]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
patch from dan Thu, 23 Feb 2006 14:26:05 -0500
authorChris PeBenito <cpebenito@tresys.com>
Mon, 27 Feb 2006 16:23:39 +0000 (16:23 +0000)
committerChris PeBenito <cpebenito@tresys.com>
Mon, 27 Feb 2006 16:23:39 +0000 (16:23 +0000)
20 files changed:
refpolicy/Makefile
refpolicy/policy/modules/admin/logwatch.te
refpolicy/policy/modules/admin/vpn.te
refpolicy/policy/modules/apps/java.if
refpolicy/policy/modules/apps/java.te
refpolicy/policy/modules/kernel/corecommands.fc
refpolicy/policy/modules/kernel/corecommands.te
refpolicy/policy/modules/kernel/devices.fc
refpolicy/policy/modules/kernel/devices.te
refpolicy/policy/modules/kernel/files.te
refpolicy/policy/modules/services/apache.fc
refpolicy/policy/modules/services/apache.if
refpolicy/policy/modules/services/apache.te
refpolicy/policy/modules/services/automount.te
refpolicy/policy/modules/services/cron.te
refpolicy/policy/modules/services/hal.te
refpolicy/policy/modules/services/xserver.te
refpolicy/policy/modules/system/fstools.te
refpolicy/policy/modules/system/mount.te
refpolicy/policy/modules/system/selinuxutil.te

index 5e0043057afdeb1fc243f28a6da95c7dd60eea81..99ffe62ef0b886cbb40d2b3afafd8a6b101b9c5c 100644 (file)
@@ -446,14 +446,14 @@ install-headers: $(TUNXML) $(BOOLXML)
                        $(MODDIR)/$$i/metadata.xml \
                        $(HEADERDIR)/$$i ;\
        done
-       $(verbose) echo "TYPE=$(TYPE)" > $(HEADERDIR)/build.conf
-       $(verbose) echo "NAME=$(NAME)" >> $(HEADERDIR)/build.conf
+       $(verbose) echo "TYPE ?= $(TYPE)" > $(HEADERDIR)/build.conf
+       $(verbose) echo "NAME ?= $(NAME)" >> $(HEADERDIR)/build.conf
 ifneq "$(DISTRO)" ""
-       $(verbose) echo "DISTRO=$(DISTRO)" >> $(HEADERDIR)/build.conf
+       $(verbose) echo "DISTRO ?= $(DISTRO)" >> $(HEADERDIR)/build.conf
 endif
-       $(verbose) echo "MONOLITHIC=n" >> $(HEADERDIR)/build.conf
-       $(verbose) echo "DIRECT_INITRC=$(DIRECT_INITRC)" >> $(HEADERDIR)/build.conf
-       $(verbose) echo "POLY=$(POLY)" >> $(HEADERDIR)/build.conf
+       $(verbose) echo "MONOLITHIC ?= n" >> $(HEADERDIR)/build.conf
+       $(verbose) echo "DIRECT_INITRC ?= $(DIRECT_INITRC)" >> $(HEADERDIR)/build.conf
+       $(verbose) echo "POLY ?= $(POLY)" >> $(HEADERDIR)/build.conf
        $(verbose) install -m 644 $(SUPPORT)/Makefile.devel $(HEADERDIR)/Makefile
 
 ########################################
index 913ad19f197409b1e68d7ef1fe2b4264760a0e42..adace0bea03693a70a17deb9a52a0083ef877b25 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(logwatch,1.0.1)
+policy_module(logwatch,1.0.2)
 
 #################################
 #
@@ -71,6 +71,8 @@ miscfiles_read_localization(logwatch_t)
 
 selinux_dontaudit_getattr_dir(logwatch_t)
 
+sysnet_dns_name_resolve(logwatch_t)
+
 userdom_dontaudit_search_sysadm_home_dirs(logwatch_t)
 userdom_dontaudit_getattr_sysadm_home_dirs(logwatch_t)
 
index 0c5ee06712ae97290e31fe23da751aa3576af39c..42be63bcbbc1845f26c7902af6c28e41cc012767 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(vpnc,1.1.1)
+policy_module(vpnc,1.1.2)
 
