[selinux-policy] - Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn of

Daniel J Walsh dwalsh at fedoraproject.org
Sun Oct 3 11:52:46 UTC 2010


commit 991ee5f4d3494a5b0de78d4a88a40bf0c250d277
Author: Dan Walsh <dwalsh at redhat.com>
Date:   Sun Oct 3 07:52:48 2010 -0400

    - Turn off default transition to mozilla_plugin and telepathy domains from unconfined user
    - Turn off iptables from unconfined user
    - Allow sudo to send signals to any domains the user could have transitioned to.
    - Passwd in single user mode needs to talk to console_device_t
    - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio
    - locate tried to read a symbolic link, will dontaudit
    - New labels for telepathy-sunshine content in homedir
    - Google is storing other binaries under /opt/google/talkplugin
    - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug
    - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15
    - modemmanger and bluetooth send dbus messages to devicekit_power
    - Samba needs to getquota on filesystems labeld samba_share_t

 policy-F14.patch |  224 +++++++++++++++++++++++++++++++++++------------------
 1 files changed, 148 insertions(+), 76 deletions(-)
---
diff --git a/policy-F14.patch b/policy-F14.patch
index 456fd99..b96a293 100644
--- a/policy-F14.patch
+++ b/policy-F14.patch
@@ -232,6 +232,43 @@ index af90ef2..9fef0f8 100644
  #
  # MCS policy for SELinux-enabled databases
  #
+diff --git a/policy/modules/admin/alsa.if b/policy/modules/admin/alsa.if
+index 69aa742..20d51d0 100644
+--- a/policy/modules/admin/alsa.if
++++ b/policy/modules/admin/alsa.if
+@@ -21,6 +21,32 @@ interface(`alsa_domtrans',`
+ 
+ ########################################
+ ## <summary>
++##	Execute a domain transition to run
++##	Alsa, and allow the specified role
++##	the Alsa domain.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed to transition.
++##	</summary>
++## </param>
++## <param name="role">
++##	<summary>
++##	Role allowed access.
++##	</summary>
++## </param>
++#
++interface(`alsa_run',`
++	gen_require(`
++		type alsa_t;
++	')
++
++	alsa_domtrans($1)
++	role $2 types alsa_t;
++')
++
++########################################
++## <summary>
+ ##	Read and write Alsa semaphores.
+ ## </summary>
+ ## <param name="domain">
 diff --git a/policy/modules/admin/anaconda.te b/policy/modules/admin/anaconda.te
 index f76ed8a..9a9526a 100644
 --- a/policy/modules/admin/anaconda.te
@@ -3623,14 +3660,14 @@ index 93ac529..aafece7 100644
  /usr/lib64/[^/]*firefox[^/]*/firefox -- gen_context(system_u:object_r:mozilla_exec_t,s0)
 +/usr/lib(64)?/xulrunner[^/]*/plugin-container		--	gen_context(system_u:object_r:mozilla_plugin_exec_t,s0)
 diff --git a/policy/modules/apps/mozilla.if b/policy/modules/apps/mozilla.if
-index 9a6d67d..47aa143 100644
+index 9a6d67d..dfac7cc 100644
 --- a/policy/modules/apps/mozilla.if
 +++ b/policy/modules/apps/mozilla.if
 @@ -29,6 +29,8 @@ interface(`mozilla_role',`
  	allow mozilla_t $2:process { sigchld signull };
  	allow mozilla_t $2:unix_stream_socket connectto;
  
-+	mozilla_plugin_run(mozilla_t, $2)
++	mozilla_run_plugin(mozilla_t, $2)
 +
  	# Allow the user domain to signal/ps.
  	ps_process_pattern($2, mozilla_t)
@@ -3657,7 +3694,32 @@ index 9a6d67d..47aa143 100644
  ')
  
  ########################################
-@@ -168,6 +176,52 @@ interface(`mozilla_domtrans',`
+@@ -132,6 +140,24 @@ interface(`mozilla_dontaudit_manage_user_home_files',`
+ 
+ ########################################
+ ## <summary>
++##	Execute mozilla home directory content.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`mozilla_execute_user_home_files',`
++	gen_require(`
++		type mozilla_home_t;
++	')
++
++	can_exec($1, mozilla_home_t)
++')
++
++########################################
++## <summary>
+ ##	Execmod mozilla home directory content.
+ ## </summary>
+ ## <param name="domain">
+@@ -168,6 +194,69 @@ interface(`mozilla_domtrans',`
  
