[selinux-policy: 2900/3172] More fixes for mozilla_plugin_t Allow telepathy domains to send themselves sigkill Label /etc/httpd/

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 23:18:12 UTC 2010


commit 0b8f4cfe160355e14794461eeba83ee82857be22
Author: Dan Walsh <dwalsh at redhat.com>
Date:   Fri Sep 10 12:10:13 2010 -0400

    More fixes for mozilla_plugin_t
    Allow telepathy domains to send themselves sigkill
    Label /etc/httpd/alias/*db as cert_t
    Allow fprintd to sys_nice

 policy/modules/apps/chrome.te      |    2 ++
 policy/modules/apps/mozilla.te     |   10 ++++++++++
 policy/modules/apps/telepathy.te   |    2 +-
 policy/modules/services/fprintd.te |    4 ++--
 policy/modules/system/miscfiles.fc |    1 +
 5 files changed, 16 insertions(+), 3 deletions(-)
---
diff --git a/policy/modules/apps/chrome.te b/policy/modules/apps/chrome.te
index 90c754f..5725183 100644
--- a/policy/modules/apps/chrome.te
+++ b/policy/modules/apps/chrome.te
@@ -60,6 +60,8 @@ userdom_dontaudit_use_user_terminals(chrome_sandbox_t)
 miscfiles_read_localization(chrome_sandbox_t)
 miscfiles_read_fonts(chrome_sandbox_t)
 
+sysnet_dontaudit_read_config(chrome_sandbox_t)
+
 optional_policy(`
 	execmem_exec(chrome_sandbox_t)
 ')
diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
index ec6a1ff..3018e86 100644
--- a/policy/modules/apps/mozilla.te
+++ b/policy/modules/apps/mozilla.te
@@ -315,6 +315,8 @@ manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plug
 manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
 fs_tmpfs_filetrans(mozilla_plugin_t, mozilla_plugin_tmpfs_t, { file lnk_file sock_file fifo_file })
 
+can_exec(mozilla_plugin_t, mozilla_exec_t)
+
 kernel_read_kernel_sysctls(mozilla_plugin_t)
 kernel_read_system_state(mozilla_plugin_t)
 kernel_request_load_module(mozilla_plugin_t)
@@ -325,6 +327,8 @@ corecmd_exec_shell(mozilla_plugin_t)
 dev_read_urand(mozilla_plugin_t)
 dev_read_video_dev(mozilla_plugin_t)
 dev_read_sysfs(mozilla_plugin_t)
+dev_read_sound(mozilla_plugin_t)
+dev_write_sound(mozilla_plugin_t)
 
 domain_use_interactive_fds(mozilla_plugin_t)
 domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
@@ -345,11 +349,16 @@ userdom_stream_connect(mozilla_plugin_t)
 userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
 
 optional_policy(`
+	alsa_read_rw_config(mozilla_plugin_t)
+')
+
+optional_policy(`
 	dbus_read_lib_files(mozilla_plugin_t)
 ')
 
 optional_policy(`
 	gnome_manage_home_config(mozilla_plugin_t)
+	gnome_setattr_config_dirs(mozilla_plugin_t)
 ')
 
 optional_policy(`
@@ -366,4 +375,5 @@ optional_policy(`
 optional_policy(`
 	xserver_read_xdm_pid(mozilla_plugin_t)
 	xserver_stream_connect(mozilla_plugin_t)
+	xserver_use_user_fonts(mozilla_plugin_t)
 ')
diff --git a/policy/modules/apps/telepathy.te b/policy/modules/apps/telepathy.te
index c7250ae..4aea465 100644
--- a/policy/modules/apps/telepathy.te
+++ b/policy/modules/apps/telepathy.te
@@ -275,7 +275,7 @@ optional_policy(`
 # telepathy domains common policy
 #
 
-allow telepathy_domain self:process { getsched signal };
+allow telepathy_domain self:process { getsched signal sigkill };
 allow telepathy_domain self:fifo_file rw_fifo_file_perms;
 allow telepathy_domain self:tcp_socket create_socket_perms;
 allow telepathy_domain self:udp_socket create_socket_perms;
diff --git a/policy/modules/services/fprintd.te b/policy/modules/services/fprintd.te
index 54fada0..899feaf 100644
--- a/policy/modules/services/fprintd.te
+++ b/policy/modules/services/fprintd.te
@@ -17,9 +17,9 @@ files_type(fprintd_var_lib_t)
 # Local policy
 #
 
-allow fprintd_t self:capability sys_ptrace;
+allow fprintd_t self:capability { sys_nice sys_ptrace };
 allow fprintd_t self:fifo_file rw_fifo_file_perms;
-allow fprintd_t self:process { getsched signal };
+allow fprintd_t self:process { getsched setsched signal };
 
 manage_dirs_pattern(fprintd_t, fprintd_var_lib_t, fprintd_var_lib_t)
 manage_files_pattern(fprintd_t, fprintd_var_lib_t, fprintd_var_lib_t)
diff --git a/policy/modules/system/miscfiles.fc b/policy/modules/system/miscfiles.fc
index 63c1b2f..1f0ccfd 100644
--- a/policy/modules/system/miscfiles.fc
+++ b/policy/modules/system/miscfiles.fc
@@ -11,6 +11,7 @@ ifdef(`distro_gentoo',`
 /etc/avahi/etc/localtime --	gen_context(system_u:object_r:locale_t,s0)
 /etc/localtime		--	gen_context(system_u:object_r:locale_t,s0)
 /etc/pki(/.*)?			gen_context(system_u:object_r:cert_t,s0)
+/etc/httpd/alias/[^/]*\.db(\.[^/]*)*	-- 	gen_context(system_u:object_r:cert_t,s0)
 
 ifdef(`distro_redhat',`
 /etc/sysconfig/clock	--	gen_context(system_u:object_r:locale_t,s0)


More information about the scm-commits mailing list