diff --git a/policy/modules/services/dcc.fc b/policy/modules/services/dcc.fc
index 45efbf1..ecda170 100644
--- a/policy/modules/services/dcc.fc
+++ b/policy/modules/services/dcc.fc
@@ -13,6 +13,9 @@
/var/dcc(/.*)? gen_context(system_u:object_r:dcc_var_t,s0)
/var/dcc/map -- gen_context(system_u:object_r:dcc_client_map_t,s0)
+/var/lib/dcc(/.*)? gen_context(system_u:object_r:dcc_var_t,s0)
+/var/lib/dcc/map -- gen_context(system_u:object_r:dcc_client_map_t,s0)
+
/var/run/dcc(/.*)? gen_context(system_u:object_r:dcc_var_run_t,s0)
/var/run/dcc/map -- gen_context(system_u:object_r:dcc_client_map_t,s0)
/var/run/dcc/dccifd -s gen_context(system_u:object_r:dccifd_var_run_t,s0)
diff --git a/policy/modules/services/dcc.te b/policy/modules/services/dcc.te
index 03c3dda..437302f 100644
--- a/policy/modules/services/dcc.te
+++ b/policy/modules/services/dcc.te
@@ -1,5 +1,5 @@
-policy_module(dcc, 1.7.2)
+policy_module(dcc, 1.7.3)
########################################
#
diff --git a/policy/modules/services/fail2ban.fc b/policy/modules/services/fail2ban.fc
index c886ef5..0de2b83 100644
--- a/policy/modules/services/fail2ban.fc
+++ b/policy/modules/services/fail2ban.fc
@@ -2,5 +2,7 @@
/usr/bin/fail2ban -- gen_context(system_u:object_r:fail2ban_exec_t,s0)
/usr/bin/fail2ban-server -- gen_context(system_u:object_r:fail2ban_exec_t,s0)
+
+/var/lib/fail2ban(/.*)? gen_context(system_u:object_r:fail2ban_var_lib_t,s0)
/var/log/fail2ban\.log -- gen_context(system_u:object_r:fail2ban_log_t,s0)
/var/run/fail2ban.* gen_context(system_u:object_r:fail2ban_var_run_t,s0)
diff --git a/policy/modules/services/fail2ban.if b/policy/modules/services/fail2ban.if
index d9fc7e1..aa53435 100644
--- a/policy/modules/services/fail2ban.if
+++ b/policy/modules/services/fail2ban.if
@@ -20,6 +20,25 @@ interface(`fail2ban_domtrans',`
########################################
##
+## Read fail2ban lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`fail2ban_read_lib_files',`
+ gen_require(`
+ type fail2ban_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 fail2ban_var_lib_t:file read_file_perms;
+')
+
+########################################
+##
## Allow the specified domain to read fail2ban's log files.
##
##
@@ -105,7 +124,7 @@ interface(`fail2ban_admin',`
allow $1 fail2ban_t:process { ptrace signal_perms };
ps_process_pattern($1, fail2ban_t)
- init_labeled_script_domtrans($1, rbcbind_initrc_exec_t)
+ init_labeled_script_domtrans($1, fail2ban_initrc_exec_t)
domain_system_change_exemption($1)
role_transition $2 fail2ban_initrc_exec_t system_r;
allow $2 system_r;
diff --git a/policy/modules/services/fail2ban.te b/policy/modules/services/fail2ban.te
index a9cde01..7be6eb0 100644
--- a/policy/modules/services/fail2ban.te
+++ b/policy/modules/services/fail2ban.te
@@ -1,5 +1,5 @@
-policy_module(fail2ban, 1.2.1)
+policy_module(fail2ban, 1.2.2)
########################################
#
@@ -17,6 +17,9 @@ init_script_file(fail2ban_initrc_exec_t)
type fail2ban_log_t;
logging_log_file(fail2ban_log_t)
+type fail2ban_var_lib_t;
+files_type(fail2ban_var_lib_t)
+
# pid files
type fail2ban_var_run_t;
files_pid_file(fail2ban_var_run_t)
@@ -26,6 +29,7 @@ files_pid_file(fail2ban_var_run_t)
# fail2ban local policy
#
+allow fail2ban_t self:capability { sys_tty_config };
allow fail2ban_t self:process signal;
allow fail2ban_t self:fifo_file rw_fifo_file_perms;
allow fail2ban_t self:unix_stream_socket { connectto create_stream_socket_perms };
@@ -36,6 +40,10 @@ allow fail2ban_t fail2ban_log_t:dir setattr;
manage_files_pattern(fail2ban_t, fail2ban_log_t, fail2ban_log_t)
logging_log_filetrans(fail2ban_t, fail2ban_log_t, file)
+manage_dirs_pattern(fail2ban_t, fail2ban_var_lib_t, fail2ban_var_lib_t)
