Gentoo Archives: gentoo-commits

From: Sven Vermeulen <sven.vermeulen@××××××.be>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Mon, 29 Oct 2012 14:56:31
Message-Id: 1351522121.4fbae7cc37c231d8d892142079d9412ab30554f8.SwifT@gentoo
1 commit: 4fbae7cc37c231d8d892142079d9412ab30554f8
2 Author: Dominick Grift <dominick.grift <AT> gmail <DOT> com>
3 AuthorDate: Mon Oct 29 09:31:58 2012 +0000
4 Commit: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
5 CommitDate: Mon Oct 29 14:48:41 2012 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=4fbae7cc
7
8 Changes to the sxid policy module
9
10 Module clean up
11
12 Signed-off-by: Dominick Grift <dominick.grift <AT> gmail.com>
13
14 ---
15 policy/modules/contrib/sxid.fc | 1 +
16 policy/modules/contrib/sxid.if | 5 ++---
17 policy/modules/contrib/sxid.te | 14 +++++++++-----
18 3 files changed, 12 insertions(+), 8 deletions(-)
19
20 diff --git a/policy/modules/contrib/sxid.fc b/policy/modules/contrib/sxid.fc
21 index 0ed39fd..9529948 100644
22 --- a/policy/modules/contrib/sxid.fc
23 +++ b/policy/modules/contrib/sxid.fc
24 @@ -1,4 +1,5 @@
25 /usr/bin/sxid -- gen_context(system_u:object_r:sxid_exec_t,s0)
26 +
27 /usr/sbin/checksecurity\.se -- gen_context(system_u:object_r:sxid_exec_t,s0)
28
29 /var/log/setuid.* -- gen_context(system_u:object_r:sxid_log_t,s0)
30
31 diff --git a/policy/modules/contrib/sxid.if b/policy/modules/contrib/sxid.if
32 index dd8ac62..83d2e94 100644
33 --- a/policy/modules/contrib/sxid.if
34 +++ b/policy/modules/contrib/sxid.if
35 @@ -1,9 +1,8 @@
36 -## <summary>SUID/SGID program monitoring</summary>
37 +## <summary>SUID/SGID program monitoring.</summary>
38
39 ########################################
40 ## <summary>
41 -## Allow the specified domain to read
42 -## sxid log files.
43 +## Read sxid log files.
44 ## </summary>
45 ## <param name="domain">
46 ## <summary>
47
48 diff --git a/policy/modules/contrib/sxid.te b/policy/modules/contrib/sxid.te
49 index 8296303..c9824cb 100644
50 --- a/policy/modules/contrib/sxid.te
51 +++ b/policy/modules/contrib/sxid.te
52 @@ -1,4 +1,4 @@
53 -policy_module(sxid, 1.7.0)
54 +policy_module(sxid, 1.7.1)
55
56 ########################################
57 #
58 @@ -27,7 +27,7 @@ allow sxid_t self:fifo_file rw_fifo_file_perms;
59 allow sxid_t self:tcp_socket create_stream_socket_perms;
60 allow sxid_t self:udp_socket create_socket_perms;
61
62 -allow sxid_t sxid_log_t:file manage_file_perms;
63 +allow sxid_t sxid_log_t:file { append_file_perms create_file_perms setattr_file_perms };
64 logging_log_filetrans(sxid_t, sxid_log_t, file)
65
66 manage_dirs_pattern(sxid_t, sxid_tmp_t, sxid_tmp_t)
67 @@ -76,13 +76,17 @@ logging_send_syslog_msg(sxid_t)
68
69 miscfiles_read_localization(sxid_t)
70
71 -mount_exec(sxid_t)
72 -
73 sysnet_read_config(sxid_t)
74
75 userdom_dontaudit_use_unpriv_user_fds(sxid_t)
76
77 -cron_system_entry(sxid_t, sxid_exec_t)
78 +optional_policy(`
79 + cron_system_entry(sxid_t, sxid_exec_t)
80 +')
81 +
82 +optional_policy(`
83 + mount_exec(sxid_t)
84 +')
85
86 optional_policy(`
87 mta_send_mail(sxid_t)