  ########################################
  ## <summary>
@@ -3675,6 +3737,7 @@ index 9a6d67d..47aa143 100644
 +	')
 +
 +	domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
++	allow mozilla_plugin_t $1:process signull;	
 +')
 +
 +
@@ -3701,8 +3764,24 @@ index 9a6d67d..47aa143 100644
 +
 +	mozilla_domtrans_plugin($1)
 +	role $2 types mozilla_plugin_t;
++')
 +
-+	allow mozilla_plugin_t $1:process signull;	
++########################################
++## <summary>
++##	Execute qemu unconfined programs in the role.
++## </summary>
++## <param name="role">
++##	<summary>
++##	The role to allow the mozilla_plugin domain.
++##	</summary>
++## </param>
++#
++interface(`mozilla_role_plugin',`
++	gen_require(`
++		type mozilla_plugin_t;
++	')
++
++	role $1 types mozilla_plugin_t;
 +')
 +
 +########################################
@@ -3711,7 +3790,7 @@ index 9a6d67d..47aa143 100644
  ##	mozilla over dbus.
  ## </summary>
 diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
-index cbf4bec..70d899d 100644
+index cbf4bec..cc87b60 100644
 --- a/policy/modules/apps/mozilla.te
 +++ b/policy/modules/apps/mozilla.te
 @@ -25,6 +25,7 @@ files_config_file(mozilla_conf_t)
@@ -3784,7 +3863,7 @@ index cbf4bec..70d899d 100644
  	pulseaudio_exec(mozilla_t)
  	pulseaudio_stream_connect(mozilla_t)
  	pulseaudio_manage_home_files(mozilla_t)
-@@ -266,3 +291,121 @@ optional_policy(`
+@@ -266,3 +291,124 @@ optional_policy(`
  optional_policy(`
  	thunderbird_domtrans(mozilla_t)
  ')
@@ -3809,6 +3888,7 @@ index cbf4bec..70d899d 100644
 +manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
 +manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
 +files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file })
++can_exec(mozilla_plugin_t, mozilla_plugin_tmp_t)
 +
 +manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
 +manage_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
@@ -3862,6 +3942,7 @@ index cbf4bec..70d899d 100644
 +userdom_delete_user_tmpfs_files(mozilla_plugin_t)
 +userdom_stream_connect(mozilla_plugin_t)
 +userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
++userdom_manage_user_tmp_sockets(mozilla_plugin_t)
 +
 +userdom_list_user_tmp(mozilla_plugin_t)
 +userdom_read_user_tmp_files(mozilla_plugin_t)
@@ -3905,6 +3986,7 @@ index cbf4bec..70d899d 100644
 +	xserver_read_xdm_pid(mozilla_plugin_t)
 +	xserver_stream_connect(mozilla_plugin_t)
 +	xserver_use_user_fonts(mozilla_plugin_t)
++	xserver_read_user_iceauth(mozilla_plugin_t)
 +')
 diff --git a/policy/modules/apps/mplayer.if b/policy/modules/apps/mplayer.if
 index d8ea41d..8bdc526 100644
@@ -3992,12 +4074,13 @@ index 815a467..192d54e 100644
  
