1 |
commit: 505366d39ad5f94c182aac0012c6b90f0bb8f649 |
2 |
Author: Dominick Grift <dominick.grift <AT> gmail <DOT> com> |
3 |
AuthorDate: Wed Sep 26 10:05:15 2012 +0000 |
4 |
Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
5 |
CommitDate: Thu Sep 27 17:55:02 2012 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=505366d3 |
7 |
|
8 |
Remove redundant connect avperms |
9 |
|
10 |
Signed-off-by: Dominick Grift <dominick.grift <AT> gmail.com> |
11 |
Signed-off-by: Sven Vermeulen <sven.vermeulen <AT> siphos.be> |
12 |
|
13 |
--- |
14 |
policy/modules/contrib/arpwatch.te | 4 ++-- |
15 |
policy/modules/contrib/bind.te | 4 ++-- |
16 |
policy/modules/contrib/bitlbee.te | 4 ++-- |
17 |
3 files changed, 6 insertions(+), 6 deletions(-) |
18 |
|
19 |
diff --git a/policy/modules/contrib/arpwatch.te b/policy/modules/contrib/arpwatch.te |
20 |
index b6e0b38..fa18c76 100644 |
21 |
--- a/policy/modules/contrib/arpwatch.te |
22 |
+++ b/policy/modules/contrib/arpwatch.te |
23 |
@@ -1,4 +1,4 @@ |
24 |
-policy_module(arpwatch, 1.10.3) |
25 |
+policy_module(arpwatch, 1.10.4) |
26 |
|
27 |
######################################## |
28 |
# |
29 |
@@ -30,7 +30,7 @@ allow arpwatch_t self:capability { net_admin net_raw setgid setuid }; |
30 |
dontaudit arpwatch_t self:capability sys_tty_config; |
31 |
allow arpwatch_t self:process signal_perms; |
32 |
allow arpwatch_t self:unix_stream_socket { accept listen }; |
33 |
-allow arpwatch_t self:tcp_socket { accept connect listen }; |
34 |
+allow arpwatch_t self:tcp_socket { accept listen }; |
35 |
allow arpwatch_t self:packet_socket create_socket_perms; |
36 |
allow arpwatch_t self:socket create_socket_perms; |
37 |
|
38 |
|
39 |
diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te |
40 |
index 9dbf4bb..03790cc 100644 |
41 |
--- a/policy/modules/contrib/bind.te |
42 |
+++ b/policy/modules/contrib/bind.te |
43 |
@@ -1,4 +1,4 @@ |
44 |
-policy_module(bind, 1.12.4) |
45 |
+policy_module(bind, 1.12.5) |
46 |
|
47 |
######################################## |
48 |
# |
49 |
@@ -211,7 +211,7 @@ optional_policy(` |
50 |
allow ndc_t self:capability { dac_override net_admin }; |
51 |
allow ndc_t self:process signal_perms; |
52 |
allow ndc_t self:fifo_file rw_fifo_file_perms; |
53 |
-allow ndc_t self:unix_stream_socket { accept connect listen }; |
54 |
+allow ndc_t self:unix_stream_socket { accept listen }; |
55 |
|
56 |
allow ndc_t dnssec_t:file read_file_perms; |
57 |
allow ndc_t dnssec_t:lnk_file read_lnk_file_perms; |
58 |
|
59 |
diff --git a/policy/modules/contrib/bitlbee.te b/policy/modules/contrib/bitlbee.te |
60 |
index 2f640e7..ea366bd 100644 |
61 |
--- a/policy/modules/contrib/bitlbee.te |
62 |
+++ b/policy/modules/contrib/bitlbee.te |
63 |
@@ -1,4 +1,4 @@ |
64 |
-policy_module(bitlbee, 1.4.2) |
65 |
+policy_module(bitlbee, 1.4.3) |
66 |
|
67 |
######################################## |
68 |
# |
69 |
@@ -35,7 +35,7 @@ files_pid_file(bitlbee_var_run_t) |
70 |
allow bitlbee_t self:capability { dac_override kill setgid setuid sys_nice }; |
71 |
allow bitlbee_t self:process { setsched signal }; |
72 |
allow bitlbee_t self:fifo_file rw_fifo_file_perms; |
73 |
-allow bitlbee_t self:tcp_socket { accept connect listen }; |
74 |
+allow bitlbee_t self:tcp_socket { accept listen }; |
75 |
allow bitlbee_t self:unix_stream_socket { accept listen }; |
76 |
|
77 |
allow bitlbee_t bitlbee_conf_t:dir list_dir_perms; |