rpms/selinux-policy/F-11 policy-20090521.patch, 1.36, 1.37 selinux-policy.spec, 1.892, 1.893
Miroslav Grepl
mgrepl at fedoraproject.org
Fri Jul 31 11:36:19 UTC 2009
Author: mgrepl
Update of /cvs/extras/rpms/selinux-policy/F-11
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv25259
Modified Files:
policy-20090521.patch selinux-policy.spec
Log Message:
- Add postfix and dovecot fixes from dwalsh
policy-20090521.patch:
mcs | 12 -
modules/admin/certwatch.te | 4
modules/admin/kismet.te | 16 ++
modules/admin/logrotate.te | 6
modules/admin/mrtg.te | 4
modules/admin/prelink.te | 9 -
modules/admin/readahead.te | 2
modules/admin/rpm.if | 18 ++
modules/admin/rpm.te | 4
modules/admin/shorewall.fc | 12 +
modules/admin/shorewall.if | 166 ++++++++++++++++++++++
modules/admin/shorewall.te | 103 +++++++++++++
modules/admin/usermanage.te | 1
modules/apps/gitosis.fc | 4
modules/apps/gitosis.if | 96 ++++++++++++
modules/apps/gitosis.te | 43 +++++
modules/apps/mozilla.if | 16 ++
modules/apps/mozilla.te | 14 +
modules/apps/nsplugin.if | 2
modules/apps/qemu.fc | 1
modules/apps/qemu.te | 5
modules/apps/sandbox.if | 134 +++++++++++++-----
modules/apps/sandbox.te | 274 ++++++++++++++++++++++++++++++++++---
modules/apps/vmware.fc | 1
modules/apps/vmware.te | 6
modules/kernel/corecommands.fc | 9 +
modules/kernel/corenetwork.te.in | 2
modules/kernel/devices.fc | 2
modules/kernel/devices.if | 145 +++++++++++++++++++
modules/kernel/devices.te | 13 +
modules/kernel/domain.if | 45 ++----
modules/kernel/domain.te | 30 +++-
modules/kernel/files.if | 3
modules/kernel/kernel.if | 2
modules/kernel/terminal.if | 19 ++
modules/roles/staff.te | 8 +
modules/roles/sysadm.if | 35 ++++
modules/roles/sysadm.te | 4
modules/roles/unconfineduser.te | 9 -
modules/roles/unprivuser.te | 4
modules/roles/xguest.te | 6
modules/services/apache.fc | 4
modules/services/automount.if | 18 ++
modules/services/avahi.te | 2
modules/services/bluetooth.te | 1
modules/services/clamav.te | 4
modules/services/consolekit.te | 3
modules/services/cron.if | 19 --
modules/services/cron.te | 2
modules/services/cups.te | 2
modules/services/dcc.te | 8 -
modules/services/ddclient.if | 25 +++
modules/services/devicekit.te | 6
modules/services/dnsmasq.te | 4
modules/services/dovecot.if | 34 ++--
modules/services/dovecot.te | 20 +-
modules/services/exim.te | 6
modules/services/fetchmail.te | 2
modules/services/fprintd.te | 8 -
modules/services/ftp.te | 7
modules/services/gnomeclock.te | 1
modules/services/gpsd.fc | 3
modules/services/gpsd.te | 17 ++
modules/services/hal.te | 12 +
modules/services/kerberos.if | 2
modules/services/kerberos.te | 12 +
modules/services/lircd.te | 4
modules/services/mailman.if | 1
modules/services/mta.if | 1
modules/services/mysql.te | 4
modules/services/nis.te | 3
modules/services/nslcd.fc | 4
modules/services/nslcd.if | 145 +++++++++++++++++++
modules/services/nslcd.te | 50 ++++++
modules/services/openvpn.te | 1
modules/services/pcscd.te | 3
modules/services/polkit.fc | 2
modules/services/polkit.if | 2
modules/services/polkit.te | 1
modules/services/postfix.if | 26 +++
modules/services/postfix.te | 26 ---
modules/services/postgresql.te | 2
modules/services/ppp.if | 6
modules/services/privoxy.te | 3
modules/services/pyzor.fc | 2
modules/services/pyzor.te | 2
modules/services/rpc.te | 12 +
modules/services/rsync.te | 2
modules/services/sendmail.if | 39 +++++
modules/services/sendmail.te | 7
