1 |
commit: 4fbae7cc37c231d8d892142079d9412ab30554f8 |
2 |
Author: Dominick Grift <dominick.grift <AT> gmail <DOT> com> |
3 |
AuthorDate: Mon Oct 29 09:31:58 2012 +0000 |
4 |
Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> |
5 |
CommitDate: Mon Oct 29 14:48:41 2012 +0000 |
6 |
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=4fbae7cc |
7 |
|
8 |
Changes to the sxid policy module |
9 |
|
10 |
Module clean up |
11 |
|
12 |
Signed-off-by: Dominick Grift <dominick.grift <AT> gmail.com> |
13 |
|
14 |
--- |
15 |
policy/modules/contrib/sxid.fc | 1 + |
16 |
policy/modules/contrib/sxid.if | 5 ++--- |
17 |
policy/modules/contrib/sxid.te | 14 +++++++++----- |
18 |
3 files changed, 12 insertions(+), 8 deletions(-) |
19 |
|
20 |
diff --git a/policy/modules/contrib/sxid.fc b/policy/modules/contrib/sxid.fc |
21 |
index 0ed39fd..9529948 100644 |
22 |
--- a/policy/modules/contrib/sxid.fc |
23 |
+++ b/policy/modules/contrib/sxid.fc |
24 |
@@ -1,4 +1,5 @@ |
25 |
/usr/bin/sxid -- gen_context(system_u:object_r:sxid_exec_t,s0) |
26 |
+ |
27 |
/usr/sbin/checksecurity\.se -- gen_context(system_u:object_r:sxid_exec_t,s0) |
28 |
|
29 |
/var/log/setuid.* -- gen_context(system_u:object_r:sxid_log_t,s0) |
30 |
|
31 |
diff --git a/policy/modules/contrib/sxid.if b/policy/modules/contrib/sxid.if |
32 |
index dd8ac62..83d2e94 100644 |
33 |
--- a/policy/modules/contrib/sxid.if |
34 |
+++ b/policy/modules/contrib/sxid.if |
35 |
@@ -1,9 +1,8 @@ |
36 |
-## <summary>SUID/SGID program monitoring</summary> |
37 |
+## <summary>SUID/SGID program monitoring.</summary> |
38 |
|
39 |
######################################## |
40 |
## <summary> |
41 |
-## Allow the specified domain to read |
42 |
-## sxid log files. |
43 |
+## Read sxid log files. |
44 |
## </summary> |
45 |
## <param name="domain"> |
46 |
## <summary> |
47 |
|
48 |
diff --git a/policy/modules/contrib/sxid.te b/policy/modules/contrib/sxid.te |
49 |
index 8296303..c9824cb 100644 |
50 |
--- a/policy/modules/contrib/sxid.te |
51 |
+++ b/policy/modules/contrib/sxid.te |
52 |
@@ -1,4 +1,4 @@ |
53 |
-policy_module(sxid, 1.7.0) |
54 |
+policy_module(sxid, 1.7.1) |
55 |
|
56 |
######################################## |
57 |
# |
58 |
@@ -27,7 +27,7 @@ allow sxid_t self:fifo_file rw_fifo_file_perms; |
59 |
allow sxid_t self:tcp_socket create_stream_socket_perms; |
60 |
allow sxid_t self:udp_socket create_socket_perms; |
61 |
|
62 |
-allow sxid_t sxid_log_t:file manage_file_perms; |
63 |
+allow sxid_t sxid_log_t:file { append_file_perms create_file_perms setattr_file_perms }; |
64 |
logging_log_filetrans(sxid_t, sxid_log_t, file) |
65 |
|
66 |
manage_dirs_pattern(sxid_t, sxid_tmp_t, sxid_tmp_t) |
67 |
@@ -76,13 +76,17 @@ logging_send_syslog_msg(sxid_t) |
68 |
|
69 |
miscfiles_read_localization(sxid_t) |
70 |
|
71 |
-mount_exec(sxid_t) |
72 |
- |
73 |
sysnet_read_config(sxid_t) |
74 |
|
75 |
userdom_dontaudit_use_unpriv_user_fds(sxid_t) |
76 |
|
77 |
-cron_system_entry(sxid_t, sxid_exec_t) |
78 |
+optional_policy(` |
79 |
+ cron_system_entry(sxid_t, sxid_exec_t) |
80 |
+') |
81 |
+ |
82 |
+optional_policy(` |
83 |
+ mount_exec(sxid_t) |
84 |
+') |
85 |
|
86 |
optional_policy(` |
87 |
mta_send_mail(sxid_t) |