 ########################################
 #
@@ -91,6 +91,8 @@ libs_exec_lib_files(vpnc_t)
 libs_use_ld_so(vpnc_t)
 libs_use_shared_libs(vpnc_t)
 
+locallogin_use_fd(vpnc_t)
+
 logging_send_syslog_msg(vpnc_t)
 
 miscfiles_read_localization(vpnc_t)
@@ -106,6 +108,10 @@ userdom_dontaudit_search_all_users_home_content(vpnc_t)
 
 optional_policy(`dbus',`
        dbus_system_bus_client_template(vpnc,vpnc_t)
+       dbus_send_system_bus(vpnc_t)
+       optional_policy(`networkmanager',`
+               networkmanager_dbus_chat(vpnc_t)
+       ')
 ')
 
 optional_policy(`mount',`
index 949ac27e131be86bc3c3811f16d5c7280adf7697..015f28d57d19abb543694a12d4a05a2a22b298bc 100644 (file)
@@ -57,7 +57,7 @@ template(`java_per_userdomain_template',`
        # Local policy
        #
 
-       allow $1_javaplugin_t self:process { signal_perms getsched setsched };
+       allow $1_javaplugin_t self:process { signal_perms getsched setsched execmem };
        allow $1_javaplugin_t self:fifo_file rw_file_perms;
        allow $1_javaplugin_t self:tcp_socket create_socket_perms;
        allow $1_javaplugin_t self:udp_socket create_socket_perms;
@@ -149,13 +149,8 @@ template(`java_per_userdomain_template',`
        userdom_manage_user_home_content_sockets($1,$1_javaplugin_t)
        userdom_user_home_dir_filetrans_user_home_content($1,$1_javaplugin_t,{ file lnk_file sock_file fifo_file })
 
-       # libdeploy.so legacy
-       tunable_policy(`allow_execmem',`
-               allow $1_javaplugin_t self:process execmem;
-       ')
-       
        tunable_policy(`allow_java_execstack',`
-               allow $1_javaplugin_t self:process { execmem execstack };
+               allow $1_javaplugin_t self:process execstack;
 
                allow $1_javaplugin_t $1_javaplugin_tmp_t:file execute;
 
index caea9aaa924c4861a448fee496f5f779af56de69..ecf64bb71b3aa675ff40c3361a08ceb98b8f51b5 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(java,1.0.1)
+policy_module(java,1.0.2)
 
 ########################################
 #
index 94c7af68daf02c38a619889b1d317ba0ee6fa8a7..3f791190f27df1ed4337111cf8001b81e8d1ba1c 100644 (file)
@@ -138,6 +138,7 @@ ifdef(`distro_gentoo',`
 /usr/share/hal/scripts(/.*)?           gen_context(system_u:object_r:bin_t,s0)
 /usr/share/mc/extfs/.*         --      gen_context(system_u:object_r:bin_t,s0)
 /usr/share/printconf/util/print\.py -- gen_context(system_u:object_r:bin_t,s0)
+/usr/share/selinux/devel/policygentool -- gen_context(system_u:object_r:bin_t,s0)
 /usr/share/turboprint/lib(/.*)?        --      gen_context(system_u:object_r:bin_t,s0)
 
 /usr/X11R6/lib(64)?/X11/xkb/xkbcomp -- gen_context(system_u:object_r:bin_t,s0)
index 925e754d1c6b1bb2af461c894002ae993fad4b59..330c3c701ca60f8ad99136703414173de5c006af 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(corecommands,1.2.0)
+policy_module(corecommands,1.2.1)
 
