From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id B781B138010 for ; Mon, 29 Oct 2012 14:56:31 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 47FB021C0C5; Mon, 29 Oct 2012 14:54:19 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 850C821C084 for ; Mon, 29 Oct 2012 14:54:18 +0000 (UTC) Received: from hornbill.gentoo.org (hornbill.gentoo.org [94.100.119.163]) (using TLSv1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id B9B5F33D979 for ; Mon, 29 Oct 2012 14:54:17 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by hornbill.gentoo.org (Postfix) with ESMTP id 6A9DAE544F for ; Mon, 29 Oct 2012 14:54:15 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1351522121.4fbae7cc37c231d8d892142079d9412ab30554f8.SwifT@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/sxid.fc policy/modules/contrib/sxid.if policy/modules/contrib/sxid.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: SwifT X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 4fbae7cc37c231d8d892142079d9412ab30554f8 X-VCS-Branch: master Date: Mon, 29 Oct 2012 14:54:15 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: e936e5e5-0878-4271-a665-9766e8c1077d X-Archives-Hash: 5af389d00bea228ae7a4f50e8b7c2870 commit: 4fbae7cc37c231d8d892142079d9412ab30554f8 Author: Dominick Grift gmail com> AuthorDate: Mon Oct 29 09:31:58 2012 +0000 Commit: Sven Vermeulen siphos be> CommitDate: Mon Oct 29 14:48:41 2012 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=4fbae7cc Changes to the sxid policy module Module clean up Signed-off-by: Dominick Grift gmail.com> --- policy/modules/contrib/sxid.fc | 1 + policy/modules/contrib/sxid.if | 5 ++--- policy/modules/contrib/sxid.te | 14 +++++++++----- 3 files changed, 12 insertions(+), 8 deletions(-) diff --git a/policy/modules/contrib/sxid.fc b/policy/modules/contrib/sxid.fc index 0ed39fd..9529948 100644 --- a/policy/modules/contrib/sxid.fc +++ b/policy/modules/contrib/sxid.fc @@ -1,4 +1,5 @@ /usr/bin/sxid -- gen_context(system_u:object_r:sxid_exec_t,s0) + /usr/sbin/checksecurity\.se -- gen_context(system_u:object_r:sxid_exec_t,s0) /var/log/setuid.* -- gen_context(system_u:object_r:sxid_log_t,s0) diff --git a/policy/modules/contrib/sxid.if b/policy/modules/contrib/sxid.if index dd8ac62..83d2e94 100644 --- a/policy/modules/contrib/sxid.if +++ b/policy/modules/contrib/sxid.if @@ -1,9 +1,8 @@ -## SUID/SGID program monitoring +## SUID/SGID program monitoring. ######################################## ## -## Allow the specified domain to read -## sxid log files. +## Read sxid log files. ## ## ## diff --git a/policy/modules/contrib/sxid.te b/policy/modules/contrib/sxid.te index 8296303..c9824cb 100644 --- a/policy/modules/contrib/sxid.te +++ b/policy/modules/contrib/sxid.te @@ -1,4 +1,4 @@ -policy_module(sxid, 1.7.0) +policy_module(sxid, 1.7.1) ######################################## # @@ -27,7 +27,7 @@ allow sxid_t self:fifo_file rw_fifo_file_perms; allow sxid_t self:tcp_socket create_stream_socket_perms; allow sxid_t self:udp_socket create_socket_perms; -allow sxid_t sxid_log_t:file manage_file_perms; +allow sxid_t sxid_log_t:file { append_file_perms create_file_perms setattr_file_perms }; logging_log_filetrans(sxid_t, sxid_log_t, file) manage_dirs_pattern(sxid_t, sxid_tmp_t, sxid_tmp_t) @@ -76,13 +76,17 @@ logging_send_syslog_msg(sxid_t) miscfiles_read_localization(sxid_t) -mount_exec(sxid_t) - sysnet_read_config(sxid_t) userdom_dontaudit_use_unpriv_user_fds(sxid_t) -cron_system_entry(sxid_t, sxid_exec_t) +optional_policy(` + cron_system_entry(sxid_t, sxid_exec_t) +') + +optional_policy(` + mount_exec(sxid_t) +') optional_policy(` mta_send_mail(sxid_t)