rpms/selinux-policy/FC-6 policy-20061106.patch, 1.18, 1.19 selinux-policy.spec, 1.343, 1.344

fedora-cvs-commits at redhat.com fedora-cvs-commits at redhat.com
Fri Feb 16 16:50:37 UTC 2007


Author: dwalsh

Update of /cvs/dist/rpms/selinux-policy/FC-6
In directory cvs.devel.redhat.com:/tmp/cvs-serv29125

Modified Files:
	policy-20061106.patch selinux-policy.spec 
Log Message:
* Thu Feb 15 2007 Dan Walsh <dwalsh at redhat.com> 2.4.6-39
- Add bugzilla policy
- Allow procmail to create tmp files so spamassisin will work
- Some fixes for pyzor


policy-20061106.patch:
 Rules.modular                                |   10 
 config/appconfig-strict-mcs/seusers          |    1 
 config/appconfig-strict-mls/default_contexts |    6 
 config/appconfig-strict-mls/seusers          |    1 
 config/appconfig-strict/seusers              |    1 
 man/man8/kerberos_selinux.8                  |    2 
 policy/flask/access_vectors                  |    2 
 policy/global_tunables                       |   66 +++
 policy/mls                                   |   31 +
 policy/modules/admin/acct.te                 |    1 
 policy/modules/admin/amanda.if               |   17 
 policy/modules/admin/amanda.te               |    6 
 policy/modules/admin/backup.te               |    5 
 policy/modules/admin/bootloader.fc           |    5 
 policy/modules/admin/bootloader.te           |   14 
 policy/modules/admin/consoletype.te          |   21 
 policy/modules/admin/ddcprobe.te             |   10 
 policy/modules/admin/dmesg.te                |    7 
 policy/modules/admin/dmidecode.te            |    5 
 policy/modules/admin/firstboot.if            |    6 
 policy/modules/admin/kudzu.te                |    8 
 policy/modules/admin/logrotate.te            |    5 
 policy/modules/admin/logwatch.te             |    6 
 policy/modules/admin/netutils.te             |   10 
 policy/modules/admin/portage.te              |    5 
 policy/modules/admin/prelink.te              |   18 
 policy/modules/admin/quota.fc                |    7 
 policy/modules/admin/quota.te                |   24 -
 policy/modules/admin/rpm.fc                  |    3 
 policy/modules/admin/rpm.if                  |   43 ++
 policy/modules/admin/rpm.te                  |   49 --
 policy/modules/admin/su.if                   |   28 -
 policy/modules/admin/su.te                   |    2 
 policy/modules/admin/sudo.if                 |   10 
 policy/modules/admin/tripwire.te             |   11 
 policy/modules/admin/usbmodules.te           |    5 
 policy/modules/admin/usermanage.te           |   36 +
 policy/modules/admin/vpn.te                  |    1 
 policy/modules/apps/ethereal.te              |    5 
 policy/modules/apps/evolution.if             |  107 ++++-
 policy/modules/apps/evolution.te             |    1 
 policy/modules/apps/games.fc                 |    1 
 policy/modules/apps/gnome.fc                 |    2 
 policy/modules/apps/gnome.if                 |  108 +++++
 policy/modules/apps/gnome.te                 |    5 
 policy/modules/apps/gpg.if                   |    1 
 policy/modules/apps/java.fc                  |    2 
 policy/modules/apps/java.if                  |   38 +
 policy/modules/apps/java.te                  |    2 
 policy/modules/apps/loadkeys.if              |   17 
 policy/modules/apps/mozilla.if               |  210 ++++++++-
 policy/modules/apps/mplayer.if               |   84 +++
 policy/modules/apps/mplayer.te               |    1 
 policy/modules/apps/slocate.te               |    3 
 policy/modules/apps/thunderbird.if           |   81 +++
 policy/modules/apps/userhelper.if            |   19 
 policy/modules/apps/webalizer.te             |    6 
 policy/modules/apps/wine.fc                  |    1 
 policy/modules/apps/yam.te                   |    5 
 policy/modules/kernel/corecommands.fc        |   13 
 policy/modules/kernel/corecommands.if        |   77 +++
 policy/modules/kernel/corenetwork.if.in      |   99 ++++
 policy/modules/kernel/corenetwork.te.in      |   17 
 policy/modules/kernel/corenetwork.te.m4      |    4 
 policy/modules/kernel/devices.fc             |    7 
 policy/modules/kernel/devices.if             |   18 
