diff --git a/policy-20080710.patch b/policy-20080710.patch index ee95960..2aebb81 100644 --- a/policy-20080710.patch +++ b/policy-20080710.patch @@ -6351,8 +6351,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/webalize files_read_etc_runtime_files(webalizer_t) diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/wine.fc serefpolicy-3.5.13/policy/modules/apps/wine.fc --- nsaserefpolicy/policy/modules/apps/wine.fc 2008-10-17 14:49:14.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/apps/wine.fc 2009-02-10 15:07:15.000000000 +0100 -@@ -1,4 +1,8 @@ ++++ serefpolicy-3.5.13/policy/modules/apps/wine.fc 2009-03-06 09:53:41.000000000 +0100 +@@ -1,4 +1,15 @@ -/usr/bin/wine -- gen_context(system_u:object_r:wine_exec_t,s0) +HOME_DIR/cxoffice/bin/wine.+ -- gen_context(system_u:object_r:wine_exec_t,s0) + @@ -6361,6 +6361,13 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/wine.fc +/opt/cxoffice/bin/wine.* -- gen_context(system_u:object_r:wine_exec_t,s0) +/opt/picasa/wine/bin/wine.* -- gen_context(system_u:object_r:wine_exec_t,s0) +/opt/google/picasa(/.*)?/bin/wine.* -- gen_context(system_u:object_r:wine_exec_t,s0) ++ ++/usr/bin/msiexec -- gen_context(system_u:object_r:wine_exec_t,s0) ++/usr/bin/notepad -- gen_context(system_u:object_r:wine_exec_t,s0) ++/usr/bin/regsvr32 -- gen_context(system_u:object_r:wine_exec_t,s0) ++/usr/bin/regedit -- gen_context(system_u:object_r:wine_exec_t,s0) ++/usr/bin/uninstaller -- gen_context(system_u:object_r:wine_exec_t,s0) ++/usr/bin/progman -- gen_context(system_u:object_r:wine_exec_t,s0) -/opt/cxoffice/bin/wine -- gen_context(system_u:object_r:wine_exec_t,s0) -/opt/picasa/wine/bin/wine -- gen_context(system_u:object_r:wine_exec_t,s0) @@ -16391,7 +16398,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove + diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.te serefpolicy-3.5.13/policy/modules/services/dovecot.te --- nsaserefpolicy/policy/modules/services/dovecot.te 2008-10-17 14:49:11.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/dovecot.te 2009-02-25 19:29:32.000000000 +0100 ++++ serefpolicy-3.5.13/policy/modules/services/dovecot.te 2009-03-06 09:53:17.000000000 +0100 @@ -15,12 +15,21 @@ domain_entry_file(dovecot_auth_t, dovecot_auth_exec_t) role system_r types dovecot_auth_t; @@ -16508,7 +16515,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove files_read_usr_symlinks(dovecot_auth_t) files_search_tmp(dovecot_auth_t) files_read_var_lib_files(dovecot_t) -@@ -185,5 +217,55 @@ +@@ -185,5 +217,59 @@ ') optional_policy(` @@ -16524,7 +16531,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove +optional_policy(` + postfix_manage_private_sockets(dovecot_auth_t) + postfix_search_spool(dovecot_auth_t) -+') + ') + +# for gssapi (kerberos) +userdom_list_unpriv_users_tmp(dovecot_auth_t) @@ -16540,6 +16547,10 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove +allow dovecot_deliver_t dovecot_etc_t:file read_file_perms; +allow dovecot_deliver_t dovecot_var_run_t:dir list_dir_perms; + ++manage_dirs_pattern(dovecot_deliver_t, dovecot_spool_t, dovecot_spool_t) ++manage_files_pattern(dovecot_deliver_t, dovecot_spool_t, dovecot_spool_t) ++manage_lnk_files_pattern(dovecot_deliver_t, dovecot_spool_t, dovecot_spool_t) ++ +kernel_read_all_sysctls(dovecot_deliver_t) +kernel_read_system_state(dovecot_deliver_t) + @@ -16563,7 +16574,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove + +optional_policy(` + mta_manage_spool(dovecot_deliver_t) - ') ++') + diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/exim.if serefpolicy-3.5.13/policy/modules/services/exim.if --- nsaserefpolicy/policy/modules/services/exim.if 2008-10-17 14:49:11.000000000 +0200 @@ -16788,10 +16799,51 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/exim + spamassassin_exec(exim_t) + spamassassin_exec_client(exim_t) ') +diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetchmail.fc serefpolicy-3.5.13/policy/modules/services/fetchmail.fc +--- nsaserefpolicy/policy/modules/services/fetchmail.fc 2008-10-17 14:49:11.000000000 +0200 ++++ serefpolicy-3.5.13/policy/modules/services/fetchmail.fc 2009-03-05 15:02:41.000000000 +0100 +@@ -11,9 +11,11 @@ + + /usr/bin/fetchmail -- gen_context(system_u:object_r:fetchmail_exec_t,s0) + ++ + # + # /var + # + ++/var/log/fetchmail\.log -- gen_context(system_u:object_r:fetchmail_log_t,s0) + /var/run/fetchmail/.