diff --git a/policy-f19-base.patch b/policy-f19-base.patch index af4d7ad..2613303 100644 --- a/policy-f19-base.patch +++ b/policy-f19-base.patch @@ -3244,7 +3244,7 @@ index 7590165..19aaaed 100644 + fs_mounton_fusefs(seunshare_domain) +') diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc -index 644d4d7..6e7dd83 100644 +index 644d4d7..ad789c2 100644 --- a/policy/modules/kernel/corecommands.fc +++ b/policy/modules/kernel/corecommands.fc @@ -1,9 +1,10 @@ @@ -3556,7 +3556,7 @@ index 644d4d7..6e7dd83 100644 /usr/share/system-config-selinux/polgen\.py -- gen_context(system_u:object_r:bin_t,s0) /usr/share/system-config-selinux/system-config-selinux\.py -- gen_context(system_u:object_r:bin_t,s0) /usr/share/system-config-display/system-config-display -- gen_context(system_u:object_r:bin_t,s0) -@@ -383,11 +458,15 @@ ifdef(`distro_suse', ` +@@ -383,11 +458,16 @@ ifdef(`distro_suse', ` # # /var # @@ -3566,6 +3566,7 @@ index 644d4d7..6e7dd83 100644 /var/ftp/bin(/.*)? gen_context(system_u:object_r:bin_t,s0) /var/lib/asterisk/agi-bin(/.*)? gen_context(system_u:object_r:bin_t,s0) ++/var/lib/dirsrv/scripts-INSTANCE -- gen_context(system_u:object_r:bin_t,s0) +/var/lib/iscan/interpreter gen_context(system_u:object_r:bin_t,s0) +/usr/lib/ruby/gems(/.*)?/helper-scripts(/.*)? gen_context(system_u:object_r:bin_t,s0) +/usr/share/gems(/.*)?/helper-scripts(/.*)? gen_context(system_u:object_r:bin_t,s0) @@ -3573,7 +3574,7 @@ index 644d4d7..6e7dd83 100644 /usr/lib/yp/.+ -- gen_context(system_u:object_r:bin_t,s0) /var/qmail/bin -d gen_context(system_u:object_r:bin_t,s0) -@@ -397,3 +476,12 @@ ifdef(`distro_suse', ` +@@ -397,3 +477,12 @@ ifdef(`distro_suse', ` ifdef(`distro_suse',` /var/lib/samba/bin/.+ gen_context(system_u:object_r:bin_t,s0) ') @@ -32416,7 +32417,7 @@ index 9933677..ca14c17 100644 + +/var/run/tmpfiles.d/kmod.conf -- gen_context(system_u:object_r:insmod_var_run_t,s0) diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if -index 7449974..23bbbf2 100644 +index 7449974..4f4ac3a 100644 --- a/policy/modules/system/modutils.if +++ b/policy/modules/system/modutils.if @@ -12,7 +12,7 @@ @@ -32498,32 +32499,7 @@ index 7449974..23bbbf2 100644 ## Execute insmod in the insmod domain, and ## allow the specified role the insmod domain, ## and use the caller's terminal. Has a sigchld -@@ -208,6 +264,24 @@ interface(`modutils_exec_insmod',` - can_exec($1, insmod_exec_t) - ') - -+####################################### -+## -+## Don't audit execute insmod in the caller domain. -+## -+## -+## -+## Domain allowed access. -+## -+## -+# -+interface(`modutils_dontaudit_exec_insmod',` -+ gen_require(` -+ type insmod_exec_t; -+ ') -+ -+ dontaudit $1 insmod_exec_t:file exec_file_perms; -+') -+ - ######################################## - ## - ## Execute depmod in the depmod domain. -@@ -308,11 +382,18 @@ interface(`modutils_domtrans_update_mods',` +@@ -308,11 +364,18 @@ interface(`modutils_domtrans_update_mods',` # interface(`modutils_run_update_mods',` gen_require(` @@ -32544,7 +32520,7 @@ index 7449974..23bbbf2 100644 ') ######################################## -@@ -333,3 +414,25 @@ interface(`modutils_exec_update_mods',` +@@ -333,3 +396,25 @@ interface(`modutils_exec_update_mods',` corecmd_search_bin($1) can_exec($1, update_modules_exec_t) ') @@ -35253,7 +35229,7 @@ index 346a7cc..42a48b6 100644 +/var/run/netns(/.*)? gen_context(system_u:object_r:ifconfig_var_run_t,s0) +/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0) diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if -index 6944526..a76e22c 100644 +index 6944526..0bd8d93 100644 --- a/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if @@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',` @@ -35528,7 +35504,7 @@ index 6944526..a76e22c 100644 corenet_tcp_sendrecv_generic_if($1) corenet_udp_sendrecv_generic_if($1) corenet_tcp_sendrecv_generic_node($1) -@@ -766,3 +918,114 @@ interface(`sysnet_use_portmap',` +@@ -766,3 +918,76 @@ interface(`sysnet_use_portmap',` sysnet_read_config($1) ') @@ -35581,24 +35557,6 @@ index 6944526..a76e22c 100644 + +######################################## +## -+## Transition to sysnet ifconfig named content -+## -+## -+## -+## Domain allowed access. -+## -+## -+# -+interface(`sysnet_filetrans_named_content_ifconfig',` -+ gen_require(` -+ type ifconfig_var_run_t; -+ ') -+ -+ files_pid_filetrans($1, ifconfig_var_run_t, dir, "netns") -+') -+ -+######################################## -+## +## Transition to sysnet named content +## +## @@ -35623,26 +35581,6 @@ index 6944526..a76e22c 100644 + files_etc_filetrans($1, net_conf_t, file, "yp.conf") + files_etc_filetrans($1, net_conf_t, file, "ntp.conf") +') -+ -+######################################## -+## -+## Transition to sysnet ifconfig named content -+## -+## -+## -+## Domain allowed access. -+## -+## -+# -+interface(`sysnet_manage_ifconfig_run',` -+ gen_require(` -+ type ifconfig_var_run_t; -+ ') -+ -+ manage_files_pattern($1, ifconfig_var_run_t, ifconfig_var_run_t) -+ manage_dirs_pattern($1, ifconfig_var_run_t, ifconfig_var_run_t) -+ manage_lnk_files_pattern($1, ifconfig_var_run_t, ifconfig_var_run_t) -+') diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te index b7686d5..087fe08 100644 --- a/policy/modules/system/sysnetwork.te @@ -39441,7 +39379,7 @@ index db75976..65191bd 100644 + +/var/run/user(/.