 ########################################
 #
index 54bbddf01e961750da168c32be8e7207230e230e..55e2415913d1c497ad465f15cbbd7973fd93318f 100644 (file)
@@ -13,6 +13,7 @@
 /dev/beep              -c      gen_context(system_u:object_r:sound_device_t,s0)
 /dev/console           -c      gen_context(system_u:object_r:console_device_t,s0)
 /dev/dsp.*             -c      gen_context(system_u:object_r:sound_device_t,s0)
+/dev/efirtc            -c      gen_context(system_u:object_r:clock_device_t,s0)
 /dev/fb[0-9]*          -c      gen_context(system_u:object_r:framebuf_device_t,s0)
 /dev/full              -c      gen_context(system_u:object_r:null_device_t,s0)
 /dev/irlpt[0-9]+               -c      gen_context(system_u:object_r:printer_device_t,s0)
index ac5c603998322860ef52e1f7bd10f9af0b76c8a4..95e28c2e1aa4c97c155d65df7e16a9f5a692a239 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(devices,1.0.4)
+policy_module(devices,1.0.5)
 
 ########################################
 #
index 29de9d7ac2ce6ca64a826e1c4f77bd90be9ee402..b1d1756b577e87d1f2a1e2950c256606dcf8888f 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(files,1.1.1)
+policy_module(files,1.1.2)
 
 ########################################
 #
@@ -74,9 +74,10 @@ sid file gen_context(system_u:object_r:file_t,s0)
 # home_root_t is the type for the directory where user home directories
 # are created
 #
-type home_root_t, file_type, mountpoint; #, polyparent
+type home_root_t, file_type, mountpoint;
 fs_associate(home_root_t)
 fs_associate_noxattr(home_root_t)
+files_poly_parent(home_root_t)
 
 #
 # lost_found_t is the type for the lost+found directories.
@@ -107,9 +108,10 @@ fs_associate_noxattr(readable_t)
 #
 # root_t is the type for rootfs and the root directory.
 #
-type root_t, file_type, mountpoint; #, polyparent
+type root_t, file_type, mountpoint;
 fs_associate(root_t)
 fs_associate_noxattr(root_t)
+files_poly_parent(root_t)
 kernel_rootfs_mountpoint(root_t)
 genfscon rootfs / gen_context(system_u:object_r:root_t,s0)
 
@@ -125,6 +127,7 @@ fs_associate_noxattr(src_t)
 #
 type tmp_t, mountpoint; #, polydir
 files_tmp_file(tmp_t)
+files_poly_parent(tmp_t)
 
 #
 # usr_t is the type for /usr.
index 1eb9976f343eed501decdcd4025317525a126282..737fcf61966c862882f582f126d12e3f9788628b 100644 (file)
@@ -45,7 +45,7 @@ ifdef(`distro_suse', `
 /var/cache/rt3(/.*)?                   gen_context(system_u:object_r:httpd_cache_t,s0)
 /var/cache/ssl.*\.sem          --      gen_context(system_u:object_r:httpd_cache_t,s0)
 
-/var/lib/cacti(/.*)?                   gen_context(system_u:object_r:httpd_var_lib_t,s0)
+/var/lib/cacti/rra(/.*)?               gen_context(system_u:object_r:httpd_sys_content_t,s0)
 /var/lib/dav(/.*)?                     gen_context(system_u:object_r:httpd_var_lib_t,s0)
 /var/lib/htdig(/.*)?                   gen_context(system_u:object_r:httpd_sys_content_t,s0)
 /var/lib/httpd(/.*)?                   gen_context(system_u:object_r:httpd_var_lib_t,s0)
index a4d9ca5fb9c1be0bd83374d48e11bd9e2eeab660..efb84b4e6589fec2e6efaf4daa21242a7e2093ae 100644 (file)
@@ -31,6 +31,7 @@ template(`apache_content_template',`
 
        # This type is used for executable scripts files
        type httpd_$1_script_exec_t; # customizable;
+       corecmd_shell_entry_type(httpd_$1_script_t)
        domain_entry_file(httpd_$1_script_t,httpd_$1_script_exec_t)
 