 diff --git a/policy/modules/apps/nsplugin.fc b/policy/modules/apps/nsplugin.fc
 new file mode 100644
-index 0000000..63abc5c
+index 0000000..717eb3f
 --- /dev/null
 +++ b/policy/modules/apps/nsplugin.fc
-@@ -0,0 +1,10 @@
+@@ -0,0 +1,11 @@
 +HOME_DIR/\.adobe(/.*)?			gen_context(system_u:object_r:nsplugin_home_t,s0)
 +HOME_DIR/\.macromedia(/.*)?		gen_context(system_u:object_r:nsplugin_home_t,s0)
++HOME_DIR/\.gnash(/.*)?			gen_context(system_u:object_r:nsplugin_home_t,s0)
 +HOME_DIR/\.gcjwebplugin(/.*)?		gen_context(system_u:object_r:nsplugin_home_t,s0)
 +HOME_DIR/\.icedteaplugin(/.*)?		gen_context(system_u:object_r:nsplugin_home_t,s0)
 +
@@ -4450,10 +4533,10 @@ index 0000000..4dbb161
 +')
 diff --git a/policy/modules/apps/nsplugin.te b/policy/modules/apps/nsplugin.te
 new file mode 100644
-index 0000000..4e8a49e
+index 0000000..1ca0e76
 --- /dev/null
 +++ b/policy/modules/apps/nsplugin.te
-@@ -0,0 +1,310 @@
+@@ -0,0 +1,313 @@
 +policy_module(nsplugin, 1.0.0)
 +
 +########################################
@@ -4585,6 +4668,7 @@ index 0000000..4e8a49e
 +fs_search_auto_mountpoints(nsplugin_t)
 +fs_rw_anon_inodefs_files(nsplugin_t)
 +fs_list_inotifyfs(nsplugin_t)
++fs_dontaudit_list_fusefs(nsplugin_t)
 +
 +storage_dontaudit_getattr_fixed_disk_dev(nsplugin_t)
 +storage_dontaudit_getattr_removable_dev(nsplugin_t)
@@ -4636,6 +4720,7 @@ index 0000000..4e8a49e
 +')
 +
 +optional_policy(`
++	mozilla_execute_user_home_files(nsplugin_t)
 +	mozilla_read_user_home_files(nsplugin_t)
 +	mozilla_write_user_home_files(nsplugin_t)
 +')
@@ -4681,6 +4766,7 @@ index 0000000..4e8a49e
 +allow nsplugin_config_t self:unix_stream_socket create_stream_socket_perms;
 +
 +dev_dontaudit_read_rand(nsplugin_config_t)
++dev_dontaudit_rw_dri(nsplugin_config_t)
 +
 +fs_search_auto_mountpoints(nsplugin_config_t)
 +fs_list_inotifyfs(nsplugin_config_t)
@@ -5047,7 +5133,7 @@ index 5c2680c..db96581 100644
 +	sandbox_manage_tmpfs_files(pulseaudio_t)
 +')
 diff --git a/policy/modules/apps/qemu.if b/policy/modules/apps/qemu.if
-index c1d5f50..8d8d961 100644
+index c1d5f50..f4e1572 100644
 --- a/policy/modules/apps/qemu.if
 +++ b/policy/modules/apps/qemu.if
 @@ -157,6 +157,24 @@ interface(`qemu_domtrans',`
@@ -5125,7 +5211,7 @@ index c1d5f50..8d8d961 100644
 +## </summary>
 +## <param name="role">
 +##	<summary>
-+##	The role to allow the PAM domain.
++##	The role to allow the qemu unconfined domain.
 +##	</summary>
 +## </param>
 +#
@@ -6340,10 +6426,10 @@ index 0000000..3d12484
 +')
 diff --git a/policy/modules/apps/telepathy.te b/policy/modules/apps/telepathy.te
 new file mode 100644
-index 0000000..34a2b48
+index 0000000..0b28cf8
 --- /dev/null
 +++ b/policy/modules/apps/telepathy.te
-@@ -0,0 +1,327 @@
+@@ -0,0 +1,329 @@
 +
 +policy_module(telepathy, 1.0.0)
 +
@@ -6423,6 +6509,8 @@ index 0000000..34a2b48
 +
 +auth_use_nsswitch(telepathy_msn_t)
 +
++init_read_state(telepathy_msn_t)
++
 +libs_exec_ldconfig(telepathy_msn_t)
 +
 +logging_send_syslog_msg(telepathy_msn_t)
@@ -11033,10 +11121,10 @@ index 0000000..8b2cdf3
 +
 diff --git a/policy/modules/roles/unconfineduser.te b/policy/modules/roles/unconfineduser.te
 new file mode 100644
-index 0000000..0e47a85
+index 0000000..31bbe95
 --- /dev/null
 +++ b/policy/modules/roles/unconfineduser.te
-@@ -0,0 +1,492 @@
+@@ -0,0 +1,489 @@
 +policy_module(unconfineduser, 1.0.0)
 +
 +########################################
@@ -11061,13 +11149,6 @@ index 0000000..0e47a85
 +
 +## <desc>
 +## <p>
-+## Transition unconfined user to telepathy confined domains.
-+## </p>
-+## </desc>
-+gen_tunable(unconfined_telepathy_transition, false)
-+
-+## <desc>
-+## <p>
 +## Allow vidio playing tools to tun unconfined
 +## </p>
 +## </desc>
@@ -11266,6 +11347,10 @@ index 0000000..0e47a85
 +')
 +
 +optional_policy(`
++	alsa_run(unconfined_t, unconfined_r)
++')
++
++optional_policy(`
 +	apache_run_helper(unconfined_t, unconfined_r)
 +')
 +
@@ -11380,8 +11465,10 @@ index 0000000..0e47a85
 +
 +
 +optional_policy(`
++	mozilla_role_plugin(unconfined_r)
++
 +	tunable_policy(`unconfined_mozilla_plugin_transition', `
-+			mozilla_run_plugin(unconfined_usertype, unconfined_r)
++			mozilla_domtrans_plugin(unconfined_usertype)
 +	')
 +')
 +
@@ -11412,7 +11499,7 @@ index 0000000..0e47a85
 +		qemu_domtrans(unconfined_t)
 +	',`
 +		qemu_domtrans_unconfined(unconfined_t)
-+')
++	')
 +')
 +
 +optional_policy(`
@@ -11443,9 +11530,7 @@ index 0000000..0e47a85
 +')
 +
 +optional_policy(`
-+	tunable_policy(`unconfined_telepathy_transition', `
-+		   telepathy_dbus_session_role(unconfined_r, unconfined_t)
-+	')
++	telepathy_dbus_session_role(unconfined_r, unconfined_t)
 +')
 +
 +optional_policy(`
@@ -13153,7 +13238,7 @@ index c9e1a44..ba64143 100644
 +	dontaudit $1 httpd_t:unix_stream_socket { read write };
  ')
 diff --git a/policy/modules/services/apache.te b/policy/modules/services/apache.te
-index 08dfa0c..300dffb 100644
+index 08dfa0c..411a3ff 100644
 --- a/policy/modules/services/apache.te
 +++ b/policy/modules/services/apache.te
 @@ -18,130 +18,195 @@ policy_module(apache, 2.2.0)
@@ -13725,7 +13810,7 @@ index 08dfa0c..300dffb 100644
  ')
  