modules/services/setroubleshoot.te | 5
modules/services/shorewall.fc | 12 -
modules/services/shorewall.if | 166 ----------------------
modules/services/shorewall.te | 102 -------------
modules/services/spamassassin.fc | 4
modules/services/spamassassin.te | 1
modules/services/ssh.if | 23 ++-
modules/services/ssh.te | 4
modules/services/uucp.te | 2
modules/services/virt.te | 27 ++-
modules/services/xserver.fc | 2
modules/services/xserver.if | 19 ++
modules/services/xserver.te | 11 +
modules/system/authlogin.fc | 3
modules/system/authlogin.if | 222 ++++++++++++++++-------------
modules/system/authlogin.te | 27 +--
modules/system/init.fc | 2
modules/system/init.te | 2
modules/system/ipsec.te | 34 ++--
modules/system/iptables.te | 4
modules/system/iscsi.te | 1
modules/system/libraries.fc | 11 +
modules/system/locallogin.te | 6
modules/system/miscfiles.fc | 1
modules/system/sysnetwork.te | 17 +-
modules/system/udev.fc | 1
modules/system/udev.te | 6
modules/system/userdomain.if | 23 +--
modules/system/virtual.te | 5
modules/system/xen.te | 1
120 files changed, 1970 insertions(+), 633 deletions(-)
Index: policy-20090521.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-11/policy-20090521.patch,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -p -r1.36 -r1.37
--- policy-20090521.patch 31 Jul 2009 08:41:12 -0000 1.36
+++ policy-20090521.patch 31 Jul 2009 11:36:19 -0000 1.37
@@ -2233,20 +2233,178 @@ diff -b -B --ignore-all-space --exclude-
tftp_read_content(dnsmasq_t)
')
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.if serefpolicy-3.6.12/policy/modules/services/dovecot.if
+--- nsaserefpolicy/policy/modules/services/dovecot.if 2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/dovecot.if 2009-07-31 13:05:17.000000000 +0200
+@@ -2,47 +2,44 @@
+
+ ########################################
+ ## <summary>
+-## Create, read, write, and delete the dovecot spool files.
++## Connect to dovecot auth unix domain stream socket.
+ ## </summary>
+ ## <param name="domain">
+ ## <summary>
+ ## Domain allowed access.
+ ## </summary>
+ ## </param>
++## <rolecap/>
+ #
+-interface(`dovecot_manage_spool',`
++interface(`dovecot_stream_connect_auth',`
+ gen_require(`
+- type dovecot_spool_t;
++ type dovecot_auth_t, dovecot_var_run_t;
+ ')
+
+- manage_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
+- manage_lnk_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
++ stream_connect_pattern($1, dovecot_var_run_t, dovecot_var_run_t, dovecot_auth_t)
+ ')
+
+ ########################################
+ ## <summary>
+-## Connect to dovecot auth unix domain stream socket.
++## Execute dovecot_deliver in the dovecot_deliver domain.
+ ## </summary>
+ ## <param name="domain">
+ ## <summary>
+ ## Domain allowed access.
+ ## </summary>
+ ## </param>
+-## <rolecap/>
+ #
+-interface(`dovecot_auth_stream_connect',`
++interface(`dovecot_domtrans_deliver',`
+ gen_require(`
+- type dovecot_auth_t, dovecot_var_run_t;
++ type dovecot_deliver_t, dovecot_deliver_exec_t;
+ ')
+
+- allow $1 dovecot_var_run_t:dir search;
+- allow $1 dovecot_var_run_t:sock_file write;
+- allow $1 dovecot_auth_t:unix_stream_socket connectto;
++ domtrans_pattern($1, dovecot_deliver_exec_t, dovecot_deliver_t)
+ ')
+
+ ########################################
+ ## <summary>
+-## Execute dovecot_deliver in the dovecot_deliver domain.
++## Create, read, write, and delete the dovecot spool files.
