rpms/selinux-policy/F-11 policy-20090521.patch, 1.36, 1.37 selinux-policy.spec, 1.892, 1.893

Miroslav Grepl mgrepl at fedoraproject.org
Fri Jul 31 11:36:19 UTC 2009


Author: mgrepl

Update of /cvs/extras/rpms/selinux-policy/F-11
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv25259

Modified Files:
	policy-20090521.patch selinux-policy.spec 
Log Message:
- Add postfix and dovecot fixes from dwalsh



policy-20090521.patch:
 mcs                                |   12 -
 modules/admin/certwatch.te         |    4 
 modules/admin/kismet.te            |   16 ++
 modules/admin/logrotate.te         |    6 
 modules/admin/mrtg.te              |    4 
 modules/admin/prelink.te           |    9 -
 modules/admin/readahead.te         |    2 
 modules/admin/rpm.if               |   18 ++
 modules/admin/rpm.te               |    4 
 modules/admin/shorewall.fc         |   12 +
 modules/admin/shorewall.if         |  166 ++++++++++++++++++++++
 modules/admin/shorewall.te         |  103 +++++++++++++
 modules/admin/usermanage.te        |    1 
 modules/apps/gitosis.fc            |    4 
 modules/apps/gitosis.if            |   96 ++++++++++++
 modules/apps/gitosis.te            |   43 +++++
 modules/apps/mozilla.if            |   16 ++
 modules/apps/mozilla.te            |   14 +
 modules/apps/nsplugin.if           |    2 
 modules/apps/qemu.fc               |    1 
 modules/apps/qemu.te               |    5 
 modules/apps/sandbox.if            |  134 +++++++++++++-----
 modules/apps/sandbox.te            |  274 ++++++++++++++++++++++++++++++++++---
 modules/apps/vmware.fc             |    1 
 modules/apps/vmware.te             |    6 
 modules/kernel/corecommands.fc     |    9 +
 modules/kernel/corenetwork.te.in   |    2 
 modules/kernel/devices.fc          |    2 
 modules/kernel/devices.if          |  145 +++++++++++++++++++
 modules/kernel/devices.te          |   13 +
 modules/kernel/domain.if           |   45 ++----
 modules/kernel/domain.te           |   30 +++-
 modules/kernel/files.if            |    3 
 modules/kernel/kernel.if           |    2 
 modules/kernel/terminal.if         |   19 ++
 modules/roles/staff.te             |    8 +
 modules/roles/sysadm.if            |   35 ++++
 modules/roles/sysadm.te            |    4 
 modules/roles/unconfineduser.te    |    9 -
 modules/roles/unprivuser.te        |    4 
 modules/roles/xguest.te            |    6 
 modules/services/apache.fc         |    4 
 modules/services/automount.if      |   18 ++
 modules/services/avahi.te          |    2 
 modules/services/bluetooth.te      |    1 
 modules/services/clamav.te         |    4 
 modules/services/consolekit.te     |    3 
 modules/services/cron.if           |   19 --
 modules/services/cron.te           |    2 
 modules/services/cups.te           |    2 
 modules/services/dcc.te            |    8 -
 modules/services/ddclient.if       |   25 +++
 modules/services/devicekit.te      |    6 
 modules/services/dnsmasq.te        |    4 
 modules/services/dovecot.if        |   34 ++--
 modules/services/dovecot.te        |   20 +-
 modules/services/exim.te           |    6 
 modules/services/fetchmail.te      |    2 
 modules/services/fprintd.te        |    8 -
 modules/services/ftp.te            |    7 
 modules/services/gnomeclock.te     |    1 
 modules/services/gpsd.fc           |    3 
 modules/services/gpsd.te           |   17 ++
 modules/services/hal.te            |   12 +
 modules/services/kerberos.if       |    2 
 modules/services/kerberos.te       |   12 +
 modules/services/lircd.te          |    4 
 modules/services/mailman.if        |    1 
 modules/services/mta.if            |    1 
 modules/services/mysql.te          |    4 
 modules/services/nis.te            |    3 
 modules/services/nslcd.fc          |    4 
 modules/services/nslcd.if          |  145 +++++++++++++++++++
 modules/services/nslcd.te          |   50 ++++++
 modules/services/openvpn.te        |    1 
 modules/services/pcscd.te          |    3 
 modules/services/polkit.fc         |    2 
 modules/services/polkit.if         |    2 
 modules/services/polkit.te         |    1 
 modules/services/postfix.if        |   26 +++
 modules/services/postfix.te        |   26 ---
 modules/services/postgresql.te     |    2 
 modules/services/ppp.if            |    6 
 modules/services/privoxy.te        |    3 
 modules/services/pyzor.fc          |    2 
 modules/services/pyzor.te          |    2 
 modules/services/rpc.te            |   12 +
 modules/services/rsync.te          |    2 
 modules/services/sendmail.if       |   39 +++++
 modules/services/sendmail.te       |    7 
 modules/services/setroubleshoot.te |    5 
 modules/services/shorewall.fc      |   12 -
 modules/services/shorewall.if      |  166 ----------------------
 modules/services/shorewall.te      |  102 -------------
 modules/services/spamassassin.fc   |    4 
 modules/services/spamassassin.te   |    1 
 modules/services/ssh.if            |   23 ++-
 modules/services/ssh.te            |    4 
 modules/services/uucp.te           |    2 
 modules/services/virt.te           |   27 ++-
 modules/services/xserver.fc        |    2 
 modules/services/xserver.if        |   19 ++
 modules/services/xserver.te        |   11 +
 modules/system/authlogin.fc        |    3 
 modules/system/authlogin.if        |  222 ++++++++++++++++-------------
 modules/system/authlogin.te        |   27 +--
 modules/system/init.fc             |    2 
 modules/system/init.te             |    2 
 modules/system/ipsec.te            |   34 ++--
 modules/system/iptables.te         |    4 
 modules/system/iscsi.te            |    1 
 modules/system/libraries.fc        |   11 +
 modules/system/locallogin.te       |    6 
 modules/system/miscfiles.fc        |    1 
 modules/system/sysnetwork.te       |   17 +-
 modules/system/udev.fc             |    1 
 modules/system/udev.te             |    6 
 modules/system/userdomain.if       |   23 +--
 modules/system/virtual.te          |    5 
 modules/system/xen.te              |    1 
 120 files changed, 1970 insertions(+), 633 deletions(-)