 policy/modules/kernel/devices.te             |    8 
 policy/modules/kernel/domain.if              |   58 ++
 policy/modules/kernel/domain.te              |   22 +
 policy/modules/kernel/files.fc               |    2 
 policy/modules/kernel/files.if               |  222 ++++++++++
 policy/modules/kernel/filesystem.if          |   43 +-
 policy/modules/kernel/filesystem.te          |   13 
 policy/modules/kernel/kernel.if              |   64 ++-
 policy/modules/kernel/kernel.te              |   12 
 policy/modules/kernel/mls.if                 |   28 +
 policy/modules/kernel/mls.te                 |    6 
 policy/modules/kernel/storage.fc             |    1 
 policy/modules/kernel/storage.if             |    2 
 policy/modules/kernel/terminal.fc            |    1 
 policy/modules/kernel/terminal.if            |    2 
 policy/modules/kernel/terminal.te            |    1 
 policy/modules/services/apache.fc            |   18 
 policy/modules/services/apache.if            |   19 
 policy/modules/services/apache.te            |   39 +
 policy/modules/services/apm.te               |    3 
 policy/modules/services/automount.fc         |    1 
 policy/modules/services/automount.te         |    9 
 policy/modules/services/avahi.if             |   21 
 policy/modules/services/bind.fc              |    1 
 policy/modules/services/bind.te              |    5 
 policy/modules/services/bluetooth.te         |    7 
 policy/modules/services/ccs.fc               |    1 
 policy/modules/services/ccs.te               |   11 
 policy/modules/services/clamav.te            |    2 
 policy/modules/services/cron.fc              |    6 
 policy/modules/services/cron.if              |   92 ++--
 policy/modules/services/cron.te              |   52 ++
 policy/modules/services/cups.te              |    7 
 policy/modules/services/cvs.te               |    1 
 policy/modules/services/dbus.fc              |    1 
 policy/modules/services/dbus.if              |   62 ++
 policy/modules/services/dcc.te               |    9 
 policy/modules/services/dhcp.te              |    2 
 policy/modules/services/ftp.te               |   14 
 policy/modules/services/hal.fc               |    4 
 policy/modules/services/hal.if               |   57 ++
 policy/modules/services/hal.te               |   13 
 policy/modules/services/inetd.te             |   28 +
 policy/modules/services/irqbalance.te        |    4 
 policy/modules/services/kerberos.if          |    3 
 policy/modules/services/kerberos.te          |   13 
 policy/modules/services/ktalk.fc             |    3 
 policy/modules/services/ktalk.te             |    5 
 policy/modules/services/lpd.if               |   56 +-
 policy/modules/services/lpd.te               |    5 
 policy/modules/services/mta.fc               |    1 
 policy/modules/services/mta.if               |    1 
 policy/modules/services/mta.te               |    2 
 policy/modules/services/munin.te             |    5 
 policy/modules/services/networkmanager.fc    |    2 
 policy/modules/services/networkmanager.te    |    2 
 policy/modules/services/nis.fc               |    3 
 policy/modules/services/nis.if               |    8 
 policy/modules/services/nis.te               |   30 +
 policy/modules/services/nscd.if              |   20 
 policy/modules/services/nscd.te              |   15 
 policy/modules/services/oav.te               |    5 
 policy/modules/services/oddjob.te            |    3 
 policy/modules/services/openca.if            |    4 
 policy/modules/services/openca.te            |    2 
 policy/modules/services/openvpn.te           |    4 
 policy/modules/services/pcscd.fc             |    9 
 policy/modules/services/pcscd.if             |   62 ++
 policy/modules/services/pcscd.te             |   78 +++
 policy/modules/services/pegasus.if           |   31 +
 policy/modules/services/pegasus.te           |    5 
 policy/modules/services/portmap.te           |    5 
 policy/modules/services/postfix.fc           |    1 
 policy/modules/services/postfix.if           |    2 
 policy/modules/services/postfix.te           |   17 
 policy/modules/services/procmail.te          |   28 +
 policy/modules/services/pyzor.if             |   18 
