rpms/selinux-policy/F-8 policy-20070703.patch, 1.223, 1.224 selinux-policy.spec, 1.643, 1.644
Daniel J Walsh
dwalsh at fedoraproject.org
Tue Sep 23 20:09:05 UTC 2008
- Previous message (by thread): rpms/hamster-applet/devel .cvsignore, 1.12, 1.13 hamster-applet.spec, 1.17, 1.18 sources, 1.12, 1.13
- Next message (by thread): rpms/selinux-policy/F-9 policy-20071130.patch, 1.214, 1.215 selinux-policy.spec, 1.710, 1.711
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/extras/rpms/selinux-policy/F-8
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv11846
Modified Files:
policy-20070703.patch selinux-policy.spec
Log Message:
* Tue Sep 9 2008 Dan Walsh <dwalsh at redhat.com> 3.0.8-116
- add mimedefang to spamd
policy-20070703.patch:
Index: policy-20070703.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-8/policy-20070703.patch,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -r1.223 -r1.224
--- policy-20070703.patch 8 Sep 2008 20:59:24 -0000 1.223
+++ policy-20070703.patch 23 Sep 2008 20:09:04 -0000 1.224
@@ -9924,8 +9924,18 @@
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus.te serefpolicy-3.0.8/policy/modules/services/dbus.te
--- nsaserefpolicy/policy/modules/services/dbus.te 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/dbus.te 2008-06-12 23:37:59.000000000 -0400
-@@ -20,9 +20,25 @@
++++ serefpolicy-3.0.8/policy/modules/services/dbus.te 2008-09-23 15:30:42.000000000 -0400
+@@ -9,7 +9,8 @@
+ #
+ # Delcarations
+ #
+-
++attribute dbusd_unconfined;
++
+ type dbusd_etc_t alias etc_dbusd_t;
+ files_type(dbusd_etc_t)
+
+@@ -20,9 +21,25 @@
type system_dbusd_tmp_t;
files_tmp_file(system_dbusd_tmp_t)
@@ -9951,7 +9961,7 @@
##############################
#
# Local policy
-@@ -32,7 +48,7 @@
+@@ -32,7 +49,7 @@
# cjp: dac_override should probably go in a distro_debian
allow system_dbusd_t self:capability { dac_override setgid setpcap setuid };
dontaudit system_dbusd_t self:capability sys_tty_config;
@@ -9960,7 +9970,7 @@
allow system_dbusd_t self:fifo_file { read write };
allow system_dbusd_t self:dbus { send_msg acquire_svc };
allow system_dbusd_t self:unix_stream_socket { connectto create_stream_socket_perms connectto };
-@@ -40,6 +56,8 @@
+@@ -40,6 +57,8 @@
# Receive notifications of policy reloads and enforcing status changes.
allow system_dbusd_t self:netlink_selinux_socket { create bind read };
@@ -9969,7 +9979,7 @@
allow system_dbusd_t dbusd_etc_t:dir list_dir_perms;
read_files_pattern(system_dbusd_t,dbusd_etc_t,dbusd_etc_t)
read_lnk_files_pattern(system_dbusd_t,dbusd_etc_t,dbusd_etc_t)
-@@ -48,6 +66,8 @@
+@@ -48,6 +67,8 @@
manage_files_pattern(system_dbusd_t,system_dbusd_tmp_t,system_dbusd_tmp_t)
files_tmp_filetrans(system_dbusd_t, system_dbusd_tmp_t, { file dir })
@@ -9978,7 +9988,7 @@
manage_files_pattern(system_dbusd_t,system_dbusd_var_run_t,system_dbusd_var_run_t)
manage_sock_files_pattern(system_dbusd_t,system_dbusd_var_run_t,system_dbusd_var_run_t)
files_pid_filetrans(system_dbusd_t,system_dbusd_var_run_t,file)
-@@ -60,6 +80,8 @@
+@@ -60,6 +81,8 @@
fs_getattr_all_fs(system_dbusd_t)
fs_search_auto_mountpoints(system_dbusd_t)
@@ -9987,16 +9997,25 @@
selinux_get_fs_mount(system_dbusd_t)
selinux_validate_context(system_dbusd_t)
-@@ -86,6 +108,8 @@
+@@ -76,7 +99,6 @@
+ corecmd_list_bin(system_dbusd_t)
+ corecmd_read_bin_pipes(system_dbusd_t)
+ corecmd_read_bin_sockets(system_dbusd_t)
+-corecmd_exec_bin(system_dbusd_t)
+
+ domain_use_interactive_fds(system_dbusd_t)
+
+@@ -86,6 +108,9 @@
init_use_fds(system_dbusd_t)
init_use_script_ptys(system_dbusd_t)
+init_dbus_chat_script(system_dbusd_t)
+init_bin_domtrans_spec(system_dbusd_t)
++init_domtrans_script(system_dbusd