        # The following three are the only areas that 
@@ -174,6 +175,7 @@ template(`apache_content_template',`
                dev_read_urand(httpd_$1_script_t)
 
                fs_getattr_xattr_fs(httpd_$1_script_t)
+               fs_read_eventpollfs(httpd_$1_script_t)
 
                files_read_etc_runtime_files(httpd_$1_script_t)
                files_read_usr_files(httpd_$1_script_t)
@@ -781,6 +783,25 @@ interface(`apache_append_squirrelmail_data',`
        allow $1 httpd_squirrelmail_t:file { getattr append };
 ')
 
+########################################
+## <summary>
+##     Read apache system content
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+#
+interface(`apache_read_sys_content',`
+       gen_require(`
+               type httpd_sys_content_t;
+       ')
+
+       allow $1 httpd_sys_content_t:dir r_dir_perms;
+       allow $1 httpd_sys_content_t:file { getattr read };
+')
+
 ########################################
 ## <summary>
 ##     Search system script state directory.
index 39f988aafb199df380083df23c3f2b3e8ebf1077..bdd38b4fd16533a265759875b54222ce197ed82c 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(apache,1.2.1)
+policy_module(apache,1.2.2)
 
 #
 # NOTES: 
index d2d1202c1c13782e66e3c3165867e417ac477ca6..acf8578c8873cdd2107fa17396c9ce62016805af 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(automount,1.1.3)
+policy_module(automount,1.1.4)
 
 ########################################
 #
@@ -28,7 +28,7 @@ files_mountpoint(automount_tmp_t)
 # Local policy
 #
 
-allow automount_t self:capability { net_bind_service sys_nice dac_override };
+allow automount_t self:capability { net_bind_service sys_nice sys_resource dac_override };
 dontaudit automount_t self:capability sys_tty_config;
 allow automount_t self:process { signal_perms getpgid setpgid setsched };
 allow automount_t self:fifo_file rw_file_perms;
@@ -83,6 +83,9 @@ corenet_udp_bind_all_nodes(automount_t)
 corenet_tcp_connect_portmap_port(automount_t)
 corenet_tcp_connect_all_ports(automount_t)
 corenet_dontaudit_tcp_connect_all_reserved_ports(automount_t)
+# Automount execs showmount when you browse /net.  This is required until
+# Someone writes a showmount policy
+corenet_tcp_bind_reserved_port(automount_t)
 
 dev_read_sysfs(automount_t)
 # for SSP
@@ -91,7 +94,7 @@ dev_read_urand(automount_t)
 domain_use_interactive_fds(automount_t)
 
 files_dontaudit_write_var_dirs(automount_t)
-files_search_var_lib(automount_t)
+files_getattr_all_dirs(automount_t)
 files_list_mnt(automount_t)
 files_getattr_home_dir(automount_t)
 files_read_etc_files(automount_t)
index 370168b8e0776097ad05ec41cbc46fc0f0f9bf1b..12725ce69b93a4cd313291bef1d9e13861bae122 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(cron,1.2.2)
+policy_module(cron,1.2.3)
 
 gen_require(`
        class passwd rootok;
@@ -360,6 +360,9 @@ ifdef(`targeted_policy',`
        optional_policy(`apache',`
                # Needed         for certwatch
                apache_exec_modules(system_crond_t)
+               apache_read_config(system_crond_t)
+               apache_read_log(system_crond_t)
+               apache_read_sys_content(system_crond_t)
        ')
 
        optional_policy(`cyrus',`
index 2a40aceae0d0d0e59ca7ffaadf61a45c17cafda2..83cc60088fbc8c84bd368c0283f9d1a0e07c76a0 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(hal,1.2.6)
+policy_module(hal,1.2.7)
 
 ########################################
 #
@@ -93,7 +93,7 @@ files_create_boot_flag(hald_t)
 
 fs_getattr_all_fs(hald_t)
 fs_search_all(hald_t)
-fs_search_auto_mountpoints(hald_t)
+fs_list_auto_mountpoints(hald_t)
 
 mls_file_read_up(hald_t)
 
index 21a978c805700e79cc7deda85732ee7c8bedf353..1f6831131f458570dca6595180a83b666e6fe732 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(xserver,1.0.3)
+policy_module(xserver,1.0.4)
 
