rpms/selinux-policy/devel policy-20061106.patch,1.37,1.38

fedora-cvs-commits at redhat.com fedora-cvs-commits at redhat.com
Wed Dec 13 22:29:26 UTC 2006


Author: dwalsh

Update of /cvs/dist/rpms/selinux-policy/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv26062

Modified Files:
	policy-20061106.patch 
Log Message:
* Thu Dec 12 2006 Dan Walsh <dwalsh at redhat.com> 2.4.6-11
Resolves: #218978


policy-20061106.patch:
 Rules.modular                           |   10 
 policy/flask/access_vectors             |    2 
 policy/global_tunables                  |   40 ++
 policy/mls                              |   31 +
 policy/modules/admin/acct.te            |    1 
 policy/modules/admin/amanda.if          |   17 +
 policy/modules/admin/amanda.te          |    1 
 policy/modules/admin/bootloader.fc      |    5 
 policy/modules/admin/bootloader.te      |    7 
 policy/modules/admin/consoletype.te     |   10 
 policy/modules/admin/dmesg.te           |    1 
 policy/modules/admin/firstboot.if       |    6 
 policy/modules/admin/logwatch.te        |    1 
 policy/modules/admin/netutils.te        |    2 
 policy/modules/admin/prelink.te         |    9 
 policy/modules/admin/quota.fc           |    7 
 policy/modules/admin/quota.te           |   20 -
 policy/modules/admin/rpm.fc             |    3 
 policy/modules/admin/rpm.if             |   24 +
 policy/modules/admin/rpm.te             |   46 +-
 policy/modules/admin/su.if              |   11 
 policy/modules/admin/sudo.if            |    5 
 policy/modules/admin/usermanage.te      |    4 
 policy/modules/apps/gpg.if              |    1 
 policy/modules/apps/java.fc             |    2 
 policy/modules/apps/java.te             |    2 
 policy/modules/apps/loadkeys.if         |   17 -
 policy/modules/apps/slocate.te          |    2 
 policy/modules/kernel/corecommands.fc   |    3 
 policy/modules/kernel/corecommands.if   |   36 ++
 policy/modules/kernel/corenetwork.if.in |   49 +++
 policy/modules/kernel/corenetwork.te.in |   15 
 policy/modules/kernel/corenetwork.te.m4 |    4 
 policy/modules/kernel/devices.fc        |    5 
 policy/modules/kernel/devices.te        |    8 
 policy/modules/kernel/domain.te         |    7 
 policy/modules/kernel/files.if          |  134 ++++++++
 policy/modules/kernel/filesystem.te     |    6 
 policy/modules/kernel/kernel.te         |    2 
 policy/modules/kernel/mls.if            |    8 
 policy/modules/kernel/mls.te            |    6 
 policy/modules/kernel/terminal.fc       |    1 
 policy/modules/kernel/terminal.if       |    2 
 policy/modules/kernel/terminal.te       |    1 
 policy/modules/services/apache.fc       |   10 
 policy/modules/services/apache.te       |   16 -
 policy/modules/services/apm.te          |    1 
 policy/modules/services/automount.te    |    1 
 policy/modules/services/avahi.if        |   21 +
 policy/modules/services/bind.fc         |    1 
 policy/modules/services/clamav.te       |    2 
 policy/modules/services/cron.fc         |    2 
 policy/modules/services/cron.if         |   49 ---
 policy/modules/services/cron.te         |   13 
 policy/modules/services/cups.fc         |    2 
 policy/modules/services/cups.te         |    7 
 policy/modules/services/cvs.te          |    1 
 policy/modules/services/dbus.fc         |    1 
 policy/modules/services/dbus.if         |    1 
 policy/modules/services/ftp.te          |   12 
 policy/modules/services/hal.fc          |    4 
 policy/modules/services/hal.if          |   20 +
 policy/modules/services/hal.te          |    8 
 policy/modules/services/kerberos.if     |    1 
 policy/modules/services/kerberos.te     |   11 
 policy/modules/services/lpd.if          |   52 +--
 policy/modules/services/mta.if          |    1 
 policy/modules/services/mta.te          |    1 
 policy/modules/services/nis.fc          |    1 
 policy/modules/services/nis.if          |    8 
 policy/modules/services/nis.te          |   10 
 policy/modules/services/nscd.if         |   20 +
 policy/modules/services/nscd.te         |   15 
 policy/modules/services/oddjob.te       |    3 
 policy/modules/services/pcscd.fc        |    9 
 policy/modules/services/pcscd.if        |   23 +
 policy/modules/services/pcscd.te        |   69 ++++
 policy/modules/services/pegasus.if      |   31 +
 policy/modules/services/pegasus.te      |    5 
 policy/modules/services/postfix.te      |   13 
 policy/modules/services/procmail.te     |   16 +
 policy/modules/services/rlogin.te       |   10 
 policy/modules/services/rpc.te          |    1 
 policy/modules/services/rsync.te        |    1 
 policy/modules/services/samba.if        |    2 
 policy/modules/services/samba.te        |    8 
 policy/modules/services/sasl.te         |    2 
 policy/modules/services/smartmon.te     |    1 
 policy/modules/services/snmp.te         |    4 
 policy/modules/services/spamassassin.te |    5 
 policy/modules/services/ssh.te          |    7 
 policy/modules/services/telnet.te       |    1 
 policy/modules/services/tftp.te         |    2 
 policy/modules/services/uucp.fc         |    1 
 policy/modules/services/uucp.if         |   67 ++++
 policy/modules/services/uucp.te         |   44 ++
 policy/modules/services/xserver.if      |   40 ++
 policy/modules/system/authlogin.if      |   69 ++++
 policy/modules/system/authlogin.te      |    6 
 policy/modules/system/clock.te          |    8 
 policy/modules/system/fstools.fc        |    1 
 policy/modules/system/fstools.te        |    2 
 policy/modules/system/getty.te          |    3 
 policy/modules/system/hostname.te       |   10 
 policy/modules/system/init.if           |    3 
 policy/modules/system/init.te           |   26 +
 policy/modules/system/iptables.te       |    7 
 policy/modules/system/libraries.fc      |   28 -
 policy/modules/system/libraries.te      |    6 
 policy/modules/system/locallogin.if     |   37 ++
 policy/modules/system/logging.te        |    9 
 policy/modules/system/lvm.fc            |    1 
 policy/modules/system/lvm.te            |   48 ++-
 policy/modules/system/miscfiles.fc      |    1 
 policy/modules/system/miscfiles.if      |   79 +++++
 policy/modules/system/modutils.te       |    5 
 policy/modules/system/mount.te          |   20 -
 policy/modules/system/raid.te           |    7 
 policy/modules/system/selinuxutil.fc    |    1 
 policy/modules/system/selinuxutil.if    |  110 ++++++
 policy/modules/system/selinuxutil.te    |  107 +-----
 policy/modules/system/sysnetwork.te     |    3 
 policy/modules/system/tzdata.fc         |    3 
 policy/modules/system/tzdata.if         |   23 +
 policy/modules/system/tzdata.te         |   28 +
 policy/modules/system/unconfined.fc     |    4 
 policy/modules/system/unconfined.if     |   19 +
 policy/modules/system/unconfined.te     |   19 +
 policy/modules/system/userdomain.if     |  503 ++++++++++++++++++++++++++++----
 policy/modules/system/userdomain.te     |   60 +--
 policy/modules/system/xen.fc            |    1 
 policy/modules/system/xen.te            |   35 ++
 132 files changed, 2076 insertions(+), 447 deletions(-)

