rpms/selinux-policy/devel policy-20061106.patch, 1.9, 1.10 selinux-policy.spec, 1.338, 1.339
fedora-cvs-commits at redhat.com
fedora-cvs-commits at redhat.com
Fri Nov 10 13:31:36 UTC 2006
- Previous message (by thread): rpms/openoffice.org/FC-6 openoffice.org-2.0.3.rh127576.gtkunixprintdialog.patch, 1.13, 1.14 openoffice.org-2.1.0.ooo71379.psprint.endfeatureonnewline.patch, 1.1, 1.2 openoffice.org.spec, 1.904, 1.905
- Next message (by thread): rpms/system-config-nfs/devel .cvsignore, 1.27, 1.28 sources, 1.30, 1.31 system-config-nfs.spec, 1.34, 1.35
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/dist/rpms/selinux-policy/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv24281
Modified Files:
policy-20061106.patch selinux-policy.spec
Log Message:
* Fri Nov 10 2006 Dan Walsh <dwalsh at redhat.com> 2.4.3-9
- Allow cups to search samba_etc_t directory
- Allow xend_t to list auto_mountpoints
policy-20061106.patch:
Rules.modular | 10
policy/flask/access_vectors | 3
policy/global_tunables | 36 ++
policy/mls | 3
policy/modules/admin/acct.te | 1
policy/modules/admin/amanda.te | 1
policy/modules/admin/consoletype.te | 8
policy/modules/admin/dmesg.te | 1
policy/modules/admin/logwatch.te | 1
policy/modules/admin/netutils.te | 2
policy/modules/admin/prelink.te | 5
policy/modules/admin/rpm.fc | 3
policy/modules/admin/rpm.if | 24 +
policy/modules/admin/rpm.te | 33 --
policy/modules/apps/java.fc | 2
policy/modules/kernel/corecommands.if | 17 +
policy/modules/kernel/corenetwork.if.in | 12
policy/modules/kernel/corenetwork.te.in | 17 -
policy/modules/kernel/corenetwork.te.m4 | 4
policy/modules/kernel/devices.fc | 3
policy/modules/kernel/devices.te | 6
policy/modules/kernel/domain.te | 7
policy/modules/kernel/files.if | 66 ++++
policy/modules/kernel/files.te | 2
policy/modules/kernel/filesystem.te | 6
policy/modules/kernel/terminal.fc | 1
policy/modules/kernel/terminal.te | 1
policy/modules/services/aide.fc | 3
policy/modules/services/aide.if | 56 +++
policy/modules/services/aide.te | 52 +++
policy/modules/services/apache.fc | 10
policy/modules/services/apache.te | 10
policy/modules/services/automount.te | 1
policy/modules/services/bind.te | 1
policy/modules/services/ccs.fc | 10
policy/modules/services/ccs.if | 83 +++++
policy/modules/services/ccs.te | 89 +++++
policy/modules/services/cron.if | 26 -
policy/modules/services/cron.te | 5
policy/modules/services/cups.fc | 2
policy/modules/services/cups.te | 4
policy/modules/services/cvs.te | 1
policy/modules/services/dbus.fc | 1
policy/modules/services/dbus.if | 1
policy/modules/services/hal.fc | 4
policy/modules/services/hal.te | 8
policy/modules/services/kerberos.te | 1
policy/modules/services/lpd.if | 52 +--
policy/modules/services/mta.te | 1
policy/modules/services/nscd.if | 20 +
policy/modules/services/nscd.te | 3
policy/modules/services/oddjob.te | 3
policy/modules/services/pegasus.if | 31 ++
policy/modules/services/pegasus.te | 5
policy/modules/services/procmail.te | 16 +
policy/modules/services/ricci.fc | 20 +
policy/modules/services/ricci.if | 184 ++++++++++++
policy/modules/services/ricci.te | 479 ++++++++++++++++++++++++++++++++
policy/modules/services/rsync.te | 1
policy/modules/services/samba.if | 2
