rpms/selinux-policy/F-10 policy-20080710.patch, 1.106, 1.107 selinux-policy.spec, 1.756, 1.757
Daniel J Walsh
dwalsh at fedoraproject.org
Tue Dec 2 21:33:42 UTC 2008
Author: dwalsh
Update of /cvs/extras/rpms/selinux-policy/F-10
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv14020
Modified Files:
policy-20080710.patch selinux-policy.spec
Log Message:
* Tue Dec 2 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-29
- Allow spamc to communicate with spamd via sock file
policy-20080710.patch:
Index: policy-20080710.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-10/policy-20080710.patch,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -r1.106 -r1.107
--- policy-20080710.patch 2 Dec 2008 20:47:51 -0000 1.106
+++ policy-20080710.patch 2 Dec 2008 21:33:39 -0000 1.107
@@ -25295,7 +25295,7 @@
+')
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.te serefpolicy-3.5.13/policy/modules/services/spamassassin.te
--- nsaserefpolicy/policy/modules/services/spamassassin.te 2008-10-17 08:49:11.000000000 -0400
-+++ serefpolicy-3.5.13/policy/modules/services/spamassassin.te 2008-11-24 10:49:49.000000000 -0500
++++ serefpolicy-3.5.13/policy/modules/services/spamassassin.te 2008-12-02 16:30:32.000000000 -0500
@@ -21,16 +21,24 @@
gen_tunable(spamd_enable_home_dirs, true)
@@ -25467,7 +25467,7 @@
')
optional_policy(`
-@@ -213,3 +260,121 @@
+@@ -213,3 +260,122 @@
optional_policy(`
udev_read_db(spamd_t)
')
@@ -25495,6 +25495,7 @@
+# Allow connecting to a local spamd
+allow spamc_t spamd_t:unix_stream_socket connectto;
+allow spamc_t spamd_tmp_t:sock_file rw_file_perms;
++spamd_stream_connect(spamc_t)
+
+manage_dirs_pattern(spamc_t, spamc_home_t, spamc_home_t)
+manage_files_pattern(spamc_t, spamc_home_t, spamc_home_t)
@@ -35692,7 +35693,7 @@
+')
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.te serefpolicy-3.5.13/policy/modules/system/userdomain.te
--- nsaserefpolicy/policy/modules/system/userdomain.te 2008-10-17 08:49:13.000000000 -0400
-+++ serefpolicy-3.5.13/policy/modules/system/userdomain.te 2008-11-24 10:49:49.000000000 -0500
++++ serefpolicy-3.5.13/policy/modules/system/userdomain.te 2008-12-02 16:09:55.000000000 -0500
@@ -8,13 +8,6 @@
## <desc>
@@ -35734,7 +35735,7 @@
# The privhome attribute identifies every domain that can create files under
# regular user home directories in the regular context (IE act on behalf of
# a user in writing regular files)
-@@ -81,6 +73,76 @@
+@@ -81,6 +73,75 @@
# unprivileged user domains
attribute unpriv_userdomain;
@@ -35773,7 +35774,6 @@
+type user_tmpfs_t, user_file_type;
+files_tmpfs_file(user_tmpfs_t)
+
-+
+##############################
+#
+# User home directory file rules
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-10/selinux-policy.spec,v
retrieving revision 1.756
retrieving revision 1.757
diff -u -r1.756 -r1.757
--- selinux-policy.spec 2 Dec 2008 20:47:51 -0000 1.756
+++ selinux-policy.spec 2 Dec 2008 21:33:41 -0000 1.757
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.5.13
-Release: 28%{?dist}
+Release: 29%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -457,6 +457,9 @@
%endif
%changelog
+* Tue Dec 2 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-29
+- Allow spamc to communicate with spamd via sock file
+
* Tue Dec 2 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-28
- Allow kismet to kill itself
More information about the fedora-extras-commits
mailing list