PERFORCE change 113414 for review
Todd Miller
millert at FreeBSD.org
Mon Jan 22 20:16:33 UTC 2007
http://perforce.freebsd.org/chv.cgi?CH=113414
Change 113414 by millert at millert_macbook on 2007/01/22 20:07:45
Try to disambiguate file labels for shells and cron executables.
Add self mach_port permissions for syslogd_t and memberd_t.
Affected files ...
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/memberd.te#8 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/corecommands.fc#3 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/services/cron.fc#5 edit
.. //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/system/logging.te#7 edit
Differences ...
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/darwin/memberd.te#8 (text+ko) ====
@@ -42,8 +42,8 @@
init_allow_shm(memberd_t)
init_allow_bootstrap(memberd_t)
-# Talk tro self
-allow memberd_t self:mach_port make_send_once;
+# Talk to self
+allow memberd_t self:mach_port { copy_send hold_send send make_send_once };
# Talk to kernel
kernel_allow_ipc(memberd_t)
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/kernel/corecommands.fc#3 (text+ko) ====
@@ -8,7 +8,9 @@
/bin/ksh -- gen_context(system_u:object_r:shell_exec_t,s0)
/bin/ls -- gen_context(system_u:object_r:ls_exec_t,s0)
/bin/tcsh -- gen_context(system_u:object_r:shell_exec_t,s0)
+/bin/csh -- gen_context(system_u:object_r:shell_exec_t,s0)
/bin/zsh -- gen_context(system_u:object_r:shell_exec_t,s0)
+/bin/zsh-.* -- gen_context(system_u:object_r:shell_exec_t,s0)
#
# /sbin
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/services/cron.fc#5 (text+ko) ====
@@ -7,6 +7,9 @@
/usr/sbin/anacron -- gen_context(system_u:object_r:anacron_exec_t,s0)
/usr/sbin/atd -- gen_context(system_u:object_r:crond_exec_t,s0)
+/usr/sbin/atq -- gen_context(system_u:object_r:crond_exec_t,s0)
+/usr/sbin/atrm -- gen_context(system_u:object_r:crond_exec_t,s0)
+/usr/sbin/batch -- gen_context(system_u:object_r:crond_exec_t,s0)
/usr/sbin/cron(d)? -- gen_context(system_u:object_r:crond_exec_t,s0)
/usr/sbin/fcron -- gen_context(system_u:object_r:crond_exec_t,s0)
==== //depot/projects/trustedbsd/sedarwin8/policies/sedarwin/refpolicy/policy/modules/system/logging.te#7 (text+ko) ====
@@ -147,7 +147,7 @@
# Talk to self
allow syslogd_t self:socket { bind listen accept read };
-allow syslogd_t self:mach_port make_send_once;
+allow syslogd_t self:mach_port { copy_send hold_send send make_send_once };
# Talk to notifyd
notifyd_allow_ipc(syslogd_t)
More information about the trustedbsd-cvs
mailing list