diff --git a/policy/modules/services/dcc.te b/policy/modules/services/dcc.te index 0e9f815..21c8230 100644 --- a/policy/modules/services/dcc.te +++ b/policy/modules/services/dcc.te @@ -1,5 +1,5 @@ -policy_module(dcc, 1.8.0) +policy_module(dcc, 1.8.1) ######################################## # @@ -130,7 +130,7 @@ files_tmp_filetrans(dcc_client_t, dcc_client_tmp_t, { file dir }) # Access files in /var/dcc. The map file can be updated allow dcc_client_t dcc_var_t:dir list_dir_perms; -read_files_pattern(dcc_client_t, dcc_var_t, dcc_var_t) +manage_files_pattern(dcc_client_t, dcc_var_t, dcc_var_t) read_lnk_files_pattern(dcc_client_t, dcc_var_t, dcc_var_t) kernel_read_system_state(dcc_client_t) @@ -145,6 +145,8 @@ corenet_udp_bind_generic_node(dcc_client_t) files_read_etc_files(dcc_client_t) files_read_etc_runtime_files(dcc_client_t) +fs_getattr_all_fs(dcc_client_t) + auth_use_nsswitch(dcc_client_t) logging_send_syslog_msg(dcc_client_t) @@ -154,6 +156,10 @@ miscfiles_read_localization(dcc_client_t) userdom_use_user_terminals(dcc_client_t) optional_policy(` + amavis_read_spool_files(dcc_client_t) +') + +optional_policy(` spamassassin_read_spamd_tmp_files(dcc_client_t) ')