diff --git a/policy/modules/services/amavis.if b/policy/modules/services/amavis.if index 41fa0b4..19a63ef 100644 --- a/policy/modules/services/amavis.if +++ b/policy/modules/services/amavis.if @@ -167,3 +167,22 @@ interface(`amavis_setattr_pid_files',` allow $1 amavis_var_run_t:file setattr; files_search_pids($1) ') + +######################################## +## +## Create of amavis pid files. +## +## +## +## Domain allowed access. +## +## +# +interface(`amavis_create_pid_files',` + gen_require(` + type amavis_var_run_t; + ') + + allow $1 amavis_var_run_t:file create_file_perms; + files_search_pids($1) +') diff --git a/policy/modules/services/amavis.te b/policy/modules/services/amavis.te index 3f7450c..b46567b 100644 --- a/policy/modules/services/amavis.te +++ b/policy/modules/services/amavis.te @@ -1,5 +1,5 @@ -policy_module(amavis,1.2.1) +policy_module(amavis,1.2.2) ######################################## # diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te index 5eb56ba..141cb6c 100644 --- a/policy/modules/services/clamav.te +++ b/policy/modules/services/clamav.te @@ -1,5 +1,5 @@ -policy_module(clamav,1.3.0) +policy_module(clamav,1.3.1) ######################################## # @@ -126,6 +126,7 @@ optional_policy(` amavis_read_lib_files(clamd_t) amavis_read_spool_files(clamd_t) amavis_spool_filetrans(clamd_t,clamd_var_run_t,sock_file) + amavis_create_pid_files(clamd_t) ') ######################################## diff --git a/policy/modules/services/pyzor.te b/policy/modules/services/pyzor.te index 8ee09c7..137a111 100644 --- a/policy/modules/services/pyzor.te +++ b/policy/modules/services/pyzor.te @@ -1,5 +1,5 @@ -policy_module(pyzor,1.2.0) +policy_module(pyzor,1.2.1) ######################################## # @@ -50,9 +50,13 @@ kernel_read_system_state(pyzor_t) corecmd_list_bin(pyzor_t) corecmd_getattr_bin_files(pyzor_t) +corenet_tcp_sendrecv_all_if(pyzor_t) corenet_udp_sendrecv_all_if(pyzor_t) +corenet_tcp_sendrecv_all_nodes(pyzor_t) corenet_udp_sendrecv_all_nodes(pyzor_t) +corenet_tcp_sendrecv_all_ports(pyzor_t) corenet_udp_sendrecv_all_ports(pyzor_t) +corenet_tcp_connect_http_port(pyzor_t) dev_read_urand(pyzor_t) @@ -77,6 +81,7 @@ optional_policy(` ') optional_policy(` + spamassassin_signal_spamd(pyzor_t) spamassassin_read_spamd_tmp_files(pyzor_t) ')