 policy/modules/services/pyzor.te             |   11 
 policy/modules/services/radvd.te             |    2 
 policy/modules/services/rhgb.if              |   76 +++
 policy/modules/services/rhgb.te              |    3 
 policy/modules/services/ricci.te             |   21 
 policy/modules/services/rlogin.te            |   10 
 policy/modules/services/rpc.fc               |    1 
 policy/modules/services/rpc.te               |   23 -
 policy/modules/services/rsync.te             |    1 
 policy/modules/services/samba.if             |    2 
 policy/modules/services/samba.te             |   17 
 policy/modules/services/sasl.te              |    2 
 policy/modules/services/sendmail.te          |    8 
 policy/modules/services/setroubleshoot.if    |   20 
 policy/modules/services/setroubleshoot.te    |    2 
 policy/modules/services/smartmon.te          |    1 
 policy/modules/services/snmp.if              |   17 
 policy/modules/services/snmp.te              |    4 
 policy/modules/services/spamassassin.fc      |    2 
 policy/modules/services/spamassassin.if      |   42 +
 policy/modules/services/spamassassin.te      |   18 
 policy/modules/services/squid.fc             |    1 
 policy/modules/services/squid.if             |    1 
 policy/modules/services/squid.te             |   11 
 policy/modules/services/ssh.if               |   83 +++
 policy/modules/services/ssh.te               |   10 
 policy/modules/services/telnet.te            |    1 
 policy/modules/services/tftp.te              |    2 
 policy/modules/services/uucp.fc              |    1 
 policy/modules/services/uucp.if              |   67 +++
 policy/modules/services/uucp.te              |   44 +-
 policy/modules/services/xserver.fc           |    2 
 policy/modules/services/xserver.if           |  190 ++++++++-
 policy/modules/services/xserver.te           |   12 
 policy/modules/system/authlogin.if           |   76 +++
 policy/modules/system/authlogin.te           |    6 
 policy/modules/system/clock.te               |   13 
 policy/modules/system/fstools.fc             |    1 
 policy/modules/system/fstools.te             |   11 
 policy/modules/system/getty.te               |   14 
 policy/modules/system/hostname.te            |   19 
 policy/modules/system/init.if                |   63 ++
 policy/modules/system/init.te                |   48 ++
 policy/modules/system/ipsec.fc               |    5 
 policy/modules/system/ipsec.if               |   99 ++++
 policy/modules/system/ipsec.te               |  107 +++++
 policy/modules/system/iptables.te            |   22 -
 policy/modules/system/libraries.fc           |   38 +
 policy/modules/system/libraries.te           |   11 
 policy/modules/system/locallogin.if          |   37 +
 policy/modules/system/locallogin.te          |    6 
 policy/modules/system/logging.te             |   19 
 policy/modules/system/lvm.fc                 |    1 
 policy/modules/system/lvm.if                 |   44 ++
 policy/modules/system/lvm.te                 |   78 +++
 policy/modules/system/miscfiles.fc           |    3 
 policy/modules/system/miscfiles.if           |   79 +++
 policy/modules/system/modutils.te            |   25 -
 policy/modules/system/mount.te               |   27 -
 policy/modules/system/pcmcia.te              |    5 
 policy/modules/system/raid.te                |   13 
 policy/modules/system/selinuxutil.fc         |    2 
 policy/modules/system/selinuxutil.if         |  119 +++++
 policy/modules/system/selinuxutil.te         |  118 ++---
 policy/modules/system/sysnetwork.te          |   10 
 policy/modules/system/tzdata.fc              |    3 
 policy/modules/system/tzdata.if              |   23 +
 policy/modules/system/tzdata.te              |   51 ++
 policy/modules/system/unconfined.fc          |    4 
 policy/modules/system/unconfined.if          |   19 
 policy/modules/system/unconfined.te          |   23 +
 policy/modules/system/userdomain.if          |  569 ++++++++++++++++++++++++---
 policy/modules/system/userdomain.te          |   63 +-
 policy/modules/system/xen.fc                 |    1 
 policy/modules/system/xen.te                 |   37 +
 218 files changed, 4865 insertions(+), 599 deletions(-)