Index: policy-20090521.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-11/policy-20090521.patch,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -p -r1.36 -r1.37
--- policy-20090521.patch	31 Jul 2009 08:41:12 -0000	1.36
+++ policy-20090521.patch	31 Jul 2009 11:36:19 -0000	1.37
@@ -2233,20 +2233,178 @@ diff -b -B --ignore-all-space --exclude-
  	tftp_read_content(dnsmasq_t)
  ')
  
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.if serefpolicy-3.6.12/policy/modules/services/dovecot.if
+--- nsaserefpolicy/policy/modules/services/dovecot.if	2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/dovecot.if	2009-07-31 13:05:17.000000000 +0200
+@@ -2,47 +2,44 @@
+ 
+ ########################################
+ ## <summary>
+-##	Create, read, write, and delete the dovecot spool files.
++##	Connect to dovecot auth unix domain stream socket.
+ ## </summary>
+ ## <param name="domain">
+ ##	<summary>
+ ##	Domain allowed access.
+ ##	</summary>
+ ## </param>
++## <rolecap/>
+ #
+-interface(`dovecot_manage_spool',`
++interface(`dovecot_stream_connect_auth',`
+ 	gen_require(`
+-		type dovecot_spool_t;
++		type dovecot_auth_t, dovecot_var_run_t;
+ 	')
+ 
+-	manage_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
+-	manage_lnk_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
++	stream_connect_pattern($1, dovecot_var_run_t, dovecot_var_run_t, dovecot_auth_t)
+ ')
+ 
+ ########################################
+ ## <summary>
+-##	Connect to dovecot auth unix domain stream socket.
++##	Execute dovecot_deliver in the dovecot_deliver domain.
+ ## </summary>
+ ## <param name="domain">
+ ##	<summary>
+ ##	Domain allowed access.
+ ##	</summary>
+ ## </param>
+-## <rolecap/>
+ #
+-interface(`dovecot_auth_stream_connect',`
++interface(`dovecot_domtrans_deliver',`
+ 	gen_require(`
+-		type dovecot_auth_t, dovecot_var_run_t;
++		type dovecot_deliver_t, dovecot_deliver_exec_t;
+ 	')
+ 
+-	allow $1 dovecot_var_run_t:dir search;
+-	allow $1 dovecot_var_run_t:sock_file write;
+-	allow $1 dovecot_auth_t:unix_stream_socket connectto;
++	domtrans_pattern($1, dovecot_deliver_exec_t, dovecot_deliver_t)
+ ')
+ 
+ ########################################
+ ## <summary>
+-##	Execute dovecot_deliver in the dovecot_deliver domain.
++##	Create, read, write, and delete the dovecot spool files.
+ ## </summary>
+ ## <param name="domain">
+ ##	<summary>
+@@ -50,17 +47,18 @@
+ ##	</summary>
+ ## </param>
+ #
+-interface(`dovecot_domtrans_deliver',`
++interface(`dovecot_manage_spool',`
+ 	gen_require(`
+-		type dovecot_deliver_t, dovecot_deliver_exec_t;
++		type dovecot_spool_t;
+ 	')
+ 
+-	domtrans_pattern($1, dovecot_deliver_exec_t, dovecot_deliver_t)
++	manage_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
++	manage_lnk_files_pattern($1, dovecot_spool_t, dovecot_spool_t)
