diff --git a/policy-F16.patch b/policy-F16.patch index a87e93b..4f509ef 100644 --- a/policy-F16.patch +++ b/policy-F16.patch @@ -65095,18 +65095,20 @@ index e0791b9..98d188e 100644 + term_dontaudit_use_all_ptys(traceroute_t) +') diff --git a/policy/modules/admin/passenger.fc b/policy/modules/admin/passenger.fc -index 545518d..1f3251d 100644 +index 545518d..9a77810 100644 --- a/policy/modules/admin/passenger.fc +++ b/policy/modules/admin/passenger.fc -@@ -1,7 +1,7 @@ +@@ -1,7 +1,9 @@ -/usr/lib/ruby/gems/.*/passenger-.*/ext/apache2/ApplicationPoolServerExecutable -- gen_context(system_u:object_r:passenger_exec_t,s0) -/usr/lib/ruby/gems/.*/passenger-.*/agents/PassengerWatchdog -- gen_context(system_u:object_r:passenger_exec_t,s0) -/usr/lib/ruby/gems/.*/passenger-.*/agents/PassengerLoggingAgent -- gen_context(system_u:object_r:passenger_exec_t,s0) -/usr/lib/ruby/gems/.*/passenger-.*/agents/apache2/PassengerHelperAgent -- gen_context(system_u:object_r:passenger_exec_t,s0) -+/usr/.*/gems/.*/passenger-.*/ext/apache2/ApplicationPoolServerExecutable -- gen_context(system_u:object_r:passenger_exec_t,s0) -+/usr/.*/gems/.*/passenger-.*/agents/PassengerWatchdog -- gen_context(system_u:object_r:passenger_exec_t,s0) -+/usr/.*/gems/.*/passenger-.*/agents/PassengerLoggingAgent -- gen_context(system_u:object_r:passenger_exec_t,s0) -+/usr/.*/gems/.*/passenger-.*/agents/apache2/PassengerHelperAgent -- gen_context(system_u:object_r:passenger_exec_t,s0) ++/usr/share/gems/.*/Passenger.* -- gen_context(system_u:object_r:passenger_exec_t,s0) ++/usr/share/gems/.*/ApplicationPoolServerExecutable -- gen_context(system_u:object_r:passenger_exec_t,s0) ++ ++/usr/lib/gems/.*/Passenger.* -- gen_context(system_u:object_r:passenger_exec_t,s0) ++/usr/lib/gems/.*/ApplicationPoolServerExecutable -- gen_context(system_u:object_r:passenger_exec_t,s0) ++ /var/lib/passenger(/.*)? gen_context(system_u:object_r:passenger_var_lib_t,s0) @@ -71305,10 +71307,10 @@ index 0000000..fb58f33 +') diff --git a/policy/modules/apps/jockey.te b/policy/modules/apps/jockey.te new file mode 100644 -index 0000000..daf38ab +index 0000000..6479dae --- /dev/null +++ b/policy/modules/apps/jockey.te -@@ -0,0 +1,53 @@ +@@ -0,0 +1,57 @@ +policy_module(jockey, 1.0.0) + +######################################## @@ -71358,6 +71360,10 @@ index 0000000..daf38ab +miscfiles_read_localization(jockey_t) + +optional_policy(` ++ gnome_dontaudit_search_config(jockey_t) ++') ++ ++optional_policy(` + modutils_domtrans_insmod(jockey_t) + modutils_read_module_config(jockey_t) + modutils_list_module_config(jockey_t) @@ -72189,7 +72195,7 @@ index fbb5c5a..67c1168 100644 +') + diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te -index 2e9318b..25de928 100644 +index 2e9318b..4476c7f 100644 --- a/policy/modules/apps/mozilla.te +++ b/policy/modules/apps/mozilla.te @@ -7,11 +7,25 @@ policy_module(mozilla, 2.3.3) @@ -72265,7 +72271,12 @@ index 2e9318b..25de928 100644 corenet_tcp_connect_ipp_port(mozilla_t) corenet_tcp_connect_generic_port(mozilla_t) corenet_tcp_connect_soundd_port(mozilla_t) -@@ -156,6 +183,10 @@ fs_rw_tmpfs_files(mozilla_t) +@@ -152,10 +179,14 @@ files_dontaudit_getattr_boot_dirs(mozilla_t) + + fs_search_auto_mountpoints(mozilla_t) + fs_list_inotifyfs(mozilla_t) +-fs_rw_tmpfs_files(mozilla_t) ++fs_rw_inherited_tmpfs_files(mozilla_t) term_dontaudit_getattr_pty_dirs(mozilla_t) @@ -72443,7 +72454,7 @@ index 2e9318b..25de928 100644 files_read_usr_files(mozilla_plugin_t) files_list_mnt(mozilla_plugin_t) +files_exec_usr_files(mozilla_plugin_t) -+fs_dontaudit_read_tmpfs_files(mozilla_plugin_t) ++fs_rw_inherited_tmpfs_files(mozilla_plugin_t) fs_getattr_all_fs(mozilla_plugin_t) fs_list_dos(mozilla_plugin_t) @@ -76065,7 +76076,7 @@ index 3cfb128..d49274d 100644 + gnome_data_filetrans($1, telepathy_data_home_t, dir, "telepathy") +') diff --git a/policy/modules/apps/telepathy.te b/policy/modules/apps/telepathy.te -index 2533ea0..92f0ecb 100644 +index 2533ea0..8c499f3 100644 --- a/policy/modules/apps/telepathy.te +++ b/policy/modules/apps/telepathy.te @@ -26,12 +26,18 @@ attribute telepathy_executable; @@ -76254,7 +76265,7 @@ index 2533ea0..92f0ecb 100644 dbus_system_bus_client(telepathy_msn_t) optional_policy(` -@@ -361,14 +405,16 @@ allow telepathy_domain self:fifo_file rw_fifo_file_perms; +@@ -361,13 +405,16 @@ allow telepathy_domain self:fifo_file rw_fifo_file_perms; allow telepathy_domain self:tcp_socket create_socket_perms; allow telepathy_domain self:udp_socket create_socket_perms; @@ -76267,13 +76278,13 @@ index 2533ea0..92f0ecb 100644 +fs_getattr_all_fs(telepathy_domain) fs_search_auto_mountpoints(telepathy_domain) - --auth_use_nsswitch(telepathy_domain) - +-auth_use_nsswitch(telepathy_domain) ++fs_rw_inherited_tmpfs_files(telepathy_domain) + miscfiles_read_localization(telepathy_domain) - optional_policy(` -@@ -376,5 +422,23 @@ optional_policy(` +@@ -376,5 +423,23 @@ optional_policy(` ') optional_policy(` @@ -76451,10 +76462,10 @@ index 0000000..9127cec +') diff --git a/policy/modules/apps/thumb.te b/policy/modules/apps/thumb.te new file mode 100644 -index 0000000..d776250 +index 0000000..c7af0d8 --- /dev/null +++ b/policy/modules/apps/thumb.te -@@ -0,0 +1,120 @@ +@@ -0,0 +1,121 @@ +policy_module(thumb, 1.0.0) + +######################################## @@ -76536,6 +76547,7 @@ index 0000000..d776250 + +fs_getattr_all_fs(thumb_t) +fs_read_dos_files(thumb_t) ++fs_rw_inherited_tmpfs_files(thumb_t) + +auth_use_nsswitch(thumb_t) + @@ -77801,7 +77813,7 @@ index f9b25c1..9af1f7a 100644 +/usr/lib/udev/devices/ppp -c gen_context(system_u:object_r:ppp_device_t,s0) +/usr/lib/udev/devices/net/.* -c gen_context(system_u:object_r:tun_tap_device_t,s0) diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in -index 4f3b542..0ebac89 100644 +index 4f3b542..ba64277 100644 --- a/policy/modules/kernel/corenetwork.if.in +++ b/policy/modules/kernel/corenetwork.if.in @@ -55,6 +55,7 @@ interface(`corenet_reserved_port',` @@ -77934,10 +77946,10 @@ index 4f3b542..0ebac89 100644 +# +interface(`corenet_dccp_sendrecv_generic_port',` + gen_require(` -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; + ') + -+ allow $1 { port_t unreserved_port_t }:dccp_socket { send_msg recv_msg }; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:dccp_socket { send_msg recv_msg }; +') + +######################################## @@ -77950,10 +77962,10 @@ index 4f3b542..0ebac89 100644 interface(`corenet_tcp_sendrecv_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; + ') + -+ allow $1 { port_t unreserved_port_t }:tcp_socket { send_msg recv_msg }; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:tcp_socket { send_msg recv_msg }; +') + +######################################## @@ -77970,11 +77982,11 @@ index 4f3b542..0ebac89 100644 +# +interface(`corenet_dontaudit_dccp_sendrecv_generic_port',` + gen_require(` -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - allow $1 port_t:tcp_socket { send_msg recv_msg }; -+ dontaudit $1 { port_t unreserved_port_t }:dccp_socket { send_msg recv_msg }; ++ dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:dccp_socket { send_msg recv_msg }; ') ######################################## @@ -77983,11 +77995,11 @@ index 4f3b542..0ebac89 100644 interface(`corenet_dontaudit_tcp_sendrecv_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - dontaudit $1 port_t:tcp_socket { send_msg recv_msg }; -+ dontaudit $1 { port_t unreserved_port_t }:tcp_socket { send_msg recv_msg }; ++ dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:tcp_socket { send_msg recv_msg }; ') ######################################## @@ -77996,11 +78008,11 @@ index 4f3b542..0ebac89 100644 interface(`corenet_udp_send_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - allow $1 port_t:udp_socket send_msg; -+ allow $1 { port_t unreserved_port_t }:udp_socket send_msg; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:udp_socket send_msg; ') ######################################## @@ -78009,11 +78021,11 @@ index 4f3b542..0ebac89 100644 interface(`corenet_udp_receive_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - allow $1 port_t:udp_socket recv_msg; -+ allow $1 { port_t unreserved_port_t }:udp_socket recv_msg; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:udp_socket recv_msg; ') ######################################## @@ -78031,11 +78043,11 @@ index 4f3b542..0ebac89 100644 +# +interface(`corenet_dccp_bind_generic_port',` + gen_require(` -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; + attribute defined_port_type; + ') + -+ allow $1 { port_t unreserved_port_t }:dccp_socket name_bind; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:dccp_socket name_bind; + dontaudit $1 defined_port_type:dccp_socket name_bind; +') + @@ -78050,11 +78062,11 @@ index 4f3b542..0ebac89 100644 gen_require(` - type port_t; - attribute port_type; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; + attribute defined_port_type; + ') + -+ allow $1 { port_t unreserved_port_t }:tcp_socket name_bind; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:tcp_socket name_bind; + dontaudit $1 defined_port_type:tcp_socket name_bind; +') + @@ -78071,12 +78083,12 @@ index 4f3b542..0ebac89 100644 +# +interface(`corenet_dontaudit_dccp_bind_generic_port',` + gen_require(` -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - allow $1 port_t:tcp_socket name_bind; - dontaudit $1 { port_type -port_t }:tcp_socket name_bind; -+ dontaudit $1 { port_t unreserved_port_t }:dccp_socket name_bind; ++ dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:dccp_socket name_bind; ') ######################################## @@ -78085,11 +78097,11 @@ index 4f3b542..0ebac89 100644 interface(`corenet_dontaudit_tcp_bind_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - dontaudit $1 port_t:tcp_socket name_bind; -+ dontaudit $1 { port_t unreserved_port_t }:tcp_socket name_bind; ++ dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:tcp_socket name_bind; ') ######################################## @@ -78099,13 +78111,13 @@ index 4f3b542..0ebac89 100644 gen_require(` - type port_t; - attribute port_type; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; + attribute defined_port_type; ') - allow $1 port_t:udp_socket name_bind; - dontaudit $1 { port_type -port_t }:udp_socket name_bind; -+ allow $1 { port_t unreserved_port_t }:udp_socket name_bind; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:udp_socket name_bind; + dontaudit $1 defined_port_type:udp_socket name_bind; +') + @@ -78121,10 +78133,10 @@ index 4f3b542..0ebac89 100644 +# +interface(`corenet_dccp_connect_generic_port',` + gen_require(` -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t,ephemeral_port_t; + ') + -+ allow $1 { port_t unreserved_port_t }:dccp_socket name_connect; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:dccp_socket name_connect; ') ######################################## @@ -78133,11 +78145,11 @@ index 4f3b542..0ebac89 100644 interface(`corenet_tcp_connect_generic_port',` gen_require(` - type port_t; -+ type port_t, unreserved_port_t; ++ type port_t, unreserved_port_t, ephemeral_port_t; ') - allow $1 port_t:tcp_socket name_connect; -+ allow $1 { port_t unreserved_port_t }:tcp_socket name_connect; ++ allow $1 { port_t unreserved_port_t ephemeral_port_t }:tcp_socket name_connect; +') + +######################################## @@ -98337,10 +98349,10 @@ index 6077339..d10acd2 100644 dev_manage_generic_blk_files(clogd_t) diff --git a/policy/modules/services/cloudform.fc b/policy/modules/services/cloudform.fc new file mode 100644 -index 0000000..e59cc85 +index 0000000..1f7fa13 --- /dev/null +++ b/policy/modules/services/cloudform.fc -@@ -0,0 +1,20 @@ +@@ -0,0 +1,22 @@ +/etc/rc\.d/init\.d/iwhd -- gen_context(system_u:object_r:iwhd_initrc_exec_t,s0) +/etc/rc\.d/init\.d/mongod -- gen_context(system_u:object_r:mongod_initrc_exec_t,s0) + @@ -98356,6 +98368,8 @@ index 0000000..e59cc85 +/var/log/deltacloud-core(/.*)? gen_context(system_u:object_r:deltacloudd_log_t,s0) +/var/log/iwhd\.log -- gen_context(system_u:object_r:iwhd_log_t,s0) +/var/log/mongodb(/.*)? gen_context(system_u:object_r:mongod_log_t,s0) ++/var/log/mongo(/.*)? gen_context(system_u:object_r:mongod_log_t,s0) ++/var/log/mongo/mongod\.log.* -- gen_context(system_u:object_r:mongod_log_t,s0) +/var/log/aeolus-conductor/dbomatic\.log -- gen_context(system_u:object_r:mongod_log_t,s0) + +/var/run/mongodb(/.*)? gen_context(system_u:object_r:mongod_var_run_t,s0) @@ -98409,10 +98423,10 @@ index 0000000..7f55959 +') diff --git a/policy/modules/services/cloudform.te b/policy/modules/services/cloudform.te new file mode 100644 -index 0000000..7e1d71e +index 0000000..a6fb987 --- /dev/null +++ b/policy/modules/services/cloudform.te -@@ -0,0 +1,199 @@ +@@ -0,0 +1,200 @@ +policy_module(cloudform, 1.0) +######################################## +# @@ -98574,6 +98588,7 @@ index 0000000..7e1d71e +manage_dirs_pattern(mongod_t, mongod_log_t, mongod_log_t) +manage_files_pattern(mongod_t, mongod_log_t, mongod_log_t) +logging_log_filetrans(mongod_t, mongod_log_t, file, "dbomatic.log") ++logging_log_filetrans(mongod_t, mongod_log_t, file, "mongod.log") + +manage_dirs_pattern(mongod_t, mongod_var_lib_t, mongod_var_lib_t) +manage_files_pattern(mongod_t, mongod_var_lib_t, mongod_var_lib_t) @@ -122884,10 +122899,10 @@ index 0000000..548d0a2 +') diff --git a/policy/modules/services/piranha.te b/policy/modules/services/piranha.te new file mode 100644 -index 0000000..44c7098 +index 0000000..3c8fe44 --- /dev/null +++ b/policy/modules/services/piranha.te -@@ -0,0 +1,302 @@ +@@ -0,0 +1,306 @@ +policy_module(piranha, 1.0.0) + +######################################## @@ -123115,6 +123130,10 @@ index 0000000..44c7098 +') + +optional_policy(` ++ iptables_domtrans(piranha_pulse_t) ++') ++ ++optional_policy(` + ldap_systemctl(piranha_pulse_t) + ldap_initrc_domtrans(piranha_pulse_t) + ldap_domtrans(piranha_pulse_t) @@ -138329,10 +138348,10 @@ index 0000000..a8385bc +/var/run/tomcat6?\.pid -- gen_context(system_u:object_r:tomcat_var_run_t,s0) diff --git a/policy/modules/services/tomcat.if b/policy/modules/services/tomcat.if new file mode 100644 -index 0000000..23251b7 +index 0000000..226293f --- /dev/null +++ b/policy/modules/services/tomcat.if -@@ -0,0 +1,353 @@ +@@ -0,0 +1,395 @@ + +## policy for tomcat + @@ -138353,11 +138372,54 @@ index 0000000..23251b7 + ') + + type $1_t, tomcat_domain; -+ type $1_exec_t; -+ init_daemon_domain($1_t, $1_exec_t) ++ type $1_exec_t; ++ init_daemon_domain($1_t, $1_exec_t) ++ ++ type $1_cache_t; ++ files_type($1_cache_t) ++ ++ type $1_log_t; ++ logging_log_file($1_log_t) ++ ++ type $1_var_lib_t; ++ files_type($1_var_lib_t) ++ ++ type $1_var_run_t; ++ files_pid_file($1_var_run_t) ++ ++ type $1_tmp_t; ++ files_tmp_file($1_tmp_t) ++ ++ ################################## ++ # ++ # Local policy ++ # ++ ++ manage_dirs_pattern($1_t, $1_cache_t, $1_cache_t) ++ manage_files_pattern($1_t, $1_cache_t, $1_cache_t) ++ manage_lnk_files_pattern($1_t, $1_cache_t, $1_cache_t) ++ files_var_filetrans($1_t, $1_cache_t, { dir file }) ++ ++ manage_dirs_pattern($1_t, $1_log_t, $1_log_t) ++ manage_files_pattern($1_t, $1_log_t, $1_log_t) ++ logging_log_filetrans($1_t, $1_log_t, { dir file }) ++ ++ manage_dirs_pattern($1_t, $1_var_lib_t, $1_var_lib_t) ++ manage_files_pattern($1_t, $1_var_lib_t, $1_var_lib_t) ++ files_var_lib_filetrans($1_t, $1_var_lib_t, { dir file }) ++ ++ manage_dirs_pattern($1_t, $1_var_run_t, $1_var_run_t) ++ manage_files_pattern($1_t, $1_var_run_t, $1_var_run_t) ++ files_pid_filetrans($1_t, $1_var_run_t, { dir file }) ++ ++ manage_dirs_pattern($1_t, $1_tmp_t, $1_tmp_t) ++ manage_files_pattern($1_t, $1_tmp_t, $1_tmp_t) ++ manage_fifo_files_pattern($1_t, $1_tmp_t, $1_tmp_t) ++ files_tmp_filetrans($1_t, $1_tmp_t, { file fifo_file dir }) + + can_exec($1_t, $1_exec_t) + ++ kernel_read_system_state($1_t) +') + +######################################## @@ -138628,7 +138690,6 @@ index 0000000..23251b7 + ') + + systemd_exec_systemctl($1) -+ systemd_read_fifo_file_password_run($1) + allow $1 tomcat_unit_file_t:file read_file_perms; + allow $1 tomcat_unit_file_t:service manage_service_perms; + @@ -138688,10 +138749,10 @@ index 0000000..23251b7 +') diff --git a/policy/modules/services/tomcat.te b/policy/modules/services/tomcat.te new file mode 100644 -index 0000000..a986de8 +index 