*)? gen_context(system_u:object_r:user_tmp_t,s0) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if -index 3c5dba7..a44c781 100644 +index 3c5dba7..0aa6db0 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -30,9 +30,11 @@ template(`userdom_base_user_template',` @@ -40078,7 +40016,7 @@ index 3c5dba7..a44c781 100644 # cjp: some of this probably can be removed selinux_get_fs_mount($1_t) -@@ -546,93 +687,120 @@ template(`userdom_common_user_template',` +@@ -546,93 +687,124 @@ template(`userdom_common_user_template',` selinux_compute_user_contexts($1_t) # for eject @@ -40191,6 +40129,10 @@ index 3c5dba7..a44c781 100644 + kde_dbus_chat_backlighthelper($1_usertype) + ') + ++ optional_policy(` ++ memcached_stream_connect($1_usertype) ++ ') ++ + optional_policy(` + modemmanager_dbus_chat($1_usertype) + ') @@ -40237,7 +40179,7 @@ index 3c5dba7..a44c781 100644 ') optional_policy(` -@@ -642,23 +810,21 @@ template(`userdom_common_user_template',` +@@ -642,23 +814,21 @@ template(`userdom_common_user_template',` optional_policy(` mpd_manage_user_data_content($1_t) mpd_relabel_user_data_content($1_t) @@ -40266,7 +40208,7 @@ index 3c5dba7..a44c781 100644 mysql_stream_connect($1_t) ') ') -@@ -671,7 +837,7 @@ template(`userdom_common_user_template',` +@@ -671,7 +841,7 @@ template(`userdom_common_user_template',` optional_policy(` # to allow monitoring of pcmcia status @@ -40275,7 +40217,7 @@ index 3c5dba7..a44c781 100644 ') optional_policy(` -@@ -680,9 +846,9 @@ template(`userdom_common_user_template',` +@@ -680,9 +850,9 @@ template(`userdom_common_user_template',` ') optional_policy(` @@ -40288,7 +40230,7 @@ index 3c5dba7..a44c781 100644 ') ') -@@ -693,32 +859,35 @@ template(`userdom_common_user_template',` +@@ -693,32 +863,35 @@ template(`userdom_common_user_template',` ') optional_policy(` @@ -40335,7 +40277,7 @@ index 3c5dba7..a44c781 100644 ') ') -@@ -743,17 +912,33 @@ template(`userdom_common_user_template',` +@@ -743,17 +916,33 @@ template(`userdom_common_user_template',` template(`userdom_login_user_template', ` gen_require(` class context contains; @@ -40373,7 +40315,7 @@ index 3c5dba7..a44c781 100644 userdom_change_password_template($1) -@@ -761,82 +946,101 @@ template(`userdom_login_user_template', ` +@@ -761,82 +950,101 @@ template(`userdom_login_user_template', ` # # User domain Local policy # @@ -40511,7 +40453,7 @@ index 3c5dba7..a44c781 100644 ') ') -@@ -868,6 +1072,12 @@ template(`userdom_restricted_user_template',` +@@ -868,6 +1076,12 @@ template(`userdom_restricted_user_template',` typeattribute $1_t unpriv_userdomain; domain_interactive_fd($1_t) @@ -40524,7 +40466,7 @@ index 3c5dba7..a44c781 100644 ############################## # # Local policy -@@ -907,42 +1117,99 @@ template(`userdom_restricted_xwindows_user_template',` +@@ -907,42 +1121,99 @@ template(`userdom_restricted_xwindows_user_template',` # # Local policy # @@ -40613,31 +40555,31 @@ index 3c5dba7..a44c781 100644 + consolekit_dontaudit_read_log($1_usertype) + consolekit_dbus_chat($1_usertype) + ') -+ -+ optional_policy(` -+ cups_dbus_chat($1_usertype) -+ cups_dbus_chat_config($1_usertype) -+ ') optional_policy(` - consolekit_dbus_chat($1_t) -+ devicekit_dbus_chat($1_usertype) -+ devicekit_dbus_chat_disk($1_usertype) -+ devicekit_dbus_chat_power($1_usertype) ++ cups_dbus_chat($1_usertype) ++ cups_dbus_chat_config($1_usertype) ') optional_policy(` - cups_dbus_chat($1_t) -+ fprintd_dbus_chat($1_t) ++ devicekit_dbus_chat($1_usertype) ++ devicekit_dbus_chat_disk($1_usertype) ++ devicekit_dbus_chat_power($1_usertype) ') optional_policy(` - gnome_role_template($1, $1_r, $1_t) ++ fprintd_dbus_chat($1_t) ++ ') ++ ++ optional_policy(` + realmd_dbus_chat($1_t) ') optional_policy(` -@@ -951,12 +1218,29 @@ template(`userdom_restricted_xwindows_user_template',` +@@ -951,12 +1222,29 @@ template(`userdom_restricted_xwindows_user_template',` ') optional_policy(` @@ -40668,7 +40610,7 @@ index 3c5dba7..a44c781 100644 ') ####################################### -@@ -990,27 +1274,33 @@ template(`userdom_unpriv_user_template', ` +@@ -990,27 +1278,33 @@ template(`userdom_unpriv_user_template', ` # # Inherit rules for ordinary users. @@ -40706,7 +40648,7 @@ index 3c5dba7..a44c781 100644 fs_manage_noxattr_fs_files($1_t) fs_manage_noxattr_fs_dirs($1_t) # Write floppies -@@ -1021,23 +1311,60 @@ template(`userdom_unpriv_user_template', ` +@@ -1021,55 +1315,94 @@ template(`userdom_unpriv_user_template', ` ') ') @@ -40732,20 +40674,46 @@ index 3c5dba7..a44c781 100644 + + tunable_policy(`selinuxuser_tcp_server',` + corenet_tcp_bind_all_unreserved_ports($1_usertype) -+ ') -+ -+ optional_policy(` + ') + + optional_policy(` +- netutils_run_ping_cond($1_t, $1_r) +- netutils_run_traceroute_cond($1_t, $1_r) + cdrecord_role($1_r, $1_t) -+ ') -+ -+ optional_policy(` + ') + +- # Run pppd in pppd_t by default for user + optional_policy(` +- ppp_run_cond($1_t, $1_r) + cron_role($1_r, $1_t) -+ ') -+ -+ optional_policy(` + ') + + optional_policy(` +- setroubleshoot_stream_connect($1_t) + games_rw_data($1_usertype) -+ ') -+ + ') +-') + +-####################################### +-## +-## The template for creating an administrative user. +-## +-## +-##

+-## This template creates a user domain, types, and +-## rules for the user's tty, pty, home directories, +-## tmp, and tmpfs files. +-##