+ ')
+ 
+-#######################################
++########################################
+ ## <summary>
+-##      Do not audit attempts to d`elete dovecot lib files.
++##	Do not audit attempts to delete dovecot lib files.
+ ## </summary>
+ ## <param name="domain">
+ ##	<summary>
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.te serefpolicy-3.6.12/policy/modules/services/dovecot.te
+--- nsaserefpolicy/policy/modules/services/dovecot.te	2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/dovecot.te	2009-07-31 13:05:22.000000000 +0200
+@@ -1,5 +1,5 @@
+ 
+-policy_module(dovecot, 1.10.2)
++policy_module(dovecot, 1.10.3)
+ 
+ ########################################
+ #
+@@ -15,15 +15,18 @@
+ domain_entry_file(dovecot_auth_t, dovecot_auth_exec_t)
+ role system_r types dovecot_auth_t;
+ 
++type dovecot_auth_tmp_t;
++files_tmp_file(dovecot_auth_tmp_t)
++
++type dovecot_cert_t;
++files_type(dovecot_cert_t)
++
+ type dovecot_deliver_t;
+ type dovecot_deliver_exec_t;
+ domain_type(dovecot_deliver_t)
+ domain_entry_file(dovecot_deliver_t, dovecot_deliver_exec_t)
+ role system_r types dovecot_deliver_t;
+ 
+-type dovecot_cert_t;
+-files_type(dovecot_cert_t)
+-
+ type dovecot_etc_t;
+ files_config_file(dovecot_etc_t)
+ 
+@@ -46,9 +49,6 @@
+ type dovecot_var_run_t;
+ files_pid_file(dovecot_var_run_t)
+ 
+-type dovecot_auth_tmp_t;
+-files_tmp_file(dovecot_auth_tmp_t)
+-
+ ########################################
+ #
+ # dovecot local policy
+@@ -73,7 +73,6 @@
+ 
+ can_exec(dovecot_t, dovecot_exec_t)
+ 
+-# log files
+ manage_files_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
+ logging_log_filetrans(dovecot_t, dovecot_var_log_t, file)
+ 
+@@ -181,7 +180,7 @@
+ 
+ allow dovecot_auth_t dovecot_var_run_t:dir list_dir_perms;
+ manage_sock_files_pattern(dovecot_auth_t, dovecot_var_run_t, dovecot_var_run_t)
+-dovecot_auth_stream_connect(dovecot_auth_t)
++dovecot_stream_connect_auth(dovecot_auth_t)
+ 
+ kernel_read_all_sysctls(dovecot_auth_t)
+ kernel_read_system_state(dovecot_auth_t)
+@@ -252,9 +251,10 @@
+ 
+ miscfiles_read_localization(dovecot_deliver_t)
+ 
+-dovecot_auth_stream_connect(dovecot_deliver_t)
++dovecot_stream_connect_auth(dovecot_deliver_t)
+ 
+ files_search_tmp(dovecot_deliver_t)
++
+ fs_getattr_all_fs(dovecot_deliver_t)
+ 
+ userdom_manage_user_home_content_dirs(dovecot_deliver_t)
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/exim.te serefpolicy-3.6.12/policy/modules/services/exim.te
 --- nsaserefpolicy/policy/modules/services/exim.te	2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/exim.te	2009-07-24 15:40:36.000000000 +0200
-@@ -152,6 +152,10 @@
++++ serefpolicy-3.6.12/policy/modules/services/exim.te	2009-07-31 13:05:27.000000000 +0200
+@@ -148,7 +148,11 @@
  ')
  