Index: policy-20061106.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/FC-6/policy-20061106.patch,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -r1.18 -r1.19
--- policy-20061106.patch	15 Feb 2007 17:05:23 -0000	1.18
+++ policy-20061106.patch	16 Feb 2007 16:50:35 -0000	1.19
@@ -3682,7 +3682,7 @@
  
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/apache.fc serefpolicy-2.4.6/policy/modules/services/apache.fc
 --- nsaserefpolicy/policy/modules/services/apache.fc	2006-11-29 12:04:49.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/services/apache.fc	2007-01-26 13:41:55.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/apache.fc	2007-02-15 14:35:30.000000000 -0500
 @@ -21,7 +21,6 @@
  
  /usr/lib/apache-ssl/.+		--	gen_context(system_u:object_r:httpd_exec_t,s0)
@@ -3699,7 +3699,7 @@
  /var/cache/php-eaccelerator(/.*)?	gen_context(system_u:object_r:httpd_cache_t,s0)
  /var/cache/php-mmcache(/.*)?		gen_context(system_u:object_r:httpd_cache_t,s0)
  /var/cache/rt3(/.*)?			gen_context(system_u:object_r:httpd_cache_t,s0)
-@@ -80,3 +80,12 @@
+@@ -80,3 +80,19 @@
  /var/www/cgi-bin(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
  /var/www/icons(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /var/www/perl(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
@@ -3712,9 +3712,42 @@
 +/opt/fortitude/modules.local(/.*)?	gen_context(system_u:object_r:httpd_modules_t,s0)
 +/opt/fortitude/logs(/.*)?		gen_context(system_u:object_r:httpd_log_t,s0)
 +/opt/fortitude/run(/.*)?		gen_context(system_u:object_r:httpd_var_run_t,s0)
++/usr/share/bugzilla(/.*)?		gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
++/var/lib/bugzilla(/.*)?			gen_context(system_u:object_r:httpd_var_lib_t,s0)
++
++#Bugzilla file context
++/usr/share/bugzilla(/.*)?	-d	gen_context(system_u:object_r:httpd_bugzilla_content_t,s0)
++/usr/share/bugzilla(/.*)?	--	gen_context(system_u:object_r:httpd_bugzilla_script_exec_t,s0)
++/var/lib/bugzilla(/.*)?			gen_context(system_u:object_r:httpd_bugzilla_script_rw_t,s0)
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/apache.if serefpolicy-2.4.6/policy/modules/services/apache.if
+--- nsaserefpolicy/policy/modules/services/apache.if	2006-11-29 12:04:51.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/apache.if	2007-02-15 14:35:54.000000000 -0500
+@@ -1031,3 +1031,22 @@
+ 
+ 	allow $1 httpd_sys_script_t:dir search;
+ ')
++
++########################################
++## <summary>
++##	Allow the specified domain to search 
++##	apache bugzilla directories.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`apache_search_bugzilla_dirs',`
++	gen_require(`
++		type httpd_bugzilla_content_t;
++	')
++
++	allow $1 httpd_bugzilla_content_t:dir search_dir_perms;
++')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/apache.te serefpolicy-2.4.6/policy/modules/services/apache.te
 --- nsaserefpolicy/policy/modules/services/apache.te	2006-11-29 12:04:51.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/services/apache.te	2007-02-09 15:33:24.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/apache.te	2007-02-15 15:45:00.000000000 -0500
 @@ -143,6 +143,8 @@
  allow httpd_t self:unix_stream_socket { create_stream_socket_perms connectto };
  allow httpd_t self:tcp_socket create_stream_socket_perms;
@@ -3796,7 +3829,7 @@
  
  kernel_read_kernel_sysctls(httpd_rotatelogs_t)
  kernel_dontaudit_list_proc(httpd_rotatelogs_t)
-@@ -714,9 +733,12 @@
+@@ -714,9 +733,27 @@
  libs_use_ld_so(httpd_rotatelogs_t)
  libs_use_shared_libs(httpd_rotatelogs_t)
  