+-##

+-## The privileges given to administrative users are: +-##

+ optional_policy(` + gpg_role($1_r, $1_usertype) + ') @@ -40767,28 +40735,49 @@ index 3c5dba7..a44c781 100644 + + optional_policy(` + wine_role_template($1, $1_r, $1_t) - ') - - optional_policy(` -- netutils_run_ping_cond($1_t, $1_r) -- netutils_run_traceroute_cond($1_t, $1_r) ++ ') ++ ++ optional_policy(` + postfix_run_postdrop($1_t, $1_r) + postfix_search_spool($1_t) - ') - - # Run pppd in pppd_t by default for user -@@ -1046,7 +1373,9 @@ template(`userdom_unpriv_user_template', ` - ') - - optional_policy(` -- setroubleshoot_stream_connect($1_t) ++ ') ++ ++ # Run pppd in pppd_t by default for user ++ optional_policy(` ++ ppp_run_cond($1_t, $1_r) ++ ') ++ ++ optional_policy(` + vdagent_getattr_log($1_t) + vdagent_getattr_exec_files($1_t) + vdagent_stream_connect($1_t) - ') - ') - -@@ -1082,7 +1411,7 @@ template(`userdom_unpriv_user_template', ` ++ ') ++') ++ ++####################################### ++## ++## The template for creating an administrative user. ++## ++## ++##

++## This template creates a user domain, types, and ++## rules for the user's tty, pty, home directories, ++## tmp, and tmpfs files. ++##

++##

++## The privileges given to administrative users are: ++##

    ++##
  • Raw disk access
  • ++##
  • Set all sysctls
  • ++##
  • All kernel ring buffer controls
  • ++##
  • Create, read, write, and delete all files but shadow
  • ++##
  • Manage source and binary format SELinux policy
  • ++##
  • Run insmod
  • ++##
+ ##

+ ##
+ ## +@@ -1082,7 +1415,7 @@ template(`userdom_unpriv_user_template', ` template(`userdom_admin_user_template',` gen_require(` attribute admindomain; @@ -40797,7 +40786,7 @@ index 3c5dba7..a44c781 100644 ') ############################## -@@ -1109,6 +1438,7 @@ template(`userdom_admin_user_template',` +@@ -1109,6 +1442,7 @@ template(`userdom_admin_user_template',` # allow $1_t self:capability ~{ sys_module audit_control audit_write }; @@ -40805,7 +40794,7 @@ index 3c5dba7..a44c781 100644 allow $1_t self:process { setexec setfscreate }; allow $1_t self:netlink_audit_socket nlmsg_readpriv; allow $1_t self:tun_socket create; -@@ -1117,6 +1447,9 @@ template(`userdom_admin_user_template',` +@@ -1117,6 +1451,9 @@ template(`userdom_admin_user_template',` # Skip authentication when pam_rootok is specified. allow $1_t self:passwd rootok; @@ -40815,7 +40804,7 @@ index 3c5dba7..a44c781 100644 kernel_read_software_raid_state($1_t) kernel_getattr_core_if($1_t) kernel_getattr_message_if($1_t) -@@ -1131,6 +1464,7 @@ template(`userdom_admin_user_template',` +@@ -1131,6 +1468,7 @@ template(`userdom_admin_user_template',` kernel_sigstop_unlabeled($1_t) kernel_signull_unlabeled($1_t) kernel_sigchld_unlabeled($1_t) @@ -40823,7 +40812,7 @@ index 3c5dba7..a44c781 100644 corenet_tcp_bind_generic_port($1_t) # allow setting up tunnels -@@ -1148,10 +1482,14 @@ template(`userdom_admin_user_template',` +@@ -1148,10 +1486,14 @@ template(`userdom_admin_user_template',` dev_rename_all_blk_files($1_t) dev_rename_all_chr_files($1_t) dev_create_generic_symlinks($1_t) @@ -40838,7 +40827,7 @@ index 3c5dba7..a44c781 100644 domain_dontaudit_ptrace_all_domains($1_t) # signal all domains: domain_kill_all_domains($1_t) -@@ -1162,29 +1500,38 @@ template(`userdom_admin_user_template',` +@@ -1162,29 +1504,38 @@ template(`userdom_admin_user_template',` domain_sigchld_all_domains($1_t) # for lsof domain_getattr_all_sockets($1_t) @@ -40881,7 +40870,7 @@ index 3c5dba7..a44c781 100644 # The following rule is temporary until such time that a complete # policy management infrastructure is in place so that an administrator -@@ -1194,6 +1541,8 @@ template(`userdom_admin_user_template',` +@@ -1194,6 +1545,8 @@ template(`userdom_admin_user_template',` # But presently necessary for installing the file_contexts file. seutil_manage_bin_policy($1_t) @@ -40890,7 +40879,7 @@ index 3c5dba7..a44c781 100644 userdom_manage_user_home_content_dirs($1_t) userdom_manage_user_home_content_files($1_t) userdom_manage_user_home_content_symlinks($1_t) -@@ -1201,13 +1550,17 @@ template(`userdom_admin_user_template',` +@@ -1201,13 +1554,17 @@ template(`userdom_admin_user_template',` userdom_manage_user_home_content_sockets($1_t) userdom_user_home_dir_filetrans_user_home_content($1_t, { dir file lnk_file fifo_file sock_file }) @@ -40909,7 +40898,7 @@ index 3c5dba7..a44c781 100644 optional_policy(` postgresql_unconfined($1_t) ') -@@ -1253,6 +1606,8 @@ template(`userdom_security_admin_template',` +@@ -1253,6 +1610,8 @@ template(`userdom_security_admin_template',` dev_relabel_all_dev_nodes($1) files_create_boot_flag($1) @@ -40918,7 +40907,7 @@ index 3c5dba7..a44c781 100644 # Necessary for managing /boot/efi fs_manage_dos_files($1) -@@ -1265,8 +1620,10 @@ template(`userdom_security_admin_template',` +@@ -1265,8 +1624,10 @@ template(`userdom_security_admin_template',` selinux_set_enforce_mode($1) selinux_set_all_booleans($1) selinux_set_parameters($1) @@ -40930,7 +40919,7 @@ index 3c5dba7..a44c781 100644 auth_relabel_shadow($1) init_exec($1) -@@ -1277,29 +1634,31 @@ template(`userdom_security_admin_template',` +@@ -1277,29 +1638,31 @@ template(`userdom_security_admin_template',` logging_read_audit_config($1) seutil_manage_bin_policy($1) @@ -40973,7 +40962,7 @@ index 3c5dba7..a44c781 100644 ') optional_policy(` -@@ -1360,14 +1719,17 @@ interface(`userdom_user_home_content',` +@@ -1360,14 +1723,17 @@ interface(`userdom_user_home_content',` gen_require(` attribute user_home_content_type; type user_home_t; @@ -40992,7 +40981,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1408,6 +1770,51 @@ interface(`userdom_user_tmpfs_file',` +@@ -1408,6 +1774,51 @@ interface(`userdom_user_tmpfs_file',` ## ## Allow domain to attach to TUN devices created by administrative users. ## @@ -41044,7 +41033,7 @@ index 3c5dba7..a44c781 100644 ## ## ## Domain allowed access. -@@ -1512,11 +1919,31 @@ interface(`userdom_search_user_home_dirs',` +@@ -1512,11 +1923,31 @@ interface(`userdom_search_user_home_dirs',` ') allow $1 user_home_dir_t:dir search_dir_perms; @@ -41076,7 +41065,7 @@ index 3c5dba7..a44c781 100644 ## Do not audit attempts to search user home directories. ## ## -@@ -1558,6 +1985,14 @@ interface(`userdom_list_user_home_dirs',` +@@ -1558,6 +1989,14 @@ interface(`userdom_list_user_home_dirs',` allow $1 user_home_dir_t:dir list_dir_perms; files_search_home($1) @@ -41091,7 +41080,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1573,9 +2008,11 @@ interface(`userdom_list_user_home_dirs',` +@@ -1573,9 +2012,11 @@ interface(`userdom_list_user_home_dirs',` interface(`userdom_dontaudit_list_user_home_dirs',` gen_require(` type user_home_dir_t; @@ -41103,7 +41092,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1632,6 +2069,42 @@ interface(`userdom_relabelto_user_home_dirs',` +@@ -1632,6 +2073,42 @@ interface(`userdom_relabelto_user_home_dirs',` allow $1 user_home_dir_t:dir relabelto; ') @@ -41146,7 +41135,7 @@ index 3c5dba7..a44c781 100644 ######################################## ## ## Create directories in the home dir root with -@@ -1711,6 +2184,8 @@ interface(`userdom_dontaudit_search_user_home_content',` +@@ -1711,6 +2188,8 @@ interface(`userdom_dontaudit_search_user_home_content',` ') dontaudit $1 user_home_t:dir search_dir_perms; @@ -41155,7 +41144,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1744,10 +2219,12 @@ interface(`userdom_list_all_user_home_content',` +@@ -1744,10 +2223,12 @@ interface(`userdom_list_all_user_home_content',` # interface(`userdom_list_user_home_content',` gen_require(` @@ -41170,7 +41159,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1772,7 +2249,25 @@ interface(`userdom_manage_user_home_content_dirs',` +@@ -1772,7 +2253,25 @@ interface(`userdom_manage_user_home_content_dirs',` ######################################## ## @@ -41197,7 +41186,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -1782,49 +2277,67 @@ interface(`userdom_manage_user_home_content_dirs',` +@@ -1782,49 +2281,67 @@ interface(`userdom_manage_user_home_content_dirs',` # interface(`userdom_delete_all_user_home_content_dirs',` gen_require(` @@ -41277,7 +41266,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1848,6 +2361,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',` +@@ -1848,6 +2365,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',` ######################################## ## @@ -41303,7 +41292,7 @@ index 3c5dba7..a44c781 100644 ## Mmap user home files. ## ## -@@ -1878,14 +2410,36 @@ interface(`userdom_mmap_user_home_content_files',` +@@ -1878,14 +2414,36 @@ interface(`userdom_mmap_user_home_content_files',` interface(`userdom_read_user_home_content_files',` gen_require(` type user_home_dir_t, user_home_t; @@ -41341,7 +41330,7 @@ index 3c5dba7..a44c781 100644 ## Do not audit attempts to read user home files. ## ## -@@ -1896,11 +2450,14 @@ interface(`userdom_read_user_home_content_files',` +@@ -1896,11 +2454,14 @@ interface(`userdom_read_user_home_content_files',` # interface(`userdom_dontaudit_read_user_home_content_files',` gen_require(` @@ -41359,89 +41348,148 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -1941,7 +2498,25 @@ interface(`userdom_dontaudit_write_user_home_content_files',` +@@ -1941,7 +2502,7 @@ interface(`userdom_dontaudit_write_user_home_content_files',` ######################################## ## -## Delete all user home content files. +## Delete files in a user home subdirectory. -+## -+## -+## -+## Domain allowed access. -+## -+## -+# + ## + ## + ## +@@ -1949,19 +2510,17 @@ interface(`userdom_dontaudit_write_user_home_content_files',` + ## + ## + # +-interface(`userdom_delete_all_user_home_content_files',` +interface(`userdom_delete_user_home_content_files',` -+ gen_require(` + gen_require(` +- attribute user_home_content_type; +- type user_home_dir_t; + type user_home_t; -+ ') -+ + ') + +- userdom_search_user_home_content($1) +- delete_files_pattern($1 { user_home_dir_t user_home_content_type }, user_home_content_type) + allow $1 user_home_t:file delete_file_perms; -+') -+ -+######################################## -+## + ') + + ######################################## + ## +-## Delete files in a user home subdirectory. +## Delete all files in a user home subdirectory. ## ## ## -@@ -1951,17 +2526,15 @@ interface(`userdom_dontaudit_write_user_home_content_files',` +@@ -1969,35 +2528,35 @@ interface(`userdom_delete_all_user_home_content_files',` + ## + ## # - interface(`userdom_delete_all_user_home_content_files',` +-interface(`userdom_delete_user_home_content_files',` ++interface(`userdom_delete_all_user_home_content_files',` gen_require(` -- attribute