 ########################################
 #
@@ -425,7 +425,7 @@ ifdef(`strict_policy',`
 ifdef(`targeted_policy',`
        allow xdm_xserver_t self:process { execheap execmem };
 
-       unconfined_domain(xdm_xserver_t)
+       unconfined_domain_noaudit(xdm_xserver_t)
        unconfined_domtrans(xdm_xserver_t)
 ')
 
index 6283ca0ee73a2c7c1fab0483226255adaebef4c5..34bc157fb8332f7ac25e5f405c5aef7d1785c295 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(fstools,1.2.2)
+policy_module(fstools,1.2.3)
 
 ########################################
 #
@@ -45,7 +45,7 @@ allow fsadm_t fsadm_tmp_t:file create_file_perms;
 files_tmp_filetrans(fsadm_t, fsadm_tmp_t, { file dir })
 
 # Enable swapping to files
-allow fsadm_t swapfile_t:file { getattr swapon };
+allow fsadm_t swapfile_t:file { read write getattr swapon };
 
 kernel_read_system_state(fsadm_t)
 kernel_read_kernel_sysctls(fsadm_t)
index cde1b95b018adda2c1cf7aa18838ff26b9b2fcd9..400a3c0afdcfc68e4ab0d863110918740b88ab67 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(mount,1.2.2)
+policy_module(mount,1.2.3)
 
 ########################################
 #
@@ -46,7 +46,7 @@ fs_mount_all_fs(mount_t)
 fs_unmount_all_fs(mount_t)
 fs_remount_all_fs(mount_t)
 fs_relabelfrom_all_fs(mount_t)
-fs_search_auto_mountpoints(mount_t)
+fs_list_auto_mountpoints(mount_t)
 fs_rw_tmpfs_chr_files(mount_t)
 fs_read_tmpfs_symlinks(mount_t)
 
index 187e4c4ed078d1bab9935130e97e3800c1fc3a19..b30c1c9f4ae46d685782153d0d7374a72b582756 100644 (file)
@@ -1,5 +1,5 @@
 
-policy_module(selinuxutil,1.1.6)
+policy_module(selinuxutil,1.1.7)
 
 gen_require(`
        bool secure_mode;
@@ -178,8 +178,16 @@ allow load_policy_t selinux_config_t:dir r_dir_perms;
 allow load_policy_t selinux_config_t:file r_file_perms;
 allow load_policy_t selinux_config_t:lnk_file r_file_perms;
 
+domain_use_interactive_fds(load_policy_t)
+
+# for mcs.conf
+files_read_etc_files(load_policy_t)
+files_read_etc_runtime_files(load_policy_t)
+
 fs_getattr_xattr_fs(load_policy_t)
 
+mls_file_read_up(load_policy_t)
+
 selinux_get_fs_mount(load_policy_t)
 selinux_load_policy(load_policy_t)
 selinux_set_boolean(load_policy_t)
@@ -190,12 +198,6 @@ term_list_ptys(load_policy_t)
 init_use_script_fds(load_policy_t)
 init_use_script_ptys(load_policy_t)
 
-domain_use_interactive_fds(load_policy_t)
-
-# for mcs.conf
-files_read_etc_files(load_policy_t)
-files_read_etc_runtime_files(load_policy_t)
-
 libs_use_ld_so(load_policy_t)
 libs_use_shared_libs(load_policy_t)
 
@@ -319,10 +321,6 @@ optional_policy(`nscd',`
        nscd_socket_use(newrole_t)
 ')
 
-ifdef(`TODO',`
-ifdef(`gnome-pty-helper.te', `allow newrole_t gphdomain:fd use;')
-') dnl ifdef TODO
-
 ########################################
 #
 # Restorecon local policy