Index: policy-20061106.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/policy-20061106.patch,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -r1.37 -r1.38
--- policy-20061106.patch	13 Dec 2006 17:03:55 -0000	1.37
+++ policy-20061106.patch	13 Dec 2006 22:29:24 -0000	1.38
@@ -948,7 +948,7 @@
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/corenetwork.te.in serefpolicy-2.4.6/policy/modules/kernel/corenetwork.te.in
 --- nsaserefpolicy/policy/modules/kernel/corenetwork.te.in	2006-11-16 17:15:04.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/kernel/corenetwork.te.in	2006-12-12 15:19:22.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/kernel/corenetwork.te.in	2006-12-13 13:25:18.000000000 -0500
 @@ -43,11 +43,16 @@
  sid port gen_context(system_u:object_r:port_t,s0)
  
@@ -3419,7 +3419,7 @@
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/logging.te serefpolicy-2.4.6/policy/modules/system/logging.te
 --- nsaserefpolicy/policy/modules/system/logging.te	2006-11-16 17:15:24.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/system/logging.te	2006-12-13 11:36:09.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/system/logging.te	2006-12-13 15:42:43.000000000 -0500
 @@ -53,6 +53,7 @@
  
  type var_log_t;
@@ -3428,11 +3428,18 @@
  
  ifdef(`enable_mls',`
  	init_ranged_daemon_domain(auditd_t,auditd_exec_t,mls_systemhigh)
-@@ -326,6 +327,7 @@
+@@ -326,6 +327,14 @@
  corenet_udp_sendrecv_all_ports(syslogd_t)
  corenet_udp_bind_all_nodes(syslogd_t)
  corenet_udp_bind_syslogd_port(syslogd_t)
-+corenet_udp_connect_syslogd_port(syslogd_t)
++
++# syslog-ng can listen and connect on tcp port 514 (rsh)
++corenet_tcp_sendrecv_all_if(syslogd_t)
++corenet_tcp_sendrecv_all_nodes(syslogd_t)
++corenet_tcp_sendrecv_all_ports(syslogd_t)
++corenet_tcp_bind_rsh_port(syslogd_t)
++corenet_tcp_connect_rsh_port(syslogd_t)
++
  # syslog-ng can send or receive logs
  corenet_sendrecv_syslogd_client_packets(syslogd_t)
  corenet_sendrecv_syslogd_server_packets(syslogd_t)
@@ -3802,7 +3809,7 @@
  # /var/run
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/selinuxutil.if serefpolicy-2.4.6/policy/modules/system/selinuxutil.if
 --- nsaserefpolicy/policy/modules/system/selinuxutil.if	2006-11-16 17:15:24.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/system/selinuxutil.if	2006-12-12 15:19:22.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/system/selinuxutil.if	2006-12-13 16:33:19.000000000 -0500
 @@ -713,7 +713,7 @@
  	')
  