user_home_content_type; -- type user_home_dir_t; +- type user_home_t; + attribute user_home_type; ') -- userdom_search_user_home_content($1) -- delete_files_pattern($1 { user_home_dir_t user_home_content_type }, user_home_content_type) +- allow $1 user_home_t:file delete_file_perms; + allow $1 user_home_type:file delete_file_perms; ') ######################################## ## --## Delete files in a user home subdirectory. +-## Do not audit attempts to write user home files. +## Delete sock files in a user home subdirectory. ## ## ## -@@ -1969,12 +2542,48 @@ interface(`userdom_delete_all_user_home_content_files',` +-## Domain to not audit. ++## Domain allowed access. ## ## # --interface(`userdom_delete_user_home_content_files',` +-interface(`userdom_dontaudit_relabel_user_home_content_files',` +interface(`userdom_delete_user_home_content_sock_files',` gen_require(` type user_home_t; ') -- allow $1 user_home_t:file delete_file_perms; +- dontaudit $1 user_home_t:file relabel_file_perms; + allow $1 user_home_t:sock_file delete_file_perms; + ') + + ######################################## + ## +-## Read user home subdirectory symbolic links. ++## Delete all sock files in a user home subdirectory. + ## + ## + ## +@@ -2005,45 +2564,92 @@ interface(`userdom_dontaudit_relabel_user_home_content_files',` + ## + ## + # +-interface(`userdom_read_user_home_content_symlinks',` ++interface(`userdom_delete_all_user_home_content_sock_files',` + gen_require(` +- type user_home_dir_t, user_home_t; ++ attribute user_home_type; + ') + +- read_lnk_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t) +- files_search_home($1) ++ allow $1 user_home_type:sock_file delete_file_perms; + ') + + ######################################## + ## +-## Execute user home files. ++## Delete all files in a user home subdirectory. + ## + ## + ## + ## Domain allowed access. + ## + ## +-## + # +-interface(`userdom_exec_user_home_content_files',` ++interface(`userdom_delete_all_user_home_content',` + gen_require(` +- type user_home_dir_t, user_home_t; ++ attribute user_home_type; + ') + +- files_search_home($1) +- exec_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t) ++ allow $1 user_home_type:dir_file_class_set delete_file_perms; +') -+ + +- tunable_policy(`use_nfs_home_dirs',` +- fs_exec_nfs_files($1) +######################################## +## -+## Delete all sock files in a user home subdirectory. ++## Do not audit attempts to write user home files. +## +## +## -+## Domain allowed access. ++## Domain to not audit. +## +## +# -+interface(`userdom_delete_all_user_home_content_sock_files',` ++interface(`userdom_dontaudit_relabel_user_home_content_files',` + gen_require(` -+ attribute user_home_type; -+ ') -+ -+ allow $1 user_home_type:sock_file delete_file_perms; ++ type user_home_t; + ') + +- tunable_policy(`use_samba_home_dirs',` +- fs_exec_cifs_files($1) ++ dontaudit $1 user_home_t:file relabel_file_perms; +') + +######################################## +## -+## Delete all files in a user home subdirectory. ++## Read user home subdirectory symbolic links. +## +## +## @@ -41449,51 +41497,42 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_delete_all_user_home_content',` ++interface(`userdom_read_user_home_content_symlinks',` + gen_require(` -+ attribute user_home_type; -+ ') -+ -+ allow $1 user_home_type:dir_file_class_set delete_file_perms; - ') - - ######################################## -@@ -2010,8 +2619,7 @@ interface(`userdom_read_user_home_content_symlinks',` - type user_home_dir_t, user_home_t; ++ type user_home_dir_t, user_home_t; ') - -- read_lnk_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t) -- files_search_home($1) ++ + allow $1 { user_home_dir_t user_home_t }:lnk_file read_lnk_file_perms; ') ######################################## -@@ -2027,20 +2635,14 @@ interface(`userdom_read_user_home_content_symlinks',` - # - interface(`userdom_exec_user_home_content_files',` - gen_require(` -- type user_home_dir_t, user_home_t; + ## ++## Execute user home files. ++## ++## ++## ++## Domain allowed access. ++## ++## ++## ++# ++interface(`userdom_exec_user_home_content_files',` ++ gen_require(` + type user_home_dir_t; + attribute user_home_type; - ') - - files_search_home($1) -- exec_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t) -- -- tunable_policy(`use_nfs_home_dirs',` -- fs_exec_nfs_files($1) -- ') -- -- tunable_policy(`use_samba_home_dirs',` -- fs_exec_cifs_files($1) ++ ') ++ ++ files_search_home($1) + exec_files_pattern($1, { user_home_dir_t user_home_type }, user_home_type) + dontaudit $1 user_home_type:sock_file execute; - ') --') - - ######################################## - ## -@@ -2123,7 +2725,7 @@ interface(`userdom_manage_user_home_content_symlinks',` ++ ') ++ ++######################################## ++## + ## Do not audit attempts to execute user home files. + ## + ## +@@ -2123,7 +2729,7 @@ interface(`userdom_manage_user_home_content_symlinks',` ######################################## ## @@ -41502,7 +41541,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -2131,19 +2733,17 @@ interface(`userdom_manage_user_home_content_symlinks',` +@@ -2131,19 +2737,17 @@ interface(`userdom_manage_user_home_content_symlinks',` ## ## # @@ -41526,7 +41565,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -2151,12 +2751,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',` +@@ -2151,12 +2755,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',` ## ## # @@ -41542,7 +41581,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -2393,11 +2993,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',` +@@ -2393,11 +2997,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',` # interface(`userdom_read_user_tmp_files',` gen_require(` @@ -41557,7 +41596,7 @@ index 3c5dba7..a44c781 100644 files_search_tmp($1) ') -@@ -2417,7 +3017,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',` +@@ -2417,7 +3021,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',` type user_tmp_t; ') @@ -41566,7 +41605,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -2664,6 +3264,25 @@ interface(`userdom_tmp_filetrans_user_tmp',` +@@ -2664,6 +3268,25 @@ interface(`userdom_tmp_filetrans_user_tmp',` files_tmp_filetrans($1, user_tmp_t, $2, $3) ') @@ -41592,7 +41631,7 @@ index 3c5dba7..a44c781 100644 ######################################## ## ## Read user tmpfs files. -@@ -2680,13 +3299,14 @@ interface(`userdom_read_user_tmpfs_files',` +@@ -2680,13 +3303,14 @@ interface(`userdom_read_user_tmpfs_files',` ') read_files_pattern($1, user_tmpfs_t, user_tmpfs_t) @@ -41608,7 +41647,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -2707,7 +3327,7 @@ interface(`userdom_rw_user_tmpfs_files',` +@@ -2707,7 +3331,7 @@ interface(`userdom_rw_user_tmpfs_files',` ######################################## ## @@ -41617,7 +41656,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -2715,14 +3335,30 @@ interface(`userdom_rw_user_tmpfs_files',` +@@ -2715,14 +3339,30 @@ interface(`userdom_rw_user_tmpfs_files',` ## ## # @@ -41652,7 +41691,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -2817,6 +3453,24 @@ interface(`userdom_use_user_ttys',` +@@ -2817,6 +3457,24 @@ interface(`userdom_use_user_ttys',` ######################################## ## @@ -41677,7 +41716,7 @@ index 3c5dba7..a44c781 100644 ## Read and write a user domain pty. ## ## -@@ -2835,22 +3489,34 @@ interface(`userdom_use_user_ptys',` +@@ -2835,22 +3493,34 @@ interface(`userdom_use_user_ptys',` ######################################## ## @@ -41720,7 +41759,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -2859,14 +3525,33 @@ interface(`userdom_use_user_ptys',` +@@ -2859,14 +3529,33 @@ interface(`userdom_use_user_ptys',` ## ## # @@ -41758,7 +41797,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -2885,8 +3570,27 @@ interface(`userdom_dontaudit_use_user_terminals',` +@@ -2885,8 +3574,27 @@ interface(`userdom_dontaudit_use_user_terminals',` type user_tty_device_t, user_devpts_t; ') @@ -41788,7 +41827,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -2958,69 +3662,68 @@ interface(`userdom_spec_domtrans_unpriv_users',` +@@ -2958,69 +3666,68 @@ interface(`userdom_spec_domtrans_unpriv_users',` allow unpriv_userdomain $1:process sigchld; ') @@ -41889,7 +41928,7 @@ index 3c5dba7..a44c781 100644 ## ## ## -@@ -3028,12 +3731,12 @@ interface(`userdom_manage_unpriv_user_semaphores',` +@@ -3028,12 +3735,12 @@ interface(`userdom_manage_unpriv_user_semaphores',` ## ## # @@ -41904,7 +41943,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -3097,7 +3800,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` +@@ -3097,7 +3804,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` domain_entry_file_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; @@ -41913,7 +41952,7 @@ index 3c5dba7..a44c781 100644 allow unpriv_userdomain $1:process sigchld; ') -@@ -3113,29 +3816,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` +@@ -3113,29 +3820,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` # interface(`userdom_search_user_home_content',` gen_require(` @@ -41947,7 +41986,7 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -3217,7 +3904,25 @@ interface(`userdom_dontaudit_use_user_ptys',` +@@ -3217,7 +3908,25 @@ interface(`userdom_dontaudit_use_user_ptys',` type user_devpts_t; ') @@ -41974,18 +42013,67 @@ index 3c5dba7..a44c781 100644 ') ######################################## -@@ -3272,7 +3977,83 @@ interface(`userdom_write_user_tmp_files',` +@@ -3272,12 +3981,13 @@ interface(`userdom_write_user_tmp_files',` type user_tmp_t; ') - allow $1 user_tmp_t:file write_file_perms; + write_files_pattern($1, user_tmp_t, user_tmp_t) -+') -+ -+######################################## -+## + ') + + ######################################## + ## +-## Do not audit attempts to use user ttys. +## Do not audit attempts to write users +## temporary files. + ## + ## + ## +@@ -3285,36 +3995,112 @@ interface(`userdom_write_user_tmp_files',` + ## + ## + # +-interface(`userdom_dontaudit_use_user_ttys',` ++interface(`userdom_dontaudit_write_user_tmp_files',` + gen_require(` +- type user_tty_device_t; ++ type user_tmp_t; + ') + +- dontaudit $1 user_tty_device_t:chr_file rw_file_perms; ++ dontaudit $1 user_tmp_t:file write; + ') + + ######################################## + ## +-## Read the process state of all user domains. ++## Do not audit attempts to delete users ++## temporary files. + ## + ## + ## +-## Domain allowed access. ++## Domain to not audit. + ## + ## + # +-interface(`userdom_read_all_users_state',` ++interface(`userdom_dontaudit_delete_user_tmp_files',` + gen_require(` +- attribute