* -- gen_context(system_u:object_r:fetchmail_var_run_t,s0) + /var/mail/\.fetchmail-UIDL-cache -- gen_context(system_u:object_r:fetchmail_uidl_cache_t,s0) diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetchmail.if serefpolicy-3.5.13/policy/modules/services/fetchmail.if --- nsaserefpolicy/policy/modules/services/fetchmail.if 2008-10-17 14:49:11.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/fetchmail.if 2009-02-10 15:07:15.000000000 +0100 -@@ -21,10 +21,10 @@ ++++ serefpolicy-3.5.13/policy/modules/services/fetchmail.if 2009-03-05 15:06:34.000000000 +0100 +@@ -1,5 +1,25 @@ + ## Remote-mail retrieval and forwarding utility + ++####################################### ++## ++## Allow the specified domain to append ++## fetchmail log files. ++## ++## ++## ++## Domain allowed to transition. ++## ++## ++# ++interface(`fetchmail_append_log',` ++ gen_require(` ++ type fetchmail_log_t; ++ ') ++ ++ logging_search_logs($1) ++ append_files_pattern($1, fetchmail_log_t, fetchmail_log_t) ++') ++ + ######################################## + ## + ## All of the rules required to administrate +@@ -21,10 +41,10 @@ ps_process_pattern($1, fetchmail_t) files_list_etc($1) @@ -16807,8 +16859,28 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetc ') diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetchmail.te serefpolicy-3.5.13/policy/modules/services/fetchmail.te --- nsaserefpolicy/policy/modules/services/fetchmail.te 2008-10-17 14:49:13.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/fetchmail.te 2009-02-10 15:07:15.000000000 +0100 -@@ -91,6 +91,10 @@ ++++ serefpolicy-3.5.13/policy/modules/services/fetchmail.te 2009-03-05 15:01:19.000000000 +0100 +@@ -19,6 +19,9 @@ + type fetchmail_uidl_cache_t; + files_type(fetchmail_uidl_cache_t) + ++type fetchmail_log_t; ++logging_log_file(fetchmail_log_t) ++ + ######################################## + # + # Local policy +@@ -40,6 +43,9 @@ + manage_files_pattern(fetchmail_t, fetchmail_var_run_t, fetchmail_var_run_t) + files_pid_filetrans(fetchmail_t, fetchmail_var_run_t, file) + ++manage_files_pattern(fetchmail_t, fetchmail_log_t, fetchmail_log_t) ++logging_log_filetrans(fetchmail_t,fetchmail_log_t,file) ++ + kernel_read_kernel_sysctls(fetchmail_t) + kernel_list_proc(fetchmail_t) + kernel_getattr_proc_files(fetchmail_t) +@@ -91,6 +97,10 @@ ') optional_policy(` @@ -23744,7 +23816,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/proc +') diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/procmail.te serefpolicy-3.5.13/policy/modules/services/procmail.te --- nsaserefpolicy/policy/modules/services/procmail.te 2008-10-17 14:49:13.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/procmail.te 2009-02-10 15:07:15.000000000 +0100 ++++ serefpolicy-3.5.13/policy/modules/services/procmail.te 2009-03-05 15:08:42.000000000 +0100 @@ -14,6 +14,10 @@ type procmail_tmp_t; files_tmp_file(procmail_tmp_t) @@ -23789,7 +23861,18 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/proc mta_manage_spool(procmail_t) ifdef(`hide_broken_symptoms',` -@@ -117,11 +125,13 @@ +@@ -103,6 +111,10 @@ + ') + + optional_policy(` ++ fetchmail_append_log(procmail_t) ++') ++ ++optional_policy(` + munin_dontaudit_search_lib(procmail_t) + ') + +@@ -117,11 +129,13 @@ optional_policy(` pyzor_domtrans(procmail_t) @@ -23803,7 +23886,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/proc sendmail_rw_tcp_sockets(procmail_t) sendmail_rw_unix_stream_sockets(procmail_t) ') -@@ -130,7 +140,16 @@ +@@ -130,7 +144,16 @@ corenet_udp_bind_generic_port(procmail_t) corenet_dontaudit_udp_bind_all_ports(procmail_t) diff --git a/selinux-policy.spec b/selinux-policy.spec index 7fce6fe..95c5e4f 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -20,7 +20,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.5.13 -Release: 47%{?dist} +Release: 48%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -460,6 +460,10 @@ exit 0 %endif %changelog +* Fri March 6 2009 Miroslav Grepl 3.5.13-48 +- Fix pcscd policy +- Allow alsa to read hardware state information + * Thu Feb 26 2009 Miroslav Grepl 3.5.13-47 - Allow ktalkd to write to terminals - Fix qemu labeling