diff --git a/SOURCES/policy-rhel-7.4.z-base.patch b/SOURCES/policy-rhel-7.4.z-base.patch new file mode 100644 index 0000000..e69de29 --- /dev/null +++ b/SOURCES/policy-rhel-7.4.z-base.patch diff --git a/SOURCES/policy-rhel-7.4.z-contrib.patch b/SOURCES/policy-rhel-7.4.z-contrib.patch new file mode 100644 index 0000000..dc4e90c --- /dev/null +++ b/SOURCES/policy-rhel-7.4.z-contrib.patch @@ -0,0 +1,55 @@ +diff --git a/lldpad.te b/lldpad.te +index 42e5578f2..3399d597a 100644 +--- a/lldpad.te ++++ b/lldpad.te +@@ -64,3 +64,7 @@ optional_policy(` + optional_policy(` + networkmanager_dgram_send(lldpad_t) + ') ++ ++optional_policy(` ++ virt_dgram_send(lldpad_t) ++') +diff --git a/tomcat.te b/tomcat.te +index 97bdd60c9..386c4b7ac 100644 +--- a/tomcat.te ++++ b/tomcat.te +@@ -51,6 +51,9 @@ optional_policy(` + # tomcat domain policy + # + ++allow tomcat_t self:capability { dac_override setuid kill }; ++ ++allow tomcat_t self:process { setcap signal signull }; + allow tomcat_domain self:fifo_file rw_fifo_file_perms; + allow tomcat_domain self:unix_stream_socket create_stream_socket_perms; + +diff --git a/virt.if b/virt.if +index 1d17889f3..c6792a5a3 100644 +--- a/virt.if ++++ b/virt.if +@@ -1618,4 +1618,23 @@ interface(`virt_dontaudit_read_state',` + dontaudit $1 virtd_t:dir search_dir_perms; + dontaudit $1 virtd_t:file read_file_perms; + dontaudit $1 virtd_t:lnk_file read_lnk_file_perms; ++') ++ ++####################################### ++## ++## Send to libvirt with a unix dgram socket. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`virt_dgram_send',` ++ gen_require(` ++ type virtd_t, virt_var_run_t; ++ ') ++ ++ files_search_pids($1) ++ dgram_send_pattern($1, virt_var_run_t, virt_var_run_t, virtd_t) + ') +\ No newline at end of file diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 7d21a32..2e37a69 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -20,7 +20,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.13.1 -Release: 166%{?dist} +Release: 166%{?dist}.4 License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -28,6 +28,8 @@ patch: policy-rhel-7.1-base.patch patch1: policy-rhel-7.1-contrib.patch patch2: policy-rhel-7.4-base.patch patch3: policy-rhel-7.4-contrib.patch +patch4: policy-rhel-7.4.z-base.patch +patch5: policy-rhel-7.4.z-contrib.patch Source1: modules-targeted-base.conf Source31: modules-targeted-contrib.conf Source2: booleans-targeted.conf @@ -339,9 +341,11 @@ Based off of reference policy: Checked out revision 2.20091117 %prep %setup -n serefpolicy-contrib-%{version} -q -b 29 %patch3 -p1 +%patch5 -p1 contrib_path=`pwd` %setup -n serefpolicy-%{version} -q %patch2 -p1 +%patch4 -p1 refpolicy_path=`pwd` cp $contrib_path/* $refpolicy_path/policy/modules/contrib rm -rf $refpolicy_path/policy/modules/contrib/kubernetes.* @@ -651,6 +655,22 @@ fi %endif %changelog +* Sat Aug 26 2017 Lukas Vrabec - 3.13.1-166.4 +- Allow tomcat_t domain couple capabilities to make working tomcat-jsvc +Resolves: rhbz#1485308 + +* Thu Aug 10 2017 Lukas Vrabec - 3.13.1-166.3 +- Fixing wrong NVR +Resolves: rhbz#1479767 + +* Thu Aug 10 2017 Lukas Vrabec - 3.13.1-166.2 +- Increase NVR +Resolves: rhbz#1479767 + +* Wed Aug 09 2017 Lukas Vrabec - 3.13.1-166.1 +- Allow llpdad send dgram to libvirt +Resolves: rhbz#1479767 + * Mon Jul 10 2017 Lukas Vrabec - 3.13.1-166 - Add new boolean gluster_use_execmem Resolves: rhbz#1469027