rpms/selinux-policy-strict/devel policy-20050719.patch, 1.2, 1.3 selinux-policy-strict.spec, 1.356, 1.357
fedora-cvs-commits at redhat.com
fedora-cvs-commits at redhat.com
Thu Jul 21 17:16:02 UTC 2005
Author: dwalsh
Update of /cvs/dist/rpms/selinux-policy-strict/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv12906
Modified Files:
policy-20050719.patch selinux-policy-strict.spec
Log Message:
* Thu Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-3
- Fix spec file for file_context.homedirs
policy-20050719.patch:
domains/program/crond.te | 3 ++-
domains/program/fsadm.te | 2 +-
domains/program/getty.te | 2 +-
domains/program/ifconfig.te | 1 +
domains/program/initrc.te | 2 +-
domains/program/modutil.te | 2 +-
domains/program/restorecon.te | 1 -
domains/program/unused/NetworkManager.te | 8 ++++++++
domains/program/unused/apmd.te | 2 +-
domains/program/unused/cvs.te | 9 +++++++++
domains/program/unused/cyrus.te | 1 +
domains/program/unused/evolution.te | 1 +
domains/program/unused/hald.te | 4 ++++
domains/program/unused/hotplug.te | 3 ++-
domains/program/unused/kudzu.te | 5 +++--
domains/program/unused/lvm.te | 2 +-
domains/program/unused/mta.te | 4 ++--
domains/program/unused/mysqld.te | 1 -
domains/program/unused/pamconsole.te | 2 +-
domains/program/unused/ping.te | 4 ++++
domains/program/unused/postgresql.te | 5 +++--
domains/program/unused/pppd.te | 29 ++++++++++++++++++++++++++++-
domains/program/unused/rlogind.te | 1 +
domains/program/unused/samba.te | 1 +
domains/program/unused/slocate.te | 4 +++-
domains/program/unused/squid.te | 1 +
domains/program/unused/thunderbird.te | 1 +
domains/program/unused/udev.te | 5 +++--
domains/program/unused/vpnc.te | 15 +++++++++++++--
domains/program/unused/winbind.te | 1 +
domains/program/useradd.te | 1 +
file_contexts/distros.fc | 6 ++++++
file_contexts/program/postgresql.fc | 4 ++++
file_contexts/program/pppd.fc | 1 +
file_contexts/program/vpnc.fc | 1 +
file_contexts/types.fc | 4 ++--
genfs_contexts | 1 +
macros/admin_macros.te | 1 +
macros/base_user_macros.te | 13 -------------
macros/content_macros.te | 5 ++++-
macros/global_macros.te | 19 +++++++++++++++++++
macros/program/apache_macros.te | 4 +++-
macros/program/cdrecord_macros.te | 17 ++++++-----------
macros/program/evolution_macros.te | 7 +++----
macros/program/gconf_macros.te | 1 +
macros/program/gnome_vfs_macros.te | 6 ++++++
macros/program/mail_client_macros.te | 13 +++++++++++--
macros/program/mozilla_macros.te | 6 +++++-
macros/program/thunderbird_macros.te | 14 ++++++++------
macros/user_macros.te | 18 +++---------------
net_contexts | 1 +
targeted/domains/program/crond.te | 9 ++++++---
tunables/distro.tun | 2 +-
tunables/tunable.tun | 7 ++-----
types/file.te | 9 +++++++++
types/network.te | 1 +
56 files changed, 205 insertions(+), 88 deletions(-)
Index: policy-20050719.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy-strict/devel/policy-20050719.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- policy-20050719.patch 20 Jul 2005 03:37:43 -0000 1.2
+++ policy-20050719.patch 21 Jul 2005 17:15:59 -0000 1.3
@@ -1,7 +1,7 @@
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/crond.te policy-1.25.3/domains/program/crond.te
--- nsapolicy/domains/program/crond.te 2005-07-06 17:15:06.000000000 -0400
-+++ policy-1.25.3/domains/program/crond.te 2005-07-19 15:41:44.000000000 -0400