  optional_policy(`
-+	smokeping_getattr_lib_files(httpd_t)
++	smokeping_read_lib_files(httpd_t)
 +')
 +
 +optional_policy(`
@@ -30674,7 +30759,7 @@ index 82cb169..9e72970 100644
 +	admin_pattern($1, samba_unconfined_script_exec_t)
  ')
 diff --git a/policy/modules/services/samba.te b/policy/modules/services/samba.te
-index e30bb63..e4334a6 100644
+index e30bb63..8e36be0 100644
 --- a/policy/modules/services/samba.te
 +++ b/policy/modules/services/samba.te
 @@ -152,9 +152,6 @@ domain_entry_file(winbind_helper_t, winbind_helper_exec_t)
@@ -30714,7 +30799,7 @@ index e30bb63..e4334a6 100644
  
  allow smbd_t swat_t:process signal;
  
-@@ -323,6 +320,7 @@ dev_getattr_all_blk_files(smbd_t)
+@@ -323,10 +320,12 @@ dev_getattr_all_blk_files(smbd_t)
  dev_getattr_all_chr_files(smbd_t)
  
  fs_getattr_all_fs(smbd_t)
@@ -30722,7 +30807,12 @@ index e30bb63..e4334a6 100644
  fs_get_xattr_fs_quotas(smbd_t)
  fs_search_auto_mountpoints(smbd_t)
  fs_getattr_rpc_dirs(smbd_t)
-@@ -343,6 +341,7 @@ files_read_usr_files(smbd_t)
+ fs_list_inotifyfs(smbd_t)
++fs_get_all_fs_quotas(smbd_t)
+ 
+ auth_use_nsswitch(smbd_t)
+ auth_domtrans_chk_passwd(smbd_t)
+@@ -343,6 +342,7 @@ files_read_usr_files(smbd_t)
  files_search_spool(smbd_t)
  # smbd seems to getattr all mountpoints
  files_dontaudit_getattr_all_dirs(smbd_t)
@@ -30730,7 +30820,7 @@ index e30bb63..e4334a6 100644
  # Allow samba to list mnt_t for potential mounted dirs
  files_list_mnt(smbd_t)
  
-@@ -385,12 +384,7 @@ tunable_policy(`samba_domain_controller',`
+@@ -385,12 +385,7 @@ tunable_policy(`samba_domain_controller',`
  ')
  
  tunable_policy(`samba_enable_home_dirs',`
@@ -30744,7 +30834,7 @@ index e30bb63..e4334a6 100644
  ')
  
