:fifo_file rw_fifo_file_perms; +allow boinc_project_t self:sem create_sem_perms; manage_dirs_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t) manage_files_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t) diff --git a/policy/modules/services/certmonger.te b/policy/modules/services/certmonger.te index 1c87fb3..5595c96 100644 --- a/policy/modules/services/certmonger.te +++ b/policy/modules/services/certmonger.te @@ -58,6 +58,16 @@ miscfiles_manage_generic_cert_files(certmonger_t) sysnet_dns_name_resolve(certmonger_t) +userdom_search_user_home_content(certmonger_t) + +optional_policy(` + apache_search_config(certmonger_t) +') + +optional_policy(` + bind_search_cache(certmonger_t) +') + optional_policy(` dbus_system_bus_client(certmonger_t) dbus_connect_system_bus(certmonger_t) @@ -70,3 +80,4 @@ optional_policy(` optional_policy(` pcscd_stream_connect(certmonger_t) ') + diff --git a/policy/modules/services/fail2ban.te b/policy/modules/services/fail2ban.te index 7c5bf19..0a4216c 100644 --- a/policy/modules/services/fail2ban.te +++ b/policy/modules/services/fail2ban.te @@ -28,7 +28,7 @@ files_pid_file(fail2ban_var_run_t) # fail2ban local policy # -allow fail2ban_t self:capability { sys_tty_config }; +allow fail2ban_t self:capability { dac_read_search dac_override sys_tty_config }; allow fail2ban_t self:process signal; allow fail2ban_t self:fifo_file rw_fifo_file_perms; allow fail2ban_t self:unix_stream_socket { connectto create_stream_socket_perms };