-@@ -201,7 +201,7 @@
++++ policy-1.25.3/domains/program/crond.te 2005-07-21 09:07:03.000000000 -0400
+@@ -201,11 +201,12 @@
r_dir_file(system_crond_t, file_context_t)
can_getsecurity(system_crond_t)
}
@@ -10,6 +10,11 @@
#
# Required for webalizer
#
+ ifdef(`apache.te', `
+ allow system_crond_t { httpd_log_t httpd_config_t }:file { getattr read };
++allow system_crond_t httpd_modules_t:lnk_file read;
+ ')
+ dontaudit crond_t self:capability sys_tty_config;
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/fsadm.te policy-1.25.3/domains/program/fsadm.te
--- nsapolicy/domains/program/fsadm.te 2005-07-06 17:15:06.000000000 -0400
+++ policy-1.25.3/domains/program/fsadm.te 2005-07-19 15:41:44.000000000 -0400
@@ -69,6 +74,17 @@
;
role system_r types insmod_t;
role sysadm_r types insmod_t;
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/restorecon.te policy-1.25.3/domains/program/restorecon.te
+--- nsapolicy/domains/program/restorecon.te 2005-07-06 17:15:06.000000000 -0400
++++ policy-1.25.3/domains/program/restorecon.te 2005-07-20 20:51:57.000000000 -0400
+@@ -49,7 +49,6 @@
+ allow restorecon_t ptyfile:chr_file getattr;
+
+ allow restorecon_t fs_t:filesystem getattr;
+-allow restorecon_t fs_type:dir r_dir_perms;
+
+ allow restorecon_t etc_runtime_t:file { getattr read };
+ allow restorecon_t etc_t:file { getattr read };
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/apmd.te policy-1.25.3/domains/program/unused/apmd.te
--- nsapolicy/domains/program/unused/apmd.te 2005-07-12 08:50:43.000000000 -0400
+++ policy-1.25.3/domains/program/unused/apmd.te 2005-07-19 15:41:44.000000000 -0400
@@ -83,8 +99,8 @@
role sysadm_r types apm_t;
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/cvs.te policy-1.25.3/domains/program/unused/cvs.te
--- nsapolicy/domains/program/unused/cvs.te 2005-04-27 10:28:50.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/cvs.te 2005-07-19 15:41:44.000000000 -0400
-@@ -12,5 +12,15 @@
++++ policy-1.25.3/domains/program/unused/cvs.te 2005-07-20 10:09:23.000000000 -0400
+@@ -12,5 +12,14 @@
#
inetd_child_domain(cvs, tcp)
@@ -94,12 +110,11 @@
type cvs_data_t, file_type, sysadmfile;
create_dir_file(cvs_t, cvs_data_t)
+can_exec(cvs_t, { bin_t sbin_t shell_exec_t })
++allow cvs_t bin_t:dir search;
++allow cvs_t { bin_t sbin_t }:lnk_file read;
+allow cvs_t etc_runtime_t:file { getattr read };
+allow system_mail_t cvs_data_t:file { getattr read };
+dontaudit cvs_t devtty_t:chr_file { read write };
-+allow cvs_t default_t:dir search;
-+allow cvs_t default_t:lnk_file read;
-+
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/cyrus.te policy-1.25.3/domains/program/unused/cyrus.te
--- nsapolicy/domains/program/unused/cyrus.te 2005-07-12 08:50:43.000000000 -0400
+++ policy-1.25.3/domains/program/unused/cyrus.te 2005-07-19 15:41:44.000000000 -0400
@@ -185,13 +200,31 @@
dontaudit lvm_t devpts_t:dir { getattr read };
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/mta.te policy-1.25.3/domains/program/unused/mta.te
--- nsapolicy/domains/program/unused/mta.te 2005-05-25 11:28:10.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/mta.te 2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/mta.te 2005-07-20 14:35:47.000000000 -0400
+@@ -22,7 +22,7 @@
+ # rules are currently defined in sendmail.te, but it is not included in
+ # targeted policy. We could move these rules permanantly here.