@@ -3821,7 +3828,7 @@
  	allow $1 default_context_t:file manage_file_perms;
  ')
  
-@@ -1121,3 +1121,108 @@
+@@ -1121,3 +1121,109 @@
  	allow $1 selinux_config_t:dir search_dir_perms;
  	allow $1 semanage_trans_lock_t:file rw_file_perms;
  ')
@@ -3927,12 +3934,13 @@
 +		# Handle pp files created in homedir and /tmp
 +		files_read_generic_tmp_files($1)
 +		userdom_read_generic_user_home_content_files($1)
++		unconfined_dontaudit_read_pipes($1)
 +	')
 +')
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/selinuxutil.te serefpolicy-2.4.6/policy/modules/system/selinuxutil.te
 --- nsaserefpolicy/policy/modules/system/selinuxutil.te	2006-11-16 17:15:24.000000000 -0500
-+++ serefpolicy-2.4.6/policy/modules/system/selinuxutil.te	2006-12-12 15:19:22.000000000 -0500
++++ serefpolicy-2.4.6/policy/modules/system/selinuxutil.te	2006-12-13 16:33:04.000000000 -0500
 @@ -107,6 +107,19 @@
  type semanage_exec_t;
  domain_entry_file(semanage_t, semanage_exec_t)
@@ -3961,7 +3969,15 @@
  
  selinux_get_fs_mount(load_policy_t)
  selinux_load_policy(load_policy_t)
-@@ -288,6 +302,7 @@
+@@ -225,6 +239,7 @@
+ 	dontaudit load_policy_t selinux_config_t:file write;
+ 	optional_policy(`
+ 		unconfined_dontaudit_read_pipes(load_policy_t)
++		unconfined_dontaudit_read_pipes(setfiles_t)
+ 	')
+ ')
+ 
+@@ -288,6 +303,7 @@
  
  auth_domtrans_chk_passwd(newrole_t)
  auth_rw_faillog(newrole_t)
@@ -3969,7 +3985,7 @@
  
  corecmd_list_bin(newrole_t)
  corecmd_read_bin_symlinks(newrole_t)
-@@ -298,6 +313,7 @@
+@@ -298,6 +314,7 @@
  
  # Write to utmp.
  init_rw_utmp(newrole_t)
@@ -3977,7 +3993,7 @@
  
  files_read_etc_files(newrole_t)
  files_read_var_files(newrole_t)
-@@ -313,6 +329,7 @@
+@@ -313,6 +330,7 @@
  userdom_use_unpriv_users_fds(newrole_t)
  # for some PAM modules and for cwd
  userdom_dontaudit_search_all_users_home_content(newrole_t)
@@ -3985,7 +4001,7 @@
  
  ifdef(`strict_policy',`
  	# if secure mode is enabled, then newrole
-@@ -338,6 +355,7 @@
+@@ -338,6 +356,7 @@
  #
  
  allow restorecon_t self:capability { dac_override dac_read_search fowner };
@@ -3993,7 +4009,7 @@
  allow restorecon_t self:fifo_file rw_file_perms;
  
  allow restorecon_t { policy_src_t policy_config_t file_context_t selinux_config_t default_context_t }:dir r_dir_perms;
-@@ -362,6 +380,7 @@
+@@ -362,6 +381,7 @@
  
  fs_getattr_xattr_fs(restorecon_t)
  fs_search_auto_mountpoints(restorecon_t)
@@ -4001,7 +4017,7 @@
  
  mls_file_read_up(restorecon_t)
  mls_file_write_down(restorecon_t)
-@@ -409,12 +428,6 @@
+@@ -409,12 +429,6 @@
  	fs_relabel_tmpfs_chr_file(restorecon_t)
  ')
  
@@ -4014,7 +4030,7 @@
  optional_policy(`
  	hotplug_use_fds(restorecon_t)
  ')
-@@ -449,6 +462,7 @@
+@@ -449,6 +463,7 @@
  
  auth_relabel_all_files_except_shadow(restorecond_t )
  auth_read_all_files_except_shadow(restorecond_t)
@@ -4022,7 +4038,7 @@
  
  init_use_fds(restorecond_t)
  init_dontaudit_use_script_ptys(restorecond_t)
-@@ -549,82 +563,11 @@
+@@ -549,82 +564,11 @@
  
  ########################################
  #
@@ -4109,7 +4125,7 @@
  
  ########################################
  #
-@@ -672,6 +615,7 @@
+@@ -672,6 +616,7 @@
  init_use_fds(setfiles_t)
  init_use_script_fds(setfiles_t)
  init_use_script_ptys(setfiles_t)




More information about the fedora-cvs-commits mailing list