+manage_files_pattern(fail2ban_t, fail2ban_var_lib_t, fail2ban_var_lib_t)
+files_var_lib_filetrans(fail2ban_t, fail2ban_var_lib_t, { dir file })
+
# pid file
manage_dirs_pattern(fail2ban_t, fail2ban_var_run_t, fail2ban_var_run_t)
manage_sock_files_pattern(fail2ban_t, fail2ban_var_run_t, fail2ban_var_run_t)
diff --git a/policy/modules/services/fetchmail.te b/policy/modules/services/fetchmail.te
index af3947a..734a58f 100644
--- a/policy/modules/services/fetchmail.te
+++ b/policy/modules/services/fetchmail.te
@@ -1,5 +1,5 @@
-policy_module(fetchmail, 1.8.1)
+policy_module(fetchmail, 1.8.2)
########################################
#
@@ -9,6 +9,7 @@ policy_module(fetchmail, 1.8.1)
type fetchmail_t;
type fetchmail_exec_t;
init_daemon_domain(fetchmail_t, fetchmail_exec_t)
+application_executable_file(fetchmail_exec_t)
type fetchmail_var_run_t;
files_pid_file(fetchmail_var_run_t)
diff --git a/policy/modules/services/gpm.if b/policy/modules/services/gpm.if
index 2890beb..1fecb11 100644
--- a/policy/modules/services/gpm.if
+++ b/policy/modules/services/gpm.if
@@ -16,7 +16,7 @@ interface(`gpm_stream_connect',`
type gpmctl_t, gpm_t;
')
- allow $1 gpmctl_t:sock_file { getattr write };
+ allow $1 gpmctl_t:sock_file rw_sock_file_perms;
allow $1 gpm_t:unix_stream_socket connectto;
')
diff --git a/policy/modules/services/gpm.te b/policy/modules/services/gpm.te
index 786cd6d..70ec2ab 100644
--- a/policy/modules/services/gpm.te
+++ b/policy/modules/services/gpm.te
@@ -1,5 +1,5 @@
-policy_module(gpm, 1.6.0)
+policy_module(gpm, 1.6.1)
########################################
#
@@ -54,6 +54,8 @@ dev_read_sysfs(gpm_t)
dev_rw_input_dev(gpm_t)
dev_rw_mouse(gpm_t)
+files_read_etc_files(gpm_t)
+
fs_getattr_all_fs(gpm_t)
fs_search_auto_mountpoints(gpm_t)
diff --git a/policy/modules/services/rlogin.fc b/policy/modules/services/rlogin.fc
index b447800..2785337 100644
--- a/policy/modules/services/rlogin.fc
+++ b/policy/modules/services/rlogin.fc
@@ -1,3 +1,4 @@
+HOME_DIR/\.rlogin -- gen_context(system_u:object_r:rlogind_home_t,s0)
/usr/kerberos/sbin/klogind -- gen_context(system_u:object_r:rlogind_exec_t,s0)
diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if
index d111a6f..0e272a4 100644
--- a/policy/modules/services/rlogin.if
+++ b/policy/modules/services/rlogin.if
@@ -18,3 +18,30 @@ interface(`rlogin_domtrans',`
corecmd_search_bin($1)
domtrans_pattern($1, rlogind_exec_t, rlogind_t)
')
+
+########################################
+##
+## read rlogin homedir content (.config)
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+template(`rlogin_read_home_content',`
+ gen_require(`
+ type rlogind_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ list_dirs_pattern($1, rlogind_home_t, rlogind_home_t)
+ read_files_pattern($1, rlogind_home_t, rlogind_home_t)
+ read_lnk_files_pattern($1, rlogind_home_t, rlogind_home_t)
+')
diff --git a/policy/modules/services/rlogin.te b/policy/modules/services/rlogin.te
index 2b87f32..8a70702 100644
--- a/policy/modules/services/rlogin.te
+++ b/policy/modules/services/rlogin.te
@@ -1,5 +1,5 @@
-policy_module(rlogin, 1.8.3)
+policy_module(rlogin, 1.8.4)
########################################
#
@@ -14,6 +14,9 @@ role system_r types rlogind_t;
type rlogind_devpts_t; #, userpty_type;
term_login_pty(rlogind_devpts_t)
+type rlogind_home_t;
+userdom_user_home_content(rlogind_home_t)
+
type rlogind_tmp_t;
files_tmp_file(rlogind_tmp_t)
@@ -90,6 +93,8 @@ userdom_read_user_home_content_files(rlogind_t)
remotelogin_domtrans(rlogind_t)
remotelogin_signal(rlogind_t)
+rlogin_read_home_content(rlogind_t)
+
tunable_policy(`use_nfs_home_dirs',`
fs_list_nfs(rlogind_t)
fs_read_nfs_files(rlogind_t)
diff --git a/policy/modules/services/rshd.te b/policy/modules/services/rshd.te
index f338d63..3ec9ba4 100644
--- a/policy/modules/services/rshd.te
+++ b/policy/modules/services/rshd.te
@@ -1,5 +1,5 @@
-policy_module(rshd, 1.6.1)
+policy_module(rshd, 1.6.2)
########################################
#
@@ -84,6 +84,10 @@ optional_policy(`
')
optional_policy(`
+ rlogin_read_home_content(rshd_t)
+')
+
+optional_policy(`
tcpd_wrapped_domain(rshd_t, rshd_exec_t)
')
diff --git a/policy/modules/services/rsync.te b/policy/modules/services/rsync.te
index f9e9396..d4cda95 100644
--- a/policy/modules/services/rsync.te
+++ b/policy/modules/services/rsync.te
@@ -1,5 +1,5 @@
-policy_module(rsync, 1.8.3)
+policy_module(rsync, 1.8.4)
########################################
#
@@ -119,6 +119,8 @@ optional_policy(`
tunable_policy(`rsync_export_all_ro',`
fs_read_noxattr_fs_files(rsync_t)
+ fs_read_nfs_files(rsync_t)
+ fs_read_cifs_files(rsync_t)
auth_read_all_dirs_except_shadow(rsync_t)
auth_read_all_files_except_shadow(rsync_t)
auth_read_all_symlinks_except_shadow(rsync_t)
diff --git a/policy/modules/services/tftp.if b/policy/modules/services/tftp.if
index 9213db0..2cbde68 100644
--- a/policy/modules/services/tftp.if
+++ b/policy/modules/services/tftp.if
@@ -2,6 +2,24 @@
########################################
##
+## Read tftp content
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`tftp_read_content',`
+ gen_require(`
+ type tftpdir_t;
+ ')
+
+ read_files_pattern($1, tftpdir_t, tftpdir_t)
+')
+
+########################################
+##
## All of the rules required to administrate
## an tftp environment
##
diff --git a/policy/modules/services/tftp.te b/policy/modules/services/tftp.te
index 56a81d9..0de9043 100644
--- a/policy/modules/services/tftp.te
+++ b/policy/modules/services/tftp.te
@@ -1,5 +1,5 @@
-policy_module(tftp, 1.10.2)
+policy_module(tftp, 1.10.3)
########################################
#
diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if
index 9fb8175..4a2118e 100644
--- a/policy/modules/services/ulogd.if
+++ b/policy/modules/services/ulogd.if
@@ -60,6 +60,25 @@ interface(`ulogd_read_log',`
read_files_pattern($1, ulogd_var_log_t, ulogd_var_log_t)
')
+#######################################
+##
+## Allow the specified domain to search ulogd's log files.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+interface(`ulogd_search_log',`
+ gen_require(`
+ type ulogd_var_log_t;
+ ')
+
+ logging_search_logs($1)
+ allow $1 ulogd_var_log_t:dir search_dir_perms;
+')
+
########################################
##
## Allow the specified domain to append to ulogd's log files.
diff --git a/policy/modules/services/ulogd.te b/policy/modules/services/ulogd.te
index f6c2d11..bb0a682 100644
--- a/policy/modules/services/ulogd.te
+++ b/policy/modules/services/ulogd.te
@@ -1,5 +1,5 @@
-policy_module(ulogd, 1.0.0)
+policy_module(ulogd, 1.0.1)
########################################
#
diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if
index 3e49a8c..84d4ddf 100644
--- a/policy/modules/services/zosremote.if
+++ b/policy/modules/services/zosremote.if
@@ -12,7 +12,7 @@
#
interface(`zosremote_domtrans',`
gen_require(`
- type zos_remote_t, type zos_remote_exec_t;
+ type zos_remote_t, zos_remote_exec_t;
')
domtrans_pattern($1, zos_remote_exec_t, zos_remote_t)
diff --git a/policy/modules/services/zosremote.te b/policy/modules/services/zosremote.te
index bdddee3..a93d638 100644
--- a/policy/modules/services/zosremote.te
+++ b/policy/modules/services/zosremote.te
@@ -1,4 +1,4 @@
-policy_module(zosremote,1.0.0)
+policy_module(zosremote, 1.0.1)
########################################
#