policy/modules/services/samba.te | 6
policy/modules/services/sasl.te | 2
policy/modules/services/snmp.te | 1
policy/modules/services/spamassassin.te | 4
policy/modules/services/squid.te | 7
policy/modules/services/ssh.te | 2
policy/modules/services/telnet.te | 1
policy/modules/services/xserver.if | 40 ++
policy/modules/system/authlogin.if | 2
policy/modules/system/authlogin.te | 1
policy/modules/system/fstools.fc | 1
policy/modules/system/fstools.te | 2
policy/modules/system/getty.te | 3
policy/modules/system/hostname.te | 6
policy/modules/system/init.fc | 3
policy/modules/system/init.te | 14
policy/modules/system/iscsi.if | 2
policy/modules/system/libraries.fc | 12
policy/modules/system/libraries.te | 6
policy/modules/system/locallogin.if | 37 ++
policy/modules/system/logging.te | 1
policy/modules/system/modutils.te | 4
policy/modules/system/mount.te | 19 -
policy/modules/system/raid.te | 7
policy/modules/system/selinuxutil.if | 4
policy/modules/system/selinuxutil.te | 13
policy/modules/system/unconfined.if | 19 +
policy/modules/system/unconfined.te | 11
policy/modules/system/userdomain.if | 201 +++++++++++++
policy/modules/system/userdomain.te | 10
policy/modules/system/xen.fc | 1
policy/modules/system/xen.te | 28 +
92 files changed, 1787 insertions(+), 143 deletions(-)
Index: policy-20061106.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/policy-20061106.patch,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -r1.9 -r1.10
--- policy-20061106.patch 9 Nov 2006 20:12:53 -0000 1.9
+++ policy-20061106.patch 10 Nov 2006 13:31:34 -0000 1.10
@@ -1437,7 +1437,7 @@
optional_policy(`
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/oddjob.te serefpolicy-2.4.3/policy/modules/services/oddjob.te
--- nsaserefpolicy/policy/modules/services/oddjob.te 2006-11-06 11:13:19.000000000 -0500
-+++ serefpolicy-2.4.3/policy/modules/services/oddjob.te 2006-11-09 14:03:18.000000000 -0500
++++ serefpolicy-2.4.3/policy/modules/services/oddjob.te 2006-11-09 20:51:53.000000000 -0500
@@ -10,6 +10,7 @@
type oddjob_exec_t;
domain_type(oddjob_t)
@@ -1446,6 +1446,15 @@
type oddjob_mkhomedir_t;
type oddjob_mkhomedir_exec_t;
+@@ -27,7 +28,7 @@
+ #
+
+ allow oddjob_t self:capability { audit_write setgid } ;
+-allow oddjob_t self:process setexec;
++allow oddjob_t self:process { setexec signal };
+ allow oddjob_t self:fifo_file { read write };
+ allow oddjob_t self:unix_stream_socket create_stream_socket_perms;
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pegasus.if serefpolicy-2.4.3/policy/modules/services/pegasus.if
--- nsaserefpolicy/policy/modules/services/pegasus.if 2006-07-14 17:04:41.000000000 -0400
+++ serefpolicy-2.4.3/policy/modules/services/pegasus.if 2006-11-09 14:03:18.000000000 -0500
@@ -1748,7 +1757,7 @@
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ricci.te serefpolicy-2.4.3/policy/modules/services/ricci.te
--- nsaserefpolicy/policy/modules/services/ricci.te 1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-2.4.3/policy/modules/services/ricci.te 2006-11-09 14:03:18.000000000 -0500
++++ serefpolicy-2.4.3/policy/modules/services/ricci.te 2006-11-09 20:52:15.000000000 -0500
@@ -0,0 +1,479 @@
+policy_module(ricci,1.0.0)
+
@@ -2129,7 +2138,7 @@
+')
