1
0
selinux-policy/fix_apache.patch
Johannes Segitz 0ae8014c7e Accepting request 978251 from home:jsegitz:branches:security:SELinux_3.3
- Update to version 20220428. Refreshed:
  * fix_apache.patch
  * fix_hadoop.patch
  * fix_init.patch
  * fix_iptables.patch
  * fix_kernel_sysctl.patch
  * fix_networkmanager.patch
  * fix_systemd.patch
  * fix_systemd_watch.patch
  * fix_unprivuser.patch
  * fix_usermanage.patch
  * fix_wine.patch

OBS-URL: https://build.opensuse.org/request/show/978251
OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=129
2022-05-20 09:46:20 +00:00

31 lines
959 B
Diff

Index: fedora-policy-20220428/policy/modules/contrib/apache.if
===================================================================
--- fedora-policy-20220428.orig/policy/modules/contrib/apache.if
+++ fedora-policy-20220428/policy/modules/contrib/apache.if
@@ -1989,3 +1989,25 @@ interface(`apache_ioctl_stream_sockets',
allow $1 httpd_t:unix_stream_socket ioctl;
')
+
+#######################################
+## <summary>
+## Allow the specified domain to execute
+## httpd_sys_content_t and manage httpd_sys_rw_content_t
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`apache_exec_sys_content',`
+ gen_require(`
+ type httpd_sys_content_t;
+ type httpd_sys_rw_content_t;
+ ')
+
+ apache_manage_sys_content_rw($1)
+ filetrans_pattern($1, httpd_sys_content_t, httpd_sys_rw_content_t, { file dir lnk_file })
+ can_exec($1, httpd_sys_content_t)
+')