  # Support Samba sharing of NFS mount points
-@@ -445,8 +439,8 @@ optional_policy(`
+@@ -445,8 +440,8 @@ optional_policy(`
  tunable_policy(`samba_create_home_dirs',`
  	allow smbd_t self:capability chown;
  	userdom_create_user_home_dirs(smbd_t)
@@ -30754,7 +30844,7 @@ index e30bb63..e4334a6 100644
  
  tunable_policy(`samba_export_all_ro',`
  	fs_read_noxattr_fs_files(smbd_t) 
-@@ -462,8 +456,8 @@ tunable_policy(`samba_export_all_rw',`
+@@ -462,8 +457,8 @@ tunable_policy(`samba_export_all_rw',`
  	auth_manage_all_files_except_shadow(smbd_t)
  	fs_read_noxattr_fs_files(nmbd_t) 
  	auth_manage_all_files_except_shadow(nmbd_t)
@@ -30764,7 +30854,7 @@ index e30bb63..e4334a6 100644
  
  ########################################
  #
-@@ -484,8 +478,9 @@ allow nmbd_t self:udp_socket create_socket_perms;
+@@ -484,8 +479,9 @@ allow nmbd_t self:udp_socket create_socket_perms;
  allow nmbd_t self:unix_dgram_socket { create_socket_perms sendto };
  allow nmbd_t self:unix_stream_socket { create_stream_socket_perms connectto };
  
@@ -30775,7 +30865,7 @@ index e30bb63..e4334a6 100644
  
  read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
  read_lnk_files_pattern(nmbd_t, samba_etc_t, samba_etc_t)
-@@ -560,13 +555,13 @@ allow smbcontrol_t self:fifo_file rw_file_perms;
+@@ -560,13 +556,13 @@ allow smbcontrol_t self:fifo_file rw_file_perms;
  allow smbcontrol_t self:unix_stream_socket create_stream_socket_perms;
  
  allow smbcontrol_t nmbd_t:process { signal signull };
@@ -30793,7 +30883,7 @@ index e30bb63..e4334a6 100644
  samba_read_config(smbcontrol_t)
  samba_rw_var_files(smbcontrol_t)
  samba_search_var(smbcontrol_t)
-@@ -677,7 +672,7 @@ samba_domtrans_nmbd(swat_t)
+@@ -677,7 +673,7 @@ samba_domtrans_nmbd(swat_t)
  allow swat_t nmbd_t:process { signal signull };
  allow nmbd_t swat_t:process signal;
  
@@ -30802,7 +30892,7 @@ index e30bb63..e4334a6 100644
  
  allow swat_t smbd_port_t:tcp_socket name_bind;
  
-@@ -692,12 +687,14 @@ manage_files_pattern(swat_t, samba_log_t, samba_log_t)
+@@ -692,12 +688,14 @@ manage_files_pattern(swat_t, samba_log_t, samba_log_t)
  manage_files_pattern(swat_t, samba_etc_t, samba_secrets_t)
  
  manage_files_pattern(swat_t, samba_var_t, samba_var_t)
@@ -30817,7 +30907,7 @@ index e30bb63..e4334a6 100644
  
  manage_dirs_pattern(swat_t, swat_tmp_t, swat_tmp_t)
  manage_files_pattern(swat_t, swat_tmp_t, swat_tmp_t)
-@@ -710,6 +707,7 @@ allow swat_t winbind_exec_t:file mmap_file_perms;
+@@ -710,6 +708,7 @@ allow swat_t winbind_exec_t:file mmap_file_perms;
  domtrans_pattern(swat_t, winbind_exec_t, winbind_t)
  allow swat_t winbind_t:process { signal signull };
  
@@ -30825,7 +30915,7 @@ index e30bb63..e4334a6 100644
  allow swat_t winbind_var_run_t:dir { write add_name remove_name };
  allow swat_t winbind_var_run_t:sock_file { create unlink };
  
-@@ -754,6 +752,8 @@ logging_search_logs(swat_t)
+@@ -754,6 +753,8 @@ logging_search_logs(swat_t)
  
  miscfiles_read_localization(swat_t)
  
@@ -30834,7 +30924,7 @@ index e30bb63..e4334a6 100644
  optional_policy(`
  	cups_read_rw_config(swat_t)
  	cups_stream_connect(swat_t)
-@@ -806,14 +806,14 @@ rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t)
+@@ -806,14 +807,14 @@ rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t)
  allow winbind_t winbind_log_t:file manage_file_perms;
  logging_log_filetrans(winbind_t, winbind_log_t, file)
  