+ ifdef(`postfix.te', `', `can_exec_any(system_mail_t)')
+-allow system_mail_t self:dir { search };
++allow system_mail_t self:dir search;
+ allow system_mail_t self:lnk_file read;
+ r_dir_file(system_mail_t, { proc_t proc_net_t })
+ allow system_mail_t fs_t:filesystem getattr;
@@ -71,4 +71,4 @@
allow mta_delivery_agent { etc_runtime_t proc_t }:file { getattr read };
allow system_mail_t etc_runtime_t:file { getattr read };
-allow system_mail_t { random_device_t urandom_device_t }:chr_file read;
+allow system_mail_t { random_device_t urandom_device_t }:chr_file { getattr read };
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/mysqld.te policy-1.25.3/domains/program/unused/mysqld.te
+--- nsapolicy/domains/program/unused/mysqld.te 2005-07-06 17:15:07.000000000 -0400
++++ policy-1.25.3/domains/program/unused/mysqld.te 2005-07-20 14:31:19.000000000 -0400
+@@ -87,5 +87,4 @@
+ allow userdomain mysqld_var_run_t:sock_file write;
+ }
+ ')
+-
+ allow mysqld_t self:netlink_route_socket r_netlink_socket_perms;
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/NetworkManager.te policy-1.25.3/domains/program/unused/NetworkManager.te
--- nsapolicy/domains/program/unused/NetworkManager.te 2005-07-06 17:15:06.000000000 -0400
+++ policy-1.25.3/domains/program/unused/NetworkManager.te 2005-07-19 15:41:44.000000000 -0400
@@ -249,7 +282,7 @@
domain_auto_trans(sysadm_t, ping_exec_t, ping_t)
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/postgresql.te policy-1.25.3/domains/program/unused/postgresql.te
--- nsapolicy/domains/program/unused/postgresql.te 2005-07-06 17:15:07.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/postgresql.te 2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/postgresql.te 2005-07-20 14:30:01.000000000 -0400
@@ -67,6 +67,7 @@
can_tcp_connect(userdomain, postgresql_t)
allow userdomain postgresql_t:unix_stream_socket connectto;
@@ -258,9 +291,20 @@
}
')
ifdef(`consoletype.te', `
+@@ -109,8 +110,8 @@
+ allow postgresql_t self:sem create_sem_perms;
+
+ allow postgresql_t initrc_var_run_t:file { getattr read lock };
+-dontaudit postgresql_t selinux_config_t:dir { search };
+-allow postgresql_t mail_spool_t:dir { search };
++dontaudit postgresql_t selinux_config_t:dir search;
++allow postgresql_t mail_spool_t:dir search;
+ lock_domain(postgresql)
+ can_exec(postgresql_t, { shell_exec_t bin_t postgresql_exec_t ls_exec_t } )
+ ifdef(`apache.te', `
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/pppd.te policy-1.25.3/domains/program/unused/pppd.te
--- nsapolicy/domains/program/unused/pppd.te 2005-07-19 10:57:05.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/pppd.te 2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/pppd.te 2005-07-20 08:18:29.000000000 -0400
@@ -32,9 +32,12 @@
log_domain(pppd)
@@ -318,9 +362,20 @@
typealias rlogind_port_t alias rlogin_port_t;
read_sysctl(rlogind_t);
+allow rlogind_t krb5_keytab_t:file { getattr read };
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/samba.te policy-1.25.3/domains/program/unused/samba.te
+--- nsapolicy/domains/program/unused/samba.te 2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/domains/program/unused/samba.te 2005-07-20 08:42:37.000000000 -0400
+@@ -79,6 +79,7 @@
+
+ # Access Samba shares.
+ create_dir_file(smbd_t, samba_share_t)
++r_dir_file(smbd_t, ftpd_anon_t)
+
+ ifdef(`logrotate.te', `
+ # the application should be changed
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/slocate.te policy-1.25.3/domains/program/unused/slocate.te
--- nsapolicy/domains/program/unused/slocate.te 2005-04-27 10:28:53.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/slocate.te 2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/slocate.te 2005-07-21 09:07:15.000000000 -0400