  optional_policy(`
-+	sendmail_manage_tmp(exim_t)
+-	dovecot_auth_stream_connect(exim_t)
++	dovecot_stream_connect_auth(exim_t)
 +')
 +
 +optional_policy(`
- 	tunable_policy(`exim_can_connect_db',`
- 		mysql_stream_connect(exim_t)
- 	')
++	sendmail_manage_tmp(exim_t)
+ ')
+ 
+ optional_policy(`
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/fetchmail.te serefpolicy-3.6.12/policy/modules/services/fetchmail.te
 --- nsaserefpolicy/policy/modules/services/fetchmail.te	2009-06-25 10:19:44.000000000 +0200
 +++ serefpolicy-3.6.12/policy/modules/services/fetchmail.te	2009-06-29 16:22:53.000000000 +0200
@@ -2854,8 +3012,22 @@ diff -b -B --ignore-all-space --exclude-
  optional_policy(`
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postfix.if serefpolicy-3.6.12/policy/modules/services/postfix.if
 --- nsaserefpolicy/policy/modules/services/postfix.if	2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/postfix.if	2009-06-25 10:21:01.000000000 +0200
-@@ -580,6 +580,25 @@
++++ serefpolicy-3.6.12/policy/modules/services/postfix.if	2009-07-31 13:05:32.000000000 +0200
+@@ -112,6 +112,13 @@
+ template(`postfix_server_domain_template',`
+ 	postfix_domain_template($1)
+ 
++	type postfix_$1_tmp_t;
++	files_tmp_file(postfix_$1_tmp_t)
++
++	manage_dirs_pattern(postfix_$1_t, postfix_$1_tmp_t, postfix_$1_tmp_t)
++	manage_files_pattern(postfix_$1_t, postfix_$1_tmp_t, postfix_$1_tmp_t)
++	files_tmp_filetrans(postfix_$1_t, postfix_$1_tmp_t, { file dir })
++
+ 	allow postfix_$1_t self:capability { setuid setgid dac_override };
+ 	allow postfix_$1_t postfix_master_t:unix_stream_socket { connectto rw_stream_socket_perms };
+ 	allow postfix_$1_t self:tcp_socket create_socket_perms;
+@@ -580,6 +587,25 @@
  