@@ -30854,7 +30944,7 @@ index e30bb63..e4334a6 100644
  
  kernel_read_kernel_sysctls(winbind_t)
  kernel_read_system_state(winbind_t)
-@@ -833,6 +833,7 @@ corenet_udp_sendrecv_all_ports(winbind_t)
+@@ -833,6 +834,7 @@ corenet_udp_sendrecv_all_ports(winbind_t)
  corenet_tcp_bind_generic_node(winbind_t)
  corenet_udp_bind_generic_node(winbind_t)
  corenet_tcp_connect_smbd_port(winbind_t)
@@ -30862,7 +30952,7 @@ index e30bb63..e4334a6 100644
  corenet_tcp_connect_epmap_port(winbind_t)
  corenet_tcp_connect_all_unreserved_ports(winbind_t)
  
-@@ -922,6 +923,18 @@ optional_policy(`
+@@ -922,6 +924,18 @@ optional_policy(`
  #
  
  optional_policy(`
@@ -30881,7 +30971,7 @@ index e30bb63..e4334a6 100644
  	type samba_unconfined_script_t;
  	type samba_unconfined_script_exec_t;
  	domain_type(samba_unconfined_script_t)
-@@ -932,9 +945,12 @@ optional_policy(`
+@@ -932,9 +946,12 @@ optional_policy(`
  	allow smbd_t samba_unconfined_script_exec_t:dir search_dir_perms;
  	allow smbd_t samba_unconfined_script_exec_t:file ioctl;
  
@@ -31282,7 +31372,7 @@ index 824d206..8265278 100644
  #
  interface(`smokeping_domtrans',`
 diff --git a/policy/modules/services/smokeping.te b/policy/modules/services/smokeping.te
-index 4ca5449..058bfc9 100644
+index 4ca5449..247beaf 100644
 --- a/policy/modules/services/smokeping.te
 +++ b/policy/modules/services/smokeping.te
 @@ -23,6 +23,7 @@ files_type(smokeping_var_lib_t)
@@ -31301,6 +31391,14 @@ index 4ca5449..058bfc9 100644
  
  logging_send_syslog_msg(smokeping_t)
  
+@@ -63,6 +65,7 @@ optional_policy(`
+ 
+ 	allow httpd_smokeping_cgi_script_t self:udp_socket create_socket_perms;
+ 
++	manage_dirs_pattern(httpd_smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
+ 	manage_files_pattern(httpd_smokeping_cgi_script_t, smokeping_var_lib_t, smokeping_var_lib_t)
+ 
+ 	getattr_files_pattern(httpd_smokeping_cgi_script_t, smokeping_var_run_t, smokeping_var_run_t)
 diff --git a/policy/modules/services/snmp.fc b/policy/modules/services/snmp.fc
 index 623c8fa..ac10740 100644
 --- a/policy/modules/services/snmp.fc
@@ -37558,7 +37656,7 @@ index 1c4b1e7..2997dd7 100644
  /var/lib/pam_ssh(/.*)?		gen_context(system_u:object_r:var_auth_t,s0)
  
 diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
-index bea0ade..149e383 100644
+index bea0ade..c411b5e 100644
 --- a/policy/modules/system/authlogin.if
 +++ b/policy/modules/system/authlogin.if
 @@ -57,6 +57,8 @@ interface(`auth_use_pam',`
@@ -37750,33 +37848,7 @@ index bea0ade..149e383 100644
  ##	Manage var auth files. Used by various other applications
  ##	and pam applets etc.
  ## </summary>
-@@ -1346,6 +1432,25 @@ interface(`auth_read_login_records',`
- 
- ########################################
- ## <summary>
-+##	Read login records files (/var/log/wtmp).
-+## </summary>
-+## <param name="domain">
-+##	<summary>
-+##	Domain allowed access.
-+##	</summary>
-+## </param>
-+## <rolecap/>
-+#
-+interface(`auth_dontaudit_read_login_records',`
-+	gen_require(`
-+		type wtmp_t;
-+	')
-+
-+	dontaudit $1 wtmp_t:file read_file_perms;
-+')
-+
-+########################################
-+## <summary>
- ##	Do not audit attempts to read login records
- ##	files (/var/log/wtmp).
- ## </summary>
-@@ -1500,6 +1605,8 @@ interface(`auth_manage_login_records',`
+@@ -1500,6 +1586,8 @@ interface(`auth_manage_login_records',`
  #
  interface(`auth_use_nsswitch',`
  
@@ -37785,7 +37857,7 @@ index bea0ade..149e383 100644
  	files_list_var_lib($1)
  
  	# read /etc/nsswitch.conf
-@@ -1531,7 +1638,15 @@ interface(`auth_use_nsswitch',`
+@@ -1531,7 +1619,15 @@ interface(`auth_use_nsswitch',`
  	')
  
  	optional_policy(`


More information about the scm-commits mailing list