0000000..0ed60d6 --- /dev/null +++ b/policy/modules/services/tomcat.te -@@ -0,0 +1,108 @@ +@@ -0,0 +1,69 @@ +policy_module(tomcat, 1.0.0) + +######################################## @@ -138703,21 +138764,6 @@ index 0000000..a986de8 + +tomcat_domain_template(tomcat) + -+type tomcat_cache_t; -+files_type(tomcat_cache_t) -+ -+type tomcat_log_t; -+logging_log_file(tomcat_log_t) -+ -+type tomcat_var_lib_t; -+files_type(tomcat_var_lib_t) -+ -+type tomcat_var_run_t; -+files_pid_file(tomcat_var_run_t) -+ -+type tomcat_tmp_t; -+files_tmp_file(tomcat_tmp_t) -+ +type tomcat_unit_file_t; +systemd_unit_file(tomcat_unit_file_t) + @@ -138742,33 +138788,10 @@ index 0000000..a986de8 +allow tomcat_domain self:fifo_file rw_fifo_file_perms; +allow tomcat_domain self:unix_stream_socket create_stream_socket_perms; + -+manage_dirs_pattern(tomcat_domain, tomcat_cache_t, tomcat_cache_t) -+manage_files_pattern(tomcat_domain, tomcat_cache_t, tomcat_cache_t) -+manage_lnk_files_pattern(tomcat_domain, tomcat_cache_t, tomcat_cache_t) -+files_var_filetrans(tomcat_domain, tomcat_cache_t, { dir file }) -+ -+manage_dirs_pattern(tomcat_domain, tomcat_log_t, tomcat_log_t) -+manage_files_pattern(tomcat_domain, tomcat_log_t, tomcat_log_t) -+logging_log_filetrans(tomcat_domain, tomcat_log_t, { dir file }) -+ -+manage_dirs_pattern(tomcat_domain, tomcat_var_lib_t, tomcat_var_lib_t) -+manage_files_pattern(tomcat_domain, tomcat_var_lib_t, tomcat_var_lib_t) -+files_var_lib_filetrans(tomcat_domain, tomcat_var_lib_t, { dir file }) -+ -+manage_dirs_pattern(tomcat_domain, tomcat_var_run_t, tomcat_var_run_t) -+manage_files_pattern(tomcat_domain, tomcat_var_run_t, tomcat_var_run_t) -+files_pid_filetrans(tomcat_domain, tomcat_var_run_t, { dir file }) -+ -+manage_dirs_pattern(tomcat_t, tomcat_tmp_t, tomcat_tmp_t) -+manage_files_pattern(tomcat_t, tomcat_tmp_t, tomcat_tmp_t) -+manage_fifo_files_pattern(tomcat_t, tomcat_tmp_t, tomcat_tmp_t) -+files_tmp_filetrans(tomcat_t, tomcat_tmp_t, { file fifo_file dir }) -+ +# we want to stay in a new tomcat domain if we call tomcat binary from a script +# initrc_t@tomcat_test_exec_t->tomcat_test_t@tomcat_exec_t->tomcat_test_t +can_exec(tomcat_domain, tomcat_exec_t) + -+kernel_read_system_state(tomcat_domain) +kernel_read_network_state(tomcat_domain) + +corecmd_exec_bin(tomcat_domain) @@ -138796,7 +138819,6 @@ index 0000000..a986de8 + +auth_read_passwd(tomcat_domain) + -+miscfiles_read_localization(tomcat_domain) + +sysnet_dns_name_resolve(tomcat_domain) + diff --git a/selinux-policy.spec b/selinux-policy.spec index da2b817..f4183fc 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.10.0 -Release: 149%{?dist} +Release: 150%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -479,6 +479,14 @@ SELinux Reference policy mls base module. %endif %changelog +* Mon Sep 24 2012 Miroslav Grepl 3.10.0-150 +- Backport tomcat fixes from F18 +- Add filename transition for mongod.log +- Dontaudit jockey to search /root/.local +- Fix passenger labeling +- fix corenetwork interfaces which needs to require ephemeral_port_t +- Allow user domains to use tmpfs_t when it is created by the kernel and inherited by the app, IE No Open + * Mon Sep 17 2012 Miroslav Grepl 3.10.0-149 - Add sanlock_use_fusefs boolean - Add stapserver policy from F18