@@ -3809,6 +3842,21 @@
  	term_dontaudit_use_unallocated_ttys(httpd_rotatelogs_t)
  ')
 +
++#============= bugzilla policy ==============
++apache_content_template(bugzilla)
++allow httpd_bugzilla_script_t self:netlink_route_socket r_netlink_socket_perms;
++
++files_search_var_lib(httpd_bugzilla_script_t)
++
++optional_policy(`
++	mysql_search_db(httpd_bugzilla_script_t)
++	mysql_stream_connect(httpd_bugzilla_script_t)
++')
++
++optional_policy(`
++	postgresql_stream_connect(httpd_bugzilla_script_t)
++')
++
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/apm.te serefpolicy-2.4.6/policy/modules/services/apm.te
 --- nsaserefpolicy/policy/modules/services/apm.te	2006-11-29 12:04:51.000000000 -0500
 +++ serefpolicy-2.4.6/policy/modules/services/apm.te	2007-01-16 11:11:26.000000000 -0500
@@ -5085,6 +5133,15 @@
 +	ssh_sigchld(munin_t)
 +	ssh_rw_stream_sockets(munin_t)
 +')
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.fc serefpolicy-2.4.6/policy/modules/services/networkmanager.fc
+--- nsaserefpolicy/policy/modules/services/networkmanager.fc	2006-11-29 12:04:51.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/networkmanager.fc	2007-02-16 09:48:50.000000000 -0500
+@@ -3,4 +3,4 @@
+ /var/run/NetworkManager\.pid	--	gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
+ /var/run/NetworkManager(/.*)?		gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
+ /var/run/wpa_supplicant(/.*)?		gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
+-/var/run/wpa_supplicant-global	--	gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
++/var/run/wpa_supplicant-global		gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-2.4.6/policy/modules/services/networkmanager.te
 --- nsaserefpolicy/policy/modules/services/networkmanager.te	2006-11-29 12:04:49.000000000 -0500
 +++ serefpolicy-2.4.6/policy/modules/services/networkmanager.te	2007-01-16 11:11:26.000000000 -0500
@@ -5667,16 +5724,20 @@
  	postgrey_stream_connect(postfix_smtpd_t)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/procmail.te serefpolicy-2.4.6/policy/modules/services/procmail.te
 --- nsaserefpolicy/policy/modules/services/procmail.te	2006-11-29 12:04:49.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/services/procmail.te	2007-02-15 12:02:18.000000000 -0500
-@@ -10,6 +10,7 @@
++++ serefpolicy-2.4.6/policy/modules/services/procmail.te	2007-02-16 11:46:38.000000000 -0500
+@@ -10,15 +10,19 @@
  type procmail_exec_t;
  domain_type(procmail_t)
  domain_entry_file(procmail_t,procmail_exec_t)
 +userdom_executable_file(procmail_exec_t)
  role system_r types procmail_t;
  
++type procmail_tmp_t;
++files_tmp_file(procmail_tmp_t)
++
  ########################################
-@@ -18,7 +19,7 @@
+ #
+ # Local policy
  #
  
  allow procmail_t self:capability { sys_nice chown setuid setgid dac_override };
@@ -5685,15 +5746,18 @@
  allow procmail_t self:fifo_file rw_file_perms;
  allow procmail_t self:unix_stream_socket create_socket_perms;
  allow procmail_t self:unix_dgram_socket create_socket_perms;
-@@ -50,6 +51,7 @@
+@@ -50,6 +54,10 @@
  corecmd_exec_bin(procmail_t)
  corecmd_exec_shell(procmail_t)
  corecmd_dontaudit_search_sbin(procmail_t)
 +corecmd_exec_ls(procmail_t)
++
++allow procmail_t procmail_tmp_t:file create_file_perms;
++files_tmp_filetrans(procmail_t, procmail_tmp_t, file)
  
  files_read_etc_files(procmail_t)
  files_read_etc_runtime_files(procmail_t)
-@@ -64,6 +66,21 @@
+@@ -64,6 +72,21 @@
  
  # only works until we define a different type for maildir
  userdom_priveleged_home_dir_manager(procmail_t)
@@ -5715,16 +5779,66 @@
  # Do not audit attempts to access /root.
  userdom_dontaudit_search_sysadm_home_dirs(procmail_t)
  userdom_dontaudit_search_staff_home_dirs(procmail_t)
-@@ -107,4 +124,5 @@
+@@ -103,8 +126,7 @@
+ optional_policy(`
+ 	corenet_udp_bind_generic_port(procmail_t)
  