userdomain; ++ type user_tmp_t; + ') + +- read_files_pattern($1, userdomain, userdomain) +- kernel_search_proc($1) ++ dontaudit $1 user_tmp_t:file delete_file_perms; + ') + + ######################################## + ## +-## Get the attributes of all user domains. ++## Do not audit attempts to read/write users ++## temporary fifo files. +## +## +## @@ -41993,37 +42081,36 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_dontaudit_write_user_tmp_files',` ++interface(`userdom_dontaudit_rw_user_tmp_pipes',` + gen_require(` + type user_tmp_t; + ') + -+ dontaudit $1 user_tmp_t:file write; ++ dontaudit $1 user_tmp_t:fifo_file rw_inherited_fifo_file_perms; +') + +######################################## +## -+## Do not audit attempts to delete users -+## temporary files. ++## Allow domain to read/write inherited users ++## fifo files. +## +## +## -+## Domain to not audit. ++## Domain allowed access. +## +## +# -+interface(`userdom_dontaudit_delete_user_tmp_files',` ++interface(`userdom_rw_inherited_user_pipes',` + gen_require(` -+ type user_tmp_t; ++ attribute userdomain; + ') + -+ dontaudit $1 user_tmp_t:file delete_file_perms; ++ allow $1 userdomain:fifo_file rw_inherited_fifo_file_perms; +') + +######################################## +## -+## Do not audit attempts to read/write users -+## temporary fifo files. ++## Do not audit attempts to use user ttys. +## +## +## @@ -42031,18 +42118,17 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_dontaudit_rw_user_tmp_pipes',` ++interface(`userdom_dontaudit_use_user_ttys',` + gen_require(` -+ type user_tmp_t; ++ type user_tty_device_t; + ') + -+ dontaudit $1 user_tmp_t:fifo_file rw_inherited_fifo_file_perms; ++ dontaudit $1 user_tty_device_t:chr_file rw_inherited_file_perms; +') + +######################################## +## -+## Allow domain to read/write inherited users -+## fifo files. ++## Read the process state of all user domains. +## +## +## @@ -42050,108 +42136,47 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_rw_inherited_user_pipes',` ++interface(`userdom_read_all_users_state',` + gen_require(` + attribute userdomain; + ') + -+ allow $1 userdomain:fifo_file rw_inherited_fifo_file_perms; - ') - - ######################################## -@@ -3290,7 +4071,7 @@ interface(`userdom_dontaudit_use_user_ttys',` - type user_tty_device_t; - ') - -- dontaudit $1 user_tty_device_t:chr_file rw_file_perms; -+ dontaudit $1 user_tty_device_t:chr_file rw_inherited_file_perms; - ') - - ######################################## -@@ -3309,6 +4090,7 @@ interface(`userdom_read_all_users_state',` - ') - - read_files_pattern($1, userdomain, userdomain) ++ read_files_pattern($1, userdomain, userdomain) + read_lnk_files_pattern($1,userdomain,userdomain) - kernel_search_proc($1) - ') - -@@ -3385,27 +4167,27 @@ interface(`userdom_signal_all_users',` ++ kernel_search_proc($1) ++') ++ ++######################################## ++## ++## Get the attributes of all user domains. + ## + ## + ## +@@ -3385,6 +4171,42 @@ interface(`userdom_signal_all_users',` allow $1 userdomain:process signal; ') --######################################## +####################################### - ## --## Send a SIGCHLD signal to all user domains. ++## +## Send signull to all user domains. - ## - ## --## --## Domain allowed access. --## ++## ++## +## +## Domain allowed access. +## - ## - # --interface(`userdom_sigchld_all_users',` -- gen_require(` -- attribute userdomain; -- ') ++## ++# +interface(`userdom_signull_all_users',` + gen_require(` + attribute userdomain; + ') - -- allow $1 userdomain:process sigchld; -+ allow $1 userdomain:process signull; - ') - - ######################################## - ## --## Create keys for all user domains. -+## Send kill signals to all user domains. - ## - ## - ## -@@ -3413,17 +4195,17 @@ interface(`userdom_sigchld_all_users',` - ## - ## - # --interface(`userdom_create_all_users_keys',` -+interface(`userdom_kill_all_users',` - gen_require(` - attribute userdomain; - ') - -- allow $1 userdomain:key create; -+ allow $1 userdomain:process sigkill; - ') - - ######################################## - ## --## Send a dbus message to all user domains. -+## Send a SIGCHLD signal to all user domains. - ## - ## - ## -@@ -3431,11 +4213,1552 @@ interface(`userdom_create_all_users_keys',` - ## - ## - # --interface(`userdom_dbus_send_all_users',` -+interface(`userdom_sigchld_all_users',` -+ gen_require(` -+ attribute userdomain; -+ ') + -+ allow $1 userdomain:process sigchld; ++ allow $1 userdomain:process signull; +') + +######################################## +## -+## Read keys for all user domains. ++## Send kill signals to all user domains. +## +## +## @@ -42159,17 +42184,22 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_read_all_users_keys',` ++interface(`userdom_kill_all_users',` + gen_require(` + attribute userdomain; + ') + -+ allow $1 userdomain:key read; ++ allow $1 userdomain:process sigkill; +') + -+######################################## -+## -+## Create keys for all user domains. + ######################################## + ## + ## Send a SIGCHLD signal to all user domains. +@@ -3405,6 +4227,24 @@ interface(`userdom_sigchld_all_users',` + + ######################################## + ## ++## Read