1 |
commit: 8fdebd557db3d293e40ef47be7cbff315576beab |
2 |
Author: Chris PeBenito <pebenito <AT> ieee <DOT> org> |
3 |
AuthorDate: Thu Feb 15 22:09:45 2018 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Feb 18 11:19:30 2018 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=8fdebd55 |
7 |
|
8 |
Simple map patch from Russell Coker. |
9 |
|
10 |
policy/modules/contrib/dictd.te | 3 ++- |
11 |
policy/modules/contrib/dpkg.if | 18 ++++++++++++++++++ |
12 |
policy/modules/contrib/dpkg.te | 2 +- |
13 |
policy/modules/contrib/logrotate.te | 3 ++- |
14 |
policy/modules/contrib/tor.te | 2 +- |
15 |
5 files changed, 24 insertions(+), 4 deletions(-) |
16 |
|
17 |
diff --git a/policy/modules/contrib/dictd.te b/policy/modules/contrib/dictd.te |
18 |
index acf5c932..6cad541b 100644 |
19 |
--- a/policy/modules/contrib/dictd.te |
20 |
+++ b/policy/modules/contrib/dictd.te |
21 |
@@ -1,4 +1,4 @@ |
22 |
-policy_module(dictd, 1.11.0) |
23 |
+policy_module(dictd, 1.11.1) |
24 |
|
25 |
######################################## |
26 |
# |
27 |
@@ -57,6 +57,7 @@ dev_read_sysfs(dictd_t) |
28 |
|
29 |
domain_use_interactive_fds(dictd_t) |
30 |
|
31 |
+files_map_usr_files(dictd_t) |
32 |
files_read_etc_runtime_files(dictd_t) |
33 |
files_read_usr_files(dictd_t) |
34 |
files_search_var_lib(dictd_t) |
35 |
|
36 |
diff --git a/policy/modules/contrib/dpkg.if b/policy/modules/contrib/dpkg.if |
37 |
index c753ad62..a5e88d6f 100644 |
38 |
--- a/policy/modules/contrib/dpkg.if |
39 |
+++ b/policy/modules/contrib/dpkg.if |
40 |
@@ -301,3 +301,21 @@ interface(`dpkg_manage_script_tmp_files',` |
41 |
allow $1 dpkg_script_tmp_t:dir manage_dir_perms; |
42 |
allow $1 dpkg_script_tmp_t:file manage_file_perms; |
43 |
') |
44 |
+ |
45 |
+######################################## |
46 |
+## <summary> |
47 |
+## map dpkg_script_tmp_t files |
48 |
+## </summary> |
49 |
+## <param name="domain"> |
50 |
+## <summary> |
51 |
+## Domain allowed access. |
52 |
+## </summary> |
53 |
+## </param> |
54 |
+# |
55 |
+interface(`dpkg_map_script_tmp_files',` |
56 |
+ gen_require(` |
57 |
+ type dpkg_script_tmp_t; |
58 |
+ ') |
59 |
+ |
60 |
+ allow $1 dpkg_script_tmp_t:file map; |
61 |
+') |
62 |
|
63 |
diff --git a/policy/modules/contrib/dpkg.te b/policy/modules/contrib/dpkg.te |
64 |
index 0ff59b94..e7747bc7 100644 |
65 |
--- a/policy/modules/contrib/dpkg.te |
66 |
+++ b/policy/modules/contrib/dpkg.te |
67 |
@@ -1,4 +1,4 @@ |
68 |
-policy_module(dpkg, 1.12.0) |
69 |
+policy_module(dpkg, 1.12.1) |
70 |
|
71 |
######################################## |
72 |
# |
73 |
|
74 |
diff --git a/policy/modules/contrib/logrotate.te b/policy/modules/contrib/logrotate.te |
75 |
index 4bb9da7b..2490cdfa 100644 |
76 |
--- a/policy/modules/contrib/logrotate.te |
77 |
+++ b/policy/modules/contrib/logrotate.te |
78 |
@@ -1,4 +1,4 @@ |
79 |
-policy_module(logrotate, 1.20.0) |
80 |
+policy_module(logrotate, 1.20.1) |
81 |
|
82 |
######################################## |
83 |
# |
84 |
@@ -77,6 +77,7 @@ domain_use_interactive_fds(logrotate_t) |
85 |
domain_getattr_all_entry_files(logrotate_t) |
86 |
domain_read_all_domains_state(logrotate_t) |
87 |
|
88 |
+files_map_etc_files(logrotate_t) |
89 |
files_read_usr_files(logrotate_t) |
90 |
files_read_etc_runtime_files(logrotate_t) |
91 |
files_read_all_pids(logrotate_t) |
92 |
|
93 |
diff --git a/policy/modules/contrib/tor.te b/policy/modules/contrib/tor.te |
94 |
index 990ea8c4..8029630f 100644 |
95 |
--- a/policy/modules/contrib/tor.te |
96 |
+++ b/policy/modules/contrib/tor.te |
97 |
@@ -1,4 +1,4 @@ |
98 |
-policy_module(tor, 1.14.0) |
99 |
+policy_module(tor, 1.14.1) |
100 |
|
101 |
######################################## |
102 |
# |