+ ## </summary>
+ ## <param name="domain">
+ ## <summary>
+@@ -50,17 +47,18 @@
+ ## </summary>
+ ## </param>
+ #
+-interface(`dovecot_domtrans_deliver',`
++interface(`dovecot_manage_spool',`
+ gen_require(`
+- type dovecot_deliver_t, dovecot_deliver_exec_t;
++ type dovecot_spool_t;
+ ')
+
+- domtrans_pattern($1, dovecot_deliver_exec_t, dovecot_deliver_t)
++ manage_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
++ manage_lnk_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
+ ')
+
+-#######################################
++########################################
+ ## <summary>
+-## Do not audit attempts to d`elete dovecot lib files.
++## Do not audit attempts to delete dovecot lib files.
+ ## </summary>
+ ## <param name="domain">
+ ## <summary>
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.te serefpolicy-3.6.12/policy/modules/services/dovecot.te
+--- nsaserefpolicy/policy/modules/services/dovecot.te 2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/dovecot.te 2009-07-31 13:05:22.000000000 +0200
+@@ -1,5 +1,5 @@
+
+-policy_module(dovecot, 1.10.2)
++policy_module(dovecot, 1.10.3)
+
+ ########################################
+ #
+@@ -15,15 +15,18 @@
+ domain_entry_file(dovecot_auth_t, dovecot_auth_exec_t)
+ role system_r types dovecot_auth_t;
+
++type dovecot_auth_tmp_t;
++files_tmp_file(dovecot_auth_tmp_t)
++
++type dovecot_cert_t;
++files_type(dovecot_cert_t)
++
+ type dovecot_deliver_t;
+ type dovecot_deliver_exec_t;
+ domain_type(dovecot_deliver_t)
+ domain_entry_file(dovecot_deliver_t, dovecot_deliver_exec_t)
+ role system_r types dovecot_deliver_t;
+
+-type dovecot_cert_t;
+-files_type(dovecot_cert_t)
+-
+ type dovecot_etc_t;
+ files_config_file(dovecot_etc_t)
+
+@@ -46,9 +49,6 @@
+ type dovecot_var_run_t;
+ files_pid_file(dovecot_var_run_t)
+
+-type dovecot_auth_tmp_t;
+-files_tmp_file(dovecot_auth_tmp_t)
+-
+ ########################################
+ #
+ # dovecot local policy
+@@ -73,7 +73,6 @@
+
+ can_exec(dovecot_t, dovecot_exec_t)
+
+-# log files
+ manage_files_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
+ logging_log_filetrans(dovecot_t, dovecot_var_log_t, file)
+
+@@ -181,7 +180,7 @@
+
+ allow dovecot_auth_t dovecot_var_run_t:dir list_dir_perms;
+ manage_sock_files_pattern(dovecot_auth_t, dovecot_var_run_t, dovecot_var_run_t)
+-dovecot_auth_stream_connect(dovecot_auth_t)
++dovecot_stream_connect_auth(dovecot_auth_t)
+
+ kernel_read_all_sysctls(dovecot_auth_t)
+ kernel_read_system_state(dovecot_auth_t)
+@@ -252,9 +251,10 @@
+
+ miscfiles_read_localization(dovecot_deliver_t)
+
+-dovecot_auth_stream_connect(dovecot_deliver_t)
++dovecot_stream_connect_auth(dovecot_deliver_t)
+
+ files_search_tmp(dovecot_deliver_t)
++
+ fs_getattr_all_fs(dovecot_deliver_t)
+
+ userdom_manage_user_home_content_dirs(dovecot_deliver_t)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/exim.te serefpolicy-3.6.12/policy/modules/services/exim.te
--- nsaserefpolicy/policy/modules/services/exim.te 2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/exim.te 2009-07-24 15:40:36.000000000 +0200
-@@ -152,6 +152,10 @@
++++ serefpolicy-3.6.12/policy/modules/services/exim.te 2009-07-31 13:05:27.000000000 +0200
+@@ -148,7 +148,11 @@
')
optional_policy(`
-+ sendmail_manage_tmp(exim_t)
+- dovecot_auth_stream_connect(exim_t)