+-	files_getattr_tmp_dirs(procmail_t)
+-
  	spamassassin_exec(procmail_t)
  	spamassassin_exec_client(procmail_t)
 +	spamassassin_read_lib_files(procmail_t)
  ')
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pyzor.if serefpolicy-2.4.6/policy/modules/services/pyzor.if
+--- nsaserefpolicy/policy/modules/services/pyzor.if	2006-11-29 12:04:49.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/pyzor.if	2007-02-16 09:01:27.000000000 -0500
+@@ -78,3 +78,21 @@
+ 	userdom_search_user_home_dirs($1,pyzord_t)
+ 	userdom_user_home_dir_filetrans($1,pyzord_t,$1_pyzor_home_t,{ dir file lnk_file })
+ ')
++
++########################################
++## <summary>
++##	Send generic signals to pyzor
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`pyzor_signal',`
++	gen_require(`
++		type pyzor_t;
++	')
++
++	allow pyzor_t $1:process signal;
++')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pyzor.te serefpolicy-2.4.6/policy/modules/services/pyzor.te
 --- nsaserefpolicy/policy/modules/services/pyzor.te	2006-11-29 12:04:51.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/services/pyzor.te	2007-01-17 14:30:29.000000000 -0500
-@@ -65,6 +65,10 @@
++++ serefpolicy-2.4.6/policy/modules/services/pyzor.te	2007-02-16 09:22:44.000000000 -0500
+@@ -26,6 +26,9 @@
+ type pyzor_var_lib_t;
+ files_type(pyzor_var_lib_t)
+ 
++type pyzor_tmp_t;
++files_tmp_file(pyzor_tmp_t)
++
+ ########################################
+ #
+ # Pyzor local policy
+@@ -37,6 +40,10 @@
+ allow pyzor_t pyzor_var_lib_t:file r_file_perms;
+ files_search_var_lib(pyzor_t)
+ 
++allow pyzor_t pyzor_tmp_t:dir create_dir_perms;
++allow pyzor_t pyzor_tmp_t:file create_file_perms;
++files_tmp_filetrans(pyzor_t, pyzor_tmp_t, { file dir })
++
+ kernel_read_kernel_sysctls(pyzor_t)  
+ kernel_read_system_state(pyzor_t)
+ 
+@@ -65,6 +72,10 @@
  	amavis_manage_spool_files(pyzor_t)
  ')
  
@@ -6308,7 +6422,7 @@
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.te serefpolicy-2.4.6/policy/modules/services/spamassassin.te
 --- nsaserefpolicy/policy/modules/services/spamassassin.te	2006-11-29 12:04:49.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/services/spamassassin.te	2007-02-05 15:39:09.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/services/spamassassin.te	2007-02-16 11:32:05.000000000 -0500
 @@ -8,7 +8,7 @@
  
  # spamassassin client executable
@@ -6382,6 +6496,14 @@
  		userdom_manage_generic_user_home_content_dirs(spamd_t)
  		userdom_manage_generic_user_home_content_files(spamd_t)
  		userdom_manage_generic_user_home_content_symlinks(spamd_t)
+@@ -183,6 +194,7 @@
+ 
+ optional_policy(`
+ 	pyzor_domtrans(spamd_t)
++	pyzor_signal(spamd_t)
+ ')
+ 
+ optional_policy(`
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/squid.fc serefpolicy-2.4.6/policy/modules/services/squid.fc
 --- nsaserefpolicy/policy/modules/services/squid.fc	2006-11-29 12:04:49.000000000 -0500
 +++ serefpolicy-2.4.6/policy/modules/services/squid.fc	2007-01-25 14:48:47.000000000 -0500


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/FC-6/selinux-policy.spec,v
retrieving revision 1.343
retrieving revision 1.344
diff -u -r1.343 -r1.344
--- selinux-policy.spec	15 Feb 2007 17:05:23 -0000	1.343
+++ selinux-policy.spec	16 Feb 2007 16:50:35 -0000	1.344
@@ -17,7 +17,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 2.4.6
-Release: 38%{?dist}
+Release: 39%{?dist}
 License: GPL
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -353,6 +353,11 @@
 %endif
 
 %changelog
+* Thu Feb 15 2007 Dan Walsh <dwalsh at redhat.com> 2.4.6-39
+- Add bugzilla policy
+- Allow procmail to create tmp files so spamassisin will work
+- Some fixes for pyzor
+
 * Wed Feb 14 2007 Dan Walsh <dwalsh at redhat.com> 2.4.6-38
 - Removing dangling inlcud symlink if devel not installed
 Resolves: #220085




More information about the fedora-cvs-commits mailing list