keys for all user domains. +## +## +## @@ -42177,28 +42207,20 @@ index 3c5dba7..a44c781 100644 +## +## +# -+interface(`userdom_create_all_users_keys',` ++interface(`userdom_read_all_users_keys',` + gen_require(` + attribute userdomain; + ') + -+ allow $1 userdomain:key create; ++ allow $1 userdomain:key read; +') + +######################################## +## -+## Send a dbus message to all user domains. -+## -+## -+## -+## Domain allowed access. -+## -+## -+# -+interface(`userdom_dbus_send_all_users',` - gen_require(` - attribute userdomain; - class dbus send_msg; + ## Create keys for all user domains. + ## + ## +@@ -3438,4 +4278,1491 @@ interface(`userdom_dbus_send_all_users',` ') allow $1 userdomain:dbus send_msg; diff --git a/policy-f19-contrib.patch b/policy-f19-contrib.patch index d1644f4..79ba43c 100644 --- a/policy-f19-contrib.patch +++ b/policy-f19-contrib.patch @@ -8235,10 +8235,10 @@ index 536ec3c..271b976 100644 - -miscfiles_read_localization(bcfg2_t) diff --git a/bind.fc b/bind.fc -index 2b9a3a1..1742ebf 100644 +index 2b9a3a1..838a9a1 100644 --- a/bind.fc +++ b/bind.fc -@@ -1,54 +1,71 @@ +@@ -1,54 +1,72 @@ -/etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0) -/etc/rc\.d/init\.d/unbound -- gen_context(system_u:object_r:named_initrc_exec_t,s0) +/etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0) @@ -8336,6 +8336,7 @@ index 2b9a3a1..1742ebf 100644 -/var/named/chroot/var/named/slaves(/.*)? gen_context(system_u:object_r:named_cache_t,s0) -/var/named/chroot/var/named/data(/.*)? gen_context(system_u:object_r:named_cache_t,s0) +/var/named/chroot/var/run/named.* gen_context(system_u:object_r:named_var_run_t,s0) ++/var/named/chroot/run/named.* gen_context(system_u:object_r:named_var_run_t,s0) +/var/named/chroot/var/tmp(/.*)? gen_context(system_u:object_r:named_cache_t,s0) +/var/named/chroot/var/named(/.*)? gen_context(system_u:object_r:named_zone_t,s0) +/var/named/chroot/var/named/slaves(/.*)? gen_context(system_u:object_r:named_cache_t,s0) @@ -78096,10 +78097,10 @@ index 0000000..b7db254 +# Empty diff --git a/sandbox.if b/sandbox.if new file mode 100644 -index 0000000..577dfa7 +index 0000000..a2cb772 --- /dev/null +++ b/sandbox.if -@@ -0,0 +1,55 @@ +@@ -0,0 +1,85 @@ + +## policy for sandbox + @@ -78124,12 +78125,42 @@ index 0000000..577dfa7 + attribute sandbox_domain; + ') + -+ allow $1 sandbox_domain:process transition; -+ dontaudit $1 sandbox_domain:process { noatsecure siginh rlimitinh }; -+ role $2 types sandbox_domain; -+ allow sandbox_domain $1:process { sigchld signull }; -+ allow sandbox_domain $1:fifo_file rw_inherited_fifo_file_perms; -+ dontaudit sandbox_domain $1:process signal; ++ sandbox_dyntransition($1) #885288 ++ allow $1 sandbox_domain:process transition; ++ dontaudit $1 sandbox_domain:process { noatsecure siginh rlimitinh }; ++ ++ role $2 types sandbox_domain; ++ ++ allow sandbox_domain $1:process { sigchld signull }; ++ allow sandbox_domain $1:fifo_file rw_inherited_fifo_file_perms; ++ ++ dontaudit sandbox_domain $1:process signal; ++ dontaudit sandbox_domain $1:key { link read search view }; ++ dontaudit sandbox_domain $1:unix_stream_socket rw_socket_perms; ++') ++ ++######################################## ++## ++## Execute sandbox in the sandbox domain, and ++## allow the specified role the sandbox domain. ++## ++## ++## ++## Domain allowed access ++## ++## ++## ++## ++## The role to be allowed the sandbox domain. ++## ++## ++# ++interface(`sandbox_dyntransition',` ++ gen_require(` ++ attribute sandbox_domain; ++ ') ++ ++ allow $1 sandbox_domain:process dyntransition; +') + +######################################## @@ -90823,7 +90854,7 @@ index 1c35171..2cba4df 100644 domain_system_change_exemption($1) role_transition $2 varnishd_initrc_exec_t system_r; diff --git a/varnishd.te b/varnishd.te -index 9d4d8cb..f50c3ff 100644 +index 9d4d8cb..a58e2dd 100644 --- a/varnishd.te +++ b/varnishd.te @@ -21,7 +21,7 @@ type varnishd_initrc_exec_t; @@ -90835,7 +90866,7 @@ index 9d4d8cb..f50c3ff 100644 type varnishd_tmp_t; files_tmp_file(varnishd_tmp_t) -@@ -43,7 +43,7 @@ type varnishlog_var_run_t; +@@ -43,16 +43,16 @@ type varnishlog_var_run_t; files_pid_file(varnishlog_var_run_t) type varnishlog_log_t; @@ -90844,9 +90875,11 @@ index 9d4d8cb..f50c3ff 100644 ######################################## # -@@ -52,7 +52,7 @@ files_type(varnishlog_log_t) + # Local policy + # - allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid }; +-allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid }; ++allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid chown }; dontaudit varnishd_t self:capability sys_tty_config; -allow varnishd_t self:process signal; +allow varnishd_t self:process { execmem signal }; diff --git a/selinux-policy.spec b/selinux-policy.spec index c8d5ead..f2f6ca7 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.12.1 -Release: 74.25%{?dist} +Release: 74.26%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -542,6 +542,9 @@ SELinux Reference policy mls base module. %endif %changelog +* Wed May 02 2014 Miroslav Grepl 3.12.1-74.26 +- Update sandbox_transition() to call sandbox_dyntrasition(). + * Fri May 02 2014 Lukas Vrabec 3.12.1-74.25 - Add interface sysnet_manage_ifconfig_run - Added sysnet_filetrans_named_content_ifconfig interface