++ dovecot_stream_connect_auth(exim_t)
+')
+
+optional_policy(`
- tunable_policy(`exim_can_connect_db',`
- mysql_stream_connect(exim_t)
- ')
++ sendmail_manage_tmp(exim_t)
+ ')
+
+ optional_policy(`
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetchmail.te serefpolicy-3.6.12/policy/modules/services/fetchmail.te
--- nsaserefpolicy/policy/modules/services/fetchmail.te 2009-06-25 10:19:44.000000000 +0200
+++ serefpolicy-3.6.12/policy/modules/services/fetchmail.te 2009-06-29 16:22:53.000000000 +0200
@@ -2854,8 +3012,22 @@ diff -b -B --ignore-all-space --exclude-
optional_policy(`
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postfix.if serefpolicy-3.6.12/policy/modules/services/postfix.if
--- nsaserefpolicy/policy/modules/services/postfix.if 2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/postfix.if 2009-06-25 10:21:01.000000000 +0200
-@@ -580,6 +580,25 @@
++++ serefpolicy-3.6.12/policy/modules/services/postfix.if 2009-07-31 13:05:32.000000000 +0200
+@@ -112,6 +112,13 @@
+ template(`postfix_server_domain_template',`
+ postfix_domain_template($1)
+
++ type postfix_$1_tmp_t;
++ files_tmp_file(postfix_$1_tmp_t)
++
++ manage_dirs_pattern(postfix_$1_t, postfix_$1_tmp_t, postfix_$1_tmp_t)
++ manage_files_pattern(postfix_$1_t, postfix_$1_tmp_t, postfix_$1_tmp_t)
++ files_tmp_filetrans(postfix_$1_t, postfix_$1_tmp_t, { file dir })
++
+ allow postfix_$1_t self:capability { setuid setgid dac_override };
+ allow postfix_$1_t postfix_master_t:unix_stream_socket { connectto rw_stream_socket_perms };
+ allow postfix_$1_t self:tcp_socket create_socket_perms;
+@@ -580,6 +587,25 @@
########################################
## <summary>
@@ -2881,6 +3053,84 @@ diff -b -B --ignore-all-space --exclude-
## Execute the master postdrop in the
## postfix_postdrop domain.
## </summary>
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postfix.te serefpolicy-3.6.12/policy/modules/services/postfix.te
+--- nsaserefpolicy/policy/modules/services/postfix.te 2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/postfix.te 2009-07-31 13:05:36.000000000 +0200
+@@ -42,9 +42,6 @@
+ mta_manage_spool(postfix_local_t)
+ ')
+
+-type postfix_local_tmp_t;
+-files_tmp_file(postfix_local_tmp_t)
+-
+ # Program for creating database files
+ type postfix_map_t;
+ type postfix_map_exec_t;
+@@ -106,9 +103,6 @@
+ postfix_server_domain_template(virtual)
+ mta_mailserver_delivery(postfix_virtual_t)
+
+-type postfix_virtual_tmp_t;
+-files_tmp_file(postfix_virtual_tmp_t)
+-
+ ########################################
+ #
+ # Postfix master process local policy
+@@ -302,10 +296,6 @@
+ allow postfix_local_t self:fifo_file rw_fifo_file_perms;
+ allow postfix_local_t self:process { setsched setrlimit };
+
+-manage_dirs_pattern(postfix_local_t, postfix_local_tmp_t, postfix_local_tmp_t)
+-manage_files_pattern(postfix_local_t, postfix_local_tmp_t, postfix_local_tmp_t)
+-files_tmp_filetrans(postfix_local_t, postfix_local_tmp_t, { file dir })
+-
+ # connect to master process
+ stream_connect_pattern(postfix_local_t, postfix_public_t, postfix_public_t, postfix_master_t)
+
+@@ -399,14 +389,6 @@
+
+ miscfiles_read_localization(postfix_map_t)
+
+-tunable_policy(`read_default_t',`
+- files_list_default(postfix_map_t)
+- files_read_default_files(postfix_map_t)
+- files_read_default_symlinks(postfix_map_t)
