Gentoo Archives: gentoo-commits

From: Sven Vermeulen <sven.vermeulen@××××××.be>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Thu, 27 Sep 2012 18:07:15
Message-Id: 1348768502.505366d39ad5f94c182aac0012c6b90f0bb8f649.SwifT@gentoo
1 commit: 505366d39ad5f94c182aac0012c6b90f0bb8f649
2 Author: Dominick Grift <dominick.grift <AT> gmail <DOT> com>
3 AuthorDate: Wed Sep 26 10:05:15 2012 +0000
4 Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
5 CommitDate: Thu Sep 27 17:55:02 2012 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=505366d3
7
8 Remove redundant connect avperms
9
10 Signed-off-by: Dominick Grift <dominick.grift <AT> gmail.com>
11 Signed-off-by: Sven Vermeulen <sven.vermeulen <AT> siphos.be>
12
13 ---
14 policy/modules/contrib/arpwatch.te | 4 ++--
15 policy/modules/contrib/bind.te | 4 ++--
16 policy/modules/contrib/bitlbee.te | 4 ++--
17 3 files changed, 6 insertions(+), 6 deletions(-)
18
19 diff --git a/policy/modules/contrib/arpwatch.te b/policy/modules/contrib/arpwatch.te
20 index b6e0b38..fa18c76 100644
21 --- a/policy/modules/contrib/arpwatch.te
22 +++ b/policy/modules/contrib/arpwatch.te
23 @@ -1,4 +1,4 @@
24 -policy_module(arpwatch, 1.10.3)
25 +policy_module(arpwatch, 1.10.4)
26
27 ########################################
28 #
29 @@ -30,7 +30,7 @@ allow arpwatch_t self:capability { net_admin net_raw setgid setuid };
30 dontaudit arpwatch_t self:capability sys_tty_config;
31 allow arpwatch_t self:process signal_perms;
32 allow arpwatch_t self:unix_stream_socket { accept listen };
33 -allow arpwatch_t self:tcp_socket { accept connect listen };
34 +allow arpwatch_t self:tcp_socket { accept listen };
35 allow arpwatch_t self:packet_socket create_socket_perms;
36 allow arpwatch_t self:socket create_socket_perms;
37
38
39 diff --git a/policy/modules/contrib/bind.te b/policy/modules/contrib/bind.te
40 index 9dbf4bb..03790cc 100644
41 --- a/policy/modules/contrib/bind.te
42 +++ b/policy/modules/contrib/bind.te
43 @@ -1,4 +1,4 @@
44 -policy_module(bind, 1.12.4)
45 +policy_module(bind, 1.12.5)
46
47 ########################################
48 #
49 @@ -211,7 +211,7 @@ optional_policy(`
50 allow ndc_t self:capability { dac_override net_admin };
51 allow ndc_t self:process signal_perms;
52 allow ndc_t self:fifo_file rw_fifo_file_perms;
53 -allow ndc_t self:unix_stream_socket { accept connect listen };
54 +allow ndc_t self:unix_stream_socket { accept listen };
55
56 allow ndc_t dnssec_t:file read_file_perms;
57 allow ndc_t dnssec_t:lnk_file read_lnk_file_perms;
58
59 diff --git a/policy/modules/contrib/bitlbee.te b/policy/modules/contrib/bitlbee.te
60 index 2f640e7..ea366bd 100644
61 --- a/policy/modules/contrib/bitlbee.te
62 +++ b/policy/modules/contrib/bitlbee.te
63 @@ -1,4 +1,4 @@
64 -policy_module(bitlbee, 1.4.2)
65 +policy_module(bitlbee, 1.4.3)
66
67 ########################################
68 #
69 @@ -35,7 +35,7 @@ files_pid_file(bitlbee_var_run_t)
70 allow bitlbee_t self:capability { dac_override kill setgid setuid sys_nice };
71 allow bitlbee_t self:process { setsched signal };
72 allow bitlbee_t self:fifo_file rw_fifo_file_perms;
73 -allow bitlbee_t self:tcp_socket { accept connect listen };
74 +allow bitlbee_t self:tcp_socket { accept listen };
75 allow bitlbee_t self:unix_stream_socket { accept listen };
76
77 allow bitlbee_t bitlbee_conf_t:dir list_dir_perms;