+domain_auto_trans(ricci_t,ricci_modstorage_exec_t,ricci_modstorage_t)
+
-+allow ricci_modstorage_t self:process setsched;
++allow ricci_modstorage_t self:process { setsched signal };
+allow ricci_modstorage_t self:capability { mknod sys_nice };
+allow ricci_modstorage_t self:fifo_file rw_file_perms;
+allow ricci_modstorage_t self:unix_dgram_socket create_socket_perms;
@@ -2240,6 +2249,25 @@
role system_r types rsync_t;
type rsync_data_t;
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/samba.if serefpolicy-2.4.3/policy/modules/services/samba.if
+--- nsaserefpolicy/policy/modules/services/samba.if 2006-09-15 13:14:24.000000000 -0400
++++ serefpolicy-2.4.3/policy/modules/services/samba.if 2006-11-10 08:19:15.000000000 -0500
+@@ -140,6 +140,7 @@
+ ')
+
+ files_search_etc($1)
++ allow $1 samba_etc_t:dir search_dir_perms;
+ allow $1 samba_etc_t:file { read getattr lock };
+ ')
+
+@@ -161,6 +162,7 @@
+ ')
+
+ files_search_etc($1)
++ allow $1 samba_etc_t:dir search_dir_perms;
+ allow $1 samba_etc_t:file rw_file_perms;
+ ')
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/samba.te serefpolicy-2.4.3/policy/modules/services/samba.te
--- nsaserefpolicy/policy/modules/services/samba.te 2006-11-06 11:13:19.000000000 -0500
+++ serefpolicy-2.4.3/policy/modules/services/samba.te 2006-11-09 14:03:18.000000000 -0500
@@ -3209,7 +3237,7 @@
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.te serefpolicy-2.4.3/policy/modules/system/xen.te
--- nsaserefpolicy/policy/modules/system/xen.te 2006-11-06 11:13:21.000000000 -0500
-+++ serefpolicy-2.4.3/policy/modules/system/xen.te 2006-11-09 14:45:54.000000000 -0500
++++ serefpolicy-2.4.3/policy/modules/system/xen.te 2006-11-10 08:07:56.000000000 -0500
@@ -86,8 +86,8 @@
allow xend_t self:tcp_socket create_stream_socket_perms;
allow xend_t self:packet_socket create_socket_perms;
@@ -3272,7 +3300,7 @@
xen_stream_connect_xenstore(xm_t)
+
+#Should have a boolean wrapping these
-+fs_search_auto_mountpoints(xend_t)
++fs_list_auto_mountpoints(xend_t)
+files_search_mnt(xend_t)
+fs_write_nfs_files(xend_t)
+fs_read_nfs_files(xend_t)
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/selinux-policy.spec,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -r1.338 -r1.339
--- selinux-policy.spec 9 Nov 2006 20:12:53 -0000 1.338
+++ selinux-policy.spec 10 Nov 2006 13:31:34 -0000 1.339
@@ -17,7 +17,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 2.4.3
-Release: 8
+Release: 9
License: GPL
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -351,6 +351,10 @@
%endif
%changelog
+* Fri Nov 10 2006 Dan Walsh <dwalsh at redhat.com> 2.4.3-9
+- Allow cups to search samba_etc_t directory
+- Allow xend_t to list auto_mountpoints
+
* Thu Nov 9 2006 Dan Walsh <dwalsh at redhat.com> 2.4.3-8
- Allow xen to search automount
- Previous message (by thread): rpms/openoffice.org/FC-6 openoffice.org-2.0.3.rh127576.gtkunixprintdialog.patch, 1.13, 1.14 openoffice.org-2.1.0.ooo71379.psprint.endfeatureonnewline.patch, 1.1, 1.2 openoffice.org.spec, 1.904, 1.905
- Next message (by thread): rpms/system-config-nfs/devel .cvsignore, 1.27, 1.28 sources, 1.30, 1.31 system-config-nfs.spec, 1.34, 1.35
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-cvs-commits
mailing list