@@ -10,7 +10,8 @@
# locate_exec_t is the type of the locate executable.
#
@@ -331,9 +386,17 @@
allow locate_t fs_t:filesystem getattr;
ifdef(`crond.te', `
+@@ -23,6 +24,7 @@
+ allow locate_t { userpty_type admin_tty_type }:chr_file rw_file_perms;
+
+ allow locate_t { fs_type file_type }:dir r_dir_perms;
++dontaudit locate_t sysctl_t:dir getattr;
+ allow locate_t file_type:lnk_file r_file_perms;
+ allow locate_t { file_type -shadow_t }:{ lnk_file sock_file fifo_file file } getattr;
+ dontaudit locate_t { file_type -shadow_t }:{ lnk_file sock_file fifo_file file } read;
diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/unused/squid.te policy-1.25.3/domains/program/unused/squid.te
--- nsapolicy/domains/program/unused/squid.te 2005-07-12 08:50:43.000000000 -0400
-+++ policy-1.25.3/domains/program/unused/squid.te 2005-07-19 15:41:44.000000000 -0400
++++ policy-1.25.3/domains/program/unused/squid.te 2005-07-20 14:27:01.000000000 -0400
@@ -80,4 +80,5 @@
r_dir_file(squid_t, cert_t)
ifdef(`winbind.te', `
@@ -430,6 +493,14 @@
access_terminal(winbind_helper_t, sysadm)
read_locale(winbind_helper_t)
r_dir_file(winbind_helper_t, samba_etc_t)
+diff --exclude-from=exclude -N -u -r nsapolicy/domains/program/useradd.te policy-1.25.3/domains/program/useradd.te
+--- nsapolicy/domains/program/useradd.te 2005-04-27 10:28:49.000000000 -0400
++++ policy-1.25.3/domains/program/useradd.te 2005-07-21 09:07:34.000000000 -0400
+@@ -102,3 +102,4 @@
+ allow useradd_t default_context_t:dir search;
+ allow useradd_t file_context_t:dir search;
+ allow useradd_t file_context_t:file { getattr read };
++allow useradd_t var_lib_t:dir search;
diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/distros.fc policy-1.25.3/file_contexts/distros.fc
--- nsapolicy/file_contexts/distros.fc 2005-07-06 17:15:07.000000000 -0400
+++ policy-1.25.3/file_contexts/distros.fc 2005-07-19 15:41:44.000000000 -0400
@@ -455,6 +526,17 @@
# Fedora Extras packages: ladspa, imlib2, ocaml
/usr/lib/ladspa/analogue_osc_1416\.so -- system_u:object_r:texrel_shlib_t
+diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/program/postgresql.fc policy-1.25.3/file_contexts/program/postgresql.fc
+--- nsapolicy/file_contexts/program/postgresql.fc 2005-03-11 15:31:06.000000000 -0500
++++ policy-1.25.3/file_contexts/program/postgresql.fc 2005-07-20 13:51:00.000000000 -0400
+@@ -14,3 +14,7 @@
+ /usr/lib/pgsql/test/regress/.*\.so -- system_u:object_r:shlib_t
+ /usr/lib/pgsql/test/regress/.*\.sh -- system_u:object_r:bin_t
+ /usr/lib/pgsql/test/regress/pg_regress -- system_u:object_r:postgresql_exec_t
++ifdef(`distro_redhat', `
++/usr/share/jonas/pgsql(/.*)? system_u:object_r:postgresql_db_t
++/var/log/rhdb/rhdb(/.*)? system_u:object_r:postgresql_log_t
++')
diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/program/pppd.fc policy-1.25.3/file_contexts/program/pppd.fc
--- nsapolicy/file_contexts/program/pppd.fc 2005-06-01 06:11:22.000000000 -0400
+++ policy-1.25.3/file_contexts/program/pppd.fc 2005-07-19 15:41:44.000000000 -0400
@@ -473,6 +555,20 @@
/usr/sbin/vpnc -- system_u:object_r:vpnc_exec_t
/sbin/vpnc -- system_u:object_r:vpnc_exec_t
+/etc/vpnc/vpnc-script -- system_u:object_r:bin_t
+diff --exclude-from=exclude -N -u -r nsapolicy/file_contexts/types.fc policy-1.25.3/file_contexts/types.fc
+--- nsapolicy/file_contexts/types.fc 2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/file_contexts/types.fc 2005-07-21 08:57:17.000000000 -0400
+@@ -503,8 +503,8 @@
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird -- system_u:object_r:bin_t
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird-bin -- system_u:object_r:bin_t
+ /usr/lib(64)?/[^/]*thunderbird[^/]*/open-browser\.sh -- system_u:object_r:bin_t
+-/usr/lib(64)?/[^/]*thunderbird[^/]*/run-mozilla\.sh -- system_u:object_r:bin_t
+-/usr/lib(64)?/[^/]*thunderbird[^/]*/mozilla-xremote-client -- system_u:object_r:bin_t
++/usr/lib(64)?/[^/]*/run-mozilla\.sh -- system_u:object_r:bin_t
++/usr/lib(64)?/[^/]*/mozilla-xremote-client -- system_u:object_r:bin_t
+
+ #
+ # /srv
diff --exclude-from=exclude -N -u -r nsapolicy/genfs_contexts policy-1.25.3/genfs_contexts
