rpms/selinux-policy/F-8 policy-20070703.patch,1.145,1.146
Daniel J Walsh (dwalsh)
fedora-extras-commits at redhat.com
Tue Nov 27 02:49:59 UTC 2007
- Previous message (by thread): rpms/perl-Class-MOP/F-7 perl-Class-MOP.spec, 1.8, 1.9 sources, 1.8, 1.9
- Next message (by thread): rpms/gnome-keyring/devel .cvsignore, 1.33, 1.34 gnome-keyring.spec, 1.66, 1.67 sources, 1.33, 1.34 gnome-keyring-0.5.2-null-fix.patch, 1.1, NONE init-ret.patch, 1.1, NONE pam.patch, 1.4, NONE
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/extras/rpms/selinux-policy/F-8
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv7536
Modified Files:
policy-20070703.patch
Log Message:
* Mon Nov 26 2007 Dan Walsh <dwalsh at redhat.com> 3.0.8-62
- Allow xend to create xend_var_log_t directories
- dontaudit setfiles relabel of /proc /sys caused by named-chroot
- Add rules for pam_keyinit (setkeycreate, ipc_lock)
- Allow mount to read unlabeled directorys for reiserfs
policy-20070703.patch:
Index: policy-20070703.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-8/policy-20070703.patch,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -r1.145 -r1.146
--- policy-20070703.patch 26 Nov 2007 21:25:47 -0000 1.145
+++ policy-20070703.patch 27 Nov 2007 02:49:56 -0000 1.146
@@ -14510,7 +14510,7 @@
+/var/cache/coolkey(/.*)? gen_context(system_u:object_r:auth_cache_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/authlogin.if serefpolicy-3.0.8/policy/modules/system/authlogin.if
--- nsaserefpolicy/policy/modules/system/authlogin.if 2007-10-22 13:21:39.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/system/authlogin.if 2007-11-26 13:41:19.000000000 -0500
++++ serefpolicy-3.0.8/policy/modules/system/authlogin.if 2007-11-26 16:38:01.000000000 -0500
@@ -26,7 +26,8 @@
type $1_chkpwd_t, can_read_shadow_passwords;
application_domain($1_chkpwd_t,chkpwd_exec_t)
@@ -14605,7 +14605,7 @@
+ userdom_set_rlimitnh($1)
+ userdom_unlink_unpriv_users_tmp_files($1)
-+ userdom_write_unpriv_users_tmp_sockets($1)
++ userdom_unpriv_users_stream_connect($1)
+
+ optional_policy(`
+ mount_domtrans($1)
@@ -17931,7 +17931,7 @@
+/usr/bin/sbcl -- gen_context(system_u:object_r:unconfined_execmem_exec_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/unconfined.if serefpolicy-3.0.8/policy/modules/system/unconfined.if
--- nsaserefpolicy/policy/modules/system/unconfined.if 2007-10-22 13:21:40.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/system/unconfined.if 2007-11-16 17:33:54.000000000 -0500
++++ serefpolicy-3.0.8/policy/modules/system/unconfined.if 2007-11-26 21:45:36.000000000 -0500
@@ -12,14 +12,13 @@
#
interface(`unconfined_domain_noaudit',`
- Previous message (by thread): rpms/perl-Class-MOP/F-7 perl-Class-MOP.spec, 1.8, 1.9 sources, 1.8, 1.9
- Next message (by thread): rpms/gnome-keyring/devel .cvsignore, 1.33, 1.34 gnome-keyring.spec, 1.66, 1.67 sources, 1.33, 1.34 gnome-keyring-0.5.2-null-fix.patch, 1.1, NONE init-ret.patch, 1.1, NONE pam.patch, 1.4, NONE
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-extras-commits
mailing list