  ########################################
  ## <summary>
@@ -2881,6 +3053,84 @@ diff -b -B --ignore-all-space --exclude-
  ##	Execute the master postdrop in the
  ##	postfix_postdrop domain.
  ## </summary>
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postfix.te serefpolicy-3.6.12/policy/modules/services/postfix.te
+--- nsaserefpolicy/policy/modules/services/postfix.te	2009-06-25 10:19:44.000000000 +0200
++++ serefpolicy-3.6.12/policy/modules/services/postfix.te	2009-07-31 13:05:36.000000000 +0200
+@@ -42,9 +42,6 @@
+ 	mta_manage_spool(postfix_local_t)
+ ')
+ 
+-type postfix_local_tmp_t;
+-files_tmp_file(postfix_local_tmp_t)
+-
+ # Program for creating database files
+ type postfix_map_t;
+ type postfix_map_exec_t;
+@@ -106,9 +103,6 @@
+ postfix_server_domain_template(virtual)
+ mta_mailserver_delivery(postfix_virtual_t)
+ 
+-type postfix_virtual_tmp_t;
+-files_tmp_file(postfix_virtual_tmp_t)
+-
+ ########################################
+ #
+ # Postfix master process local policy
+@@ -302,10 +296,6 @@
+ allow postfix_local_t self:fifo_file rw_fifo_file_perms;
+ allow postfix_local_t self:process { setsched setrlimit };
+ 
+-manage_dirs_pattern(postfix_local_t, postfix_local_tmp_t, postfix_local_tmp_t)
+-manage_files_pattern(postfix_local_t, postfix_local_tmp_t, postfix_local_tmp_t)
+-files_tmp_filetrans(postfix_local_t, postfix_local_tmp_t, { file dir })
+-
+ # connect to master process
+ stream_connect_pattern(postfix_local_t, postfix_public_t, postfix_public_t, postfix_master_t)
+ 
+@@ -399,14 +389,6 @@
+ 
+ miscfiles_read_localization(postfix_map_t)
+ 
+-tunable_policy(`read_default_t',`
+-	files_list_default(postfix_map_t)
+-	files_read_default_files(postfix_map_t)
+-	files_read_default_symlinks(postfix_map_t)
+-	files_read_default_sockets(postfix_map_t)
+-	files_read_default_pipes(postfix_map_t)
+-')
+-
+ optional_policy(`
+ 	locallogin_dontaudit_use_fds(postfix_map_t)
+ ')
+@@ -508,7 +490,7 @@
+ ')
+ 
+ optional_policy(`
+-	sendmail_rw_unix_stream_sockets(postfix_postdrop_t)
++	sendmail_dontaudit_rw_unix_stream_sockets(postfix_postdrop_t)
+ ')
+ 
+ optional_policy(`
+@@ -640,7 +622,7 @@
+ mta_read_aliases(postfix_smtpd_t)
+ 
+ optional_policy(`
+-	dovecot_auth_stream_connect(postfix_smtpd_t)
++	dovecot_stream_connect_auth(postfix_smtpd_t)
+ ')
+ 
+ optional_policy(`
+@@ -665,10 +647,6 @@
+ 
+ allow postfix_virtual_t postfix_spool_t:file rw_file_perms;
+ 
+-manage_dirs_pattern(postfix_virtual_t, postfix_virtual_tmp_t, postfix_virtual_tmp_t)
+-manage_files_pattern(postfix_virtual_t, postfix_virtual_tmp_t, postfix_virtual_tmp_t)
+-files_tmp_filetrans(postfix_virtual_t, postfix_virtual_tmp_t, { file dir })
+-
+ # connect to master process
+ stream_connect_pattern(postfix_virtual_t, { postfix_private_t postfix_public_t }, { postfix_private_t postfix_public_t }, postfix_master_t)
+ 
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/postgresql.te serefpolicy-3.6.12/policy/modules/services/postgresql.te
 --- nsaserefpolicy/policy/modules/services/postgresql.te	2009-06-25 10:19:44.000000000 +0200
 +++ serefpolicy-3.6.12/policy/modules/services/postgresql.te	2009-07-08 21:12:21.000000000 +0200
@@ -3007,8 +3257,33 @@ diff -b -B --ignore-all-space --exclude-
  	auth_read_all_symlinks_except_shadow(rsync_t)
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/sendmail.if serefpolicy-3.6.12/policy/modules/services/sendmail.if
 --- nsaserefpolicy/policy/modules/services/sendmail.if	2009-06-25 10:19:44.000000000 +0200
-+++ serefpolicy-3.6.12/policy/modules/services/sendmail.if	2009-07-24 15:42:39.000000000 +0200
-@@ -238,3 +238,24 @@
++++ serefpolicy-3.6.12/policy/modules/services/sendmail.if	2009-07-31 13:22:05.000000000 +0200
+@@ -92,6 +92,24 @@
+ 	allow $1 sendmail_t:unix_stream_socket { getattr read write ioctl };
+ ')
+ 
++#######################################
++## <summary>
++##      Dontaudit Read and write sendmail unix_stream_sockets.
++## </summary>
++## <param name="domain">
++##      <summary>
++##      Domain allowed access.
++##      </summary>
++## </param>
++#
++interface(`sendmail_dontaudit_rw_unix_stream_sockets',`
++        gen_require(`
++                type sendmail_t;
++        ')
++
++        dontaudit $1 sendmail_t:unix_stream_socket { getattr read write ioctl };
++')
++
+ ########################################
+ ## <summary>
+ ##	Read sendmail logs.
+@@ -238,3 +256,24 @@
  
  	allow $1 sendmail_t:fifo_file rw_fifo_file_perms; 
  ')


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-11/selinux-policy.spec,v
retrieving revision 1.892
retrieving revision 1.893
diff -u -p -r1.892 -r1.893
--- selinux-policy.spec	31 Jul 2009 08:41:12 -0000	1.892
+++ selinux-policy.spec	31 Jul 2009 11:36:19 -0000	1.893
@@ -20,7 +20,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.6.12
-Release: 71%{?dist}
+Release: 72%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -475,6 +475,9 @@ exit 0
 %endif
 
 %changelog
+* Fri Jul 31 2009 Miroslav Grepl <mgrepl at redhat.com> 3.6.12-72
+- Add postfix and dovecot fixes from dwalsh
+
 * Fri Jul 31 2009 Miroslav Grepl <mgrepl at redhat.com> 3.6.12-71
 - Allow lircd read/write input event devices 
 




More information about the fedora-extras-commits mailing list