+- files_read_default_sockets(postfix_map_t)
+- files_read_default_pipes(postfix_map_t)
+-')
+-
+ optional_policy(`
+ locallogin_dontaudit_use_fds(postfix_map_t)
+ ')
+@@ -508,7 +490,7 @@
+ ')
+
+ optional_policy(`
+- sendmail_rw_unix_stream_sockets(postfix_postdrop_t)
++ sendmail_dontaudit_rw_unix_stream_sockets(postfix_postdrop_t)
+ ')
+
+ optional_policy(`
+@@ -640,7 +622,7 @@
+ mta_read_aliases(postfix_smtpd_t)
+
+ optional_policy(`
+- dovecot_auth_stream_connect(postfix_smtpd_t)
++ dovecot_stream_connect_auth(postfix_smtpd_t)
+ ')
+
+ optional_policy(`
+@@ -665,10 +647,6 @@
+
+ allow postfix_virtual_t postfix_spool_t:file rw_file_perms;
+
+-manage_dirs_pattern(postfix_virtual_t, postfix_virtual_tmp_t, postfix_virtual_tmp_t)
+-manage_files_pattern(postfix_virtual_t, postfix_virtual_tmp_t, postfix_virtual_tmp_t)
+-files_tmp_filetrans(postfix_virtual_t, postfix_virtual_tmp_t, { file dir })
+-
+ # connect to master process
+ stream_connect_pattern(postfix_virtual_t, { postfix_private_t postfix_public_t }, { postfix_private_t postfix_public_t }, postfix_master_t)
+
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postgresql.te serefpolicy-3.6.12/policy/modules/services/postgresql.te
--- nsaserefpolicy/policy/modules/services/postgresql.te 2009-06-25 10:19:44.000000000 +0200
+++ serefpolicy-3.6.12/policy/modules/services/postgresql.te 2009-07-08 21:12:21.000000000 +0200
@@ -3007,8 +3257,33 @@ diff -b -B --ignore-all-space --exclude-
auth_read_all_symlinks_except_shadow(rsync_t)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/sendmail.if serefpolicy-3.6.12/policy/modules/services/sendmail.if
--- nsaserefpolicy/policy/modules/services/sendmail.if 2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/sendmail.if 2009-07-24 15:42:39.000000000 +0200
-@@ -238,3 +238,24 @@
++++ serefpolicy-3.6.12/policy/modules/services/sendmail.if 2009-07-31 13:22:05.000000000 +0200
+@@ -92,6 +92,24 @@
+ allow $1 sendmail_t:unix_stream_socket { getattr read write ioctl };
+ ')
+
++#######################################
++## <summary>
++## Dontaudit Read and write sendmail unix_stream_sockets.
++## </summary>
++## <param name="domain">
++## <summary>
++## Domain allowed access.
++## </summary>
++## </param>
++#
++interface(`sendmail_dontaudit_rw_unix_stream_sockets',`
++ gen_require(`
++ type sendmail_t;
++ ')
++
++ dontaudit $1 sendmail_t:unix_stream_socket { getattr read write ioctl };
++')
++
+ ########################################
+ ## <summary>
+ ## Read sendmail logs.
+@@ -238,3 +256,24 @@
allow $1 sendmail_t:fifo_file rw_fifo_file_perms;
')
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-11/selinux-policy.spec,v
retrieving revision 1.892
retrieving revision 1.893
diff -u -p -r1.892 -r1.893
--- selinux-policy.spec 31 Jul 2009 08:41:12 -0000 1.892
+++ selinux-policy.spec 31 Jul 2009 11:36:19 -0000 1.893
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.6.12
-Release: 71%{?dist}
+Release: 72%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -475,6 +475,9 @@ exit 0
%endif
%changelog
+* Fri Jul 31 2009 Miroslav Grepl <mgrepl at redhat.com> 3.6.12-72
+- Add postfix and dovecot fixes from dwalsh
+
* Fri Jul 31 2009 Miroslav Grepl <mgrepl at redhat.com> 3.6.12-71
- Allow lircd read/write input event devices
More information about the scm-commits
mailing list