Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Sun, 18 Feb 2018 11:30:50
Message-Id: 1518952770.8fdebd557db3d293e40ef47be7cbff315576beab.perfinion@gentoo
1 commit: 8fdebd557db3d293e40ef47be7cbff315576beab
2 Author: Chris PeBenito <pebenito <AT> ieee <DOT> org>
3 AuthorDate: Thu Feb 15 22:09:45 2018 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sun Feb 18 11:19:30 2018 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=8fdebd55
7
8 Simple map patch from Russell Coker.
9
10 policy/modules/contrib/dictd.te | 3 ++-
11 policy/modules/contrib/dpkg.if | 18 ++++++++++++++++++
12 policy/modules/contrib/dpkg.te | 2 +-
13 policy/modules/contrib/logrotate.te | 3 ++-
14 policy/modules/contrib/tor.te | 2 +-
15 5 files changed, 24 insertions(+), 4 deletions(-)
16
17 diff --git a/policy/modules/contrib/dictd.te b/policy/modules/contrib/dictd.te
18 index acf5c932..6cad541b 100644
19 --- a/policy/modules/contrib/dictd.te
20 +++ b/policy/modules/contrib/dictd.te
21 @@ -1,4 +1,4 @@
22 -policy_module(dictd, 1.11.0)
23 +policy_module(dictd, 1.11.1)
24
25 ########################################
26 #
27 @@ -57,6 +57,7 @@ dev_read_sysfs(dictd_t)
28
29 domain_use_interactive_fds(dictd_t)
30
31 +files_map_usr_files(dictd_t)
32 files_read_etc_runtime_files(dictd_t)
33 files_read_usr_files(dictd_t)
34 files_search_var_lib(dictd_t)
35
36 diff --git a/policy/modules/contrib/dpkg.if b/policy/modules/contrib/dpkg.if
37 index c753ad62..a5e88d6f 100644
38 --- a/policy/modules/contrib/dpkg.if
39 +++ b/policy/modules/contrib/dpkg.if
40 @@ -301,3 +301,21 @@ interface(`dpkg_manage_script_tmp_files',`
41 allow $1 dpkg_script_tmp_t:dir manage_dir_perms;
42 allow $1 dpkg_script_tmp_t:file manage_file_perms;
43 ')
44 +
45 +########################################
46 +## <summary>
47 +## map dpkg_script_tmp_t files
48 +## </summary>
49 +## <param name="domain">
50 +## <summary>
51 +## Domain allowed access.
52 +## </summary>
53 +## </param>
54 +#
55 +interface(`dpkg_map_script_tmp_files',`
56 + gen_require(`
57 + type dpkg_script_tmp_t;
58 + ')
59 +
60 + allow $1 dpkg_script_tmp_t:file map;
61 +')
62
63 diff --git a/policy/modules/contrib/dpkg.te b/policy/modules/contrib/dpkg.te
64 index 0ff59b94..e7747bc7 100644
65 --- a/policy/modules/contrib/dpkg.te
66 +++ b/policy/modules/contrib/dpkg.te
67 @@ -1,4 +1,4 @@
68 -policy_module(dpkg, 1.12.0)
69 +policy_module(dpkg, 1.12.1)
70
71 ########################################
72 #
73
74 diff --git a/policy/modules/contrib/logrotate.te b/policy/modules/contrib/logrotate.te
75 index 4bb9da7b..2490cdfa 100644
76 --- a/policy/modules/contrib/logrotate.te
77 +++ b/policy/modules/contrib/logrotate.te
78 @@ -1,4 +1,4 @@
79 -policy_module(logrotate, 1.20.0)
80 +policy_module(logrotate, 1.20.1)
81
82 ########################################
83 #
84 @@ -77,6 +77,7 @@ domain_use_interactive_fds(logrotate_t)
85 domain_getattr_all_entry_files(logrotate_t)
86 domain_read_all_domains_state(logrotate_t)
87
88 +files_map_etc_files(logrotate_t)
89 files_read_usr_files(logrotate_t)
90 files_read_etc_runtime_files(logrotate_t)
91 files_read_all_pids(logrotate_t)
92
93 diff --git a/policy/modules/contrib/tor.te b/policy/modules/contrib/tor.te
94 index 990ea8c4..8029630f 100644
95 --- a/policy/modules/contrib/tor.te
96 +++ b/policy/modules/contrib/tor.te
97 @@ -1,4 +1,4 @@
98 -policy_module(tor, 1.14.0)
99 +policy_module(tor, 1.14.1)
100
101 ########################################
102 #