--- nsapolicy/genfs_contexts 2005-05-07 00:41:08.000000000 -0400
+++ policy-1.25.3/genfs_contexts 2005-07-19 15:41:44.000000000 -0400
@@ -566,10 +662,50 @@
+allow $1 removable_t:filesystem getattr;
+
+')
+diff --exclude-from=exclude -N -u -r nsapolicy/macros/program/apache_macros.te policy-1.25.3/macros/program/apache_macros.te
+--- nsapolicy/macros/program/apache_macros.te 2005-07-12 08:50:43.000000000 -0400
++++ policy-1.25.3/macros/program/apache_macros.te 2005-07-20 08:40:15.000000000 -0400
+@@ -102,6 +102,7 @@
+ r_dir_file(httpd_$1_script_t, httpd_$1_script_ro_t)
+ create_dir_file(httpd_$1_script_t, httpd_$1_script_rw_t)
+ ra_dir_file(httpd_$1_script_t, httpd_$1_script_ra_t)
++r_dir_file(httpd_$1_script_t, ftpd_anon_t)
+
+ if (httpd_enable_cgi && httpd_unified ifdef(`targeted_policy', ` && ! httpd_disable_trans')) {
+ create_dir_file(httpd_$1_script_t, httpdcontent)
+@@ -137,8 +138,9 @@
+ r_dir_file(httpd_t, httpd_$1_script_ro_t)
+ create_dir_file(httpd_t, httpd_$1_script_rw_t)
+ ra_dir_file(httpd_t, httpd_$1_script_ra_t)
+-}
+ r_dir_file(httpd_t, httpd_$1_content_t)
++r_dir_file(httpd_t, ftpd_anon_t)
++}
+
+ ')
+ define(`apache_user_domain', `
diff --exclude-from=exclude -N -u -r nsapolicy/macros/program/cdrecord_macros.te policy-1.25.3/macros/program/cdrecord_macros.te
--- nsapolicy/macros/program/cdrecord_macros.te 2005-05-02 14:06:57.000000000 -0400
-+++ policy-1.25.3/macros/program/cdrecord_macros.te 2005-07-19 15:43:50.000000000 -0400
-@@ -47,8 +47,11 @@
++++ policy-1.25.3/macros/program/cdrecord_macros.te 2005-07-20 15:36:45.000000000 -0400
+@@ -27,16 +27,8 @@
+
+ can_resmgrd_connect($1_cdrecord_t)
+
+-allow $1_cdrecord_t { tmp_t home_root_t }:dir search;
++read_content($1_cdrecord_t, $1, cdrecord)
+
+-# allow cdrecord to read user files
+-r_dir_file($1_cdrecord_t, { $1_home_t $1_tmp_t })
+-if (use_nfs_home_dirs) {
+-r_dir_file($1_cdrecord_t, nfs_t)
+-}
+-if (use_samba_home_dirs) {
+-r_dir_file($1_cdrecord_t, cifs_t)
+-}
+ allow $1_cdrecord_t etc_t:file { getattr read };
+
+ # allow searching for cdrom-drive
+@@ -47,8 +39,11 @@
allow $1_cdrecord_t removable_device_t:blk_file { getattr read write ioctl };
allow $1_cdrecord_t scsi_generic_device_t:chr_file { getattr read write ioctl };
Index: selinux-policy-strict.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy-strict/devel/selinux-policy-strict.spec,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -r1.356 -r1.357
--- selinux-policy-strict.spec 20 Jul 2005 03:42:16 -0000 1.356
+++ selinux-policy-strict.spec 21 Jul 2005 17:15:59 -0000 1.357
@@ -11,7 +11,7 @@
Summary: SELinux %{type} policy configuration
Name: selinux-policy-%{type}
Version: 1.25.3
-Release: 2
+Release: 3
License: GPL
Group: System Environment/Base
Source: http://www.nsa.gov/selinux/archives/policy-%{version}.tgz
@@ -93,12 +93,12 @@
%config %{_sysconfdir}/selinux/%{type}/booleans
%ghost %config(noreplace) %{_sysconfdir}/selinux/%{type}/booleans.local
%{_sysconfdir}/selinux/%{type}/policy/policy.%{POLICYVER}
-%config %{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts
+%{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts
%{_sysconfdir}/selinux/%{type}/contexts/files/file_contexts.homedirs
%config %{_sysconfdir}/selinux/%{type}/contexts/files/homedir_template
%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/files/media
%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/dbus_contexts
-%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/default_contexts
+%config %{_sysconfdir}/selinux/%{type}/contexts/default_contexts
%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/default_type
%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/initrc_context
%config(noreplace) %{_sysconfdir}/selinux/%{type}/contexts/failsafe_context
@@ -236,6 +236,9 @@
exit 0
%changelog
+* Thu Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-3
+- Fix spec file for file_context.homedirs
+
* Tue Jul 19 2005 Dan Walsh <dwalsh at redhat.com> 1.25.3-2
- Update to latest from NSA
More information about the fedora-cvs-commits
mailing list