diff --git a/policy/modules/apps/mozilla.if b/policy/modules/apps/mozilla.if index dfac7cc..7615dc2 100644 --- a/policy/modules/apps/mozilla.if +++ b/policy/modules/apps/mozilla.if @@ -235,6 +235,7 @@ interface(`mozilla_run_plugin',` mozilla_domtrans_plugin($1) role $2 types mozilla_plugin_t; + allow $2 mozilla_plugin_t:unix_stream_socket connectto; ') ######################################## diff --git a/policy/modules/apps/sandbox.te b/policy/modules/apps/sandbox.te index 2251b02..2419a2a 100644 --- a/policy/modules/apps/sandbox.te +++ b/policy/modules/apps/sandbox.te @@ -363,7 +363,6 @@ optional_policy(` optional_policy(` nsplugin_read_rw_files(sandbox_web_type) nsplugin_rw_exec(sandbox_web_type) - nsplugin_manage_rw(sandbox_web_type) ') optional_policy(` diff --git a/policy/modules/services/apache.te b/policy/modules/services/apache.te index 411a3ff..1a47bdc 100644 --- a/policy/modules/services/apache.te +++ b/policy/modules/services/apache.te @@ -364,6 +364,7 @@ allow httpd_t self:unix_dgram_socket { create_socket_perms sendto }; allow httpd_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow httpd_t self:tcp_socket create_stream_socket_perms; allow httpd_t self:udp_socket create_socket_perms; +dontaudit httpd_t self:netlink_audit_socket create_socket_perms; # Allow httpd_t to put files in /var/cache/httpd etc manage_dirs_pattern(httpd_t, httpd_cache_t, httpd_cache_t) diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te index 44cd738..edd7260 100644 --- a/policy/modules/services/xserver.te +++ b/policy/modules/services/xserver.te @@ -375,7 +375,6 @@ ifdef(`hide_broken_symptoms',` tunable_policy(`use_fusefs_home_dirs',` fs_manage_fusefs_files(xauth_t) - fs_read_fusefs_symlinks(xauth_t) ') tunable_policy(`use_nfs_home_dirs',` @@ -673,8 +672,6 @@ ifdef(`distro_rhel4',` tunable_policy(`use_fusefs_home_dirs',` fs_manage_fusefs_dirs(xdm_t) fs_manage_fusefs_files(xdm_t) - fs_manage_fusefs_symlinks(xdm_t) - fs_exec_fusefs_files(xdm_t) ') tunable_policy(`use_nfs_home_dirs',` @@ -1170,7 +1167,6 @@ tunable_policy(`use_nfs_home_dirs',` tunable_policy(`use_fusefs_home_dirs',` fs_manage_fusefs_dirs(xserver_t) fs_manage_fusefs_files(xserver_t) - fs_manage_fusefs_symlinks(xserver_t) ') tunable_policy(`use_samba_home_dirs',` diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index d17f2bf..e90e509 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -139,6 +139,7 @@ allow init_t initrc_var_run_t:file { rw_file_perms setattr }; kernel_read_system_state(init_t) kernel_share_state(init_t) +kernel_stream_connect(init_t) corecmd_exec_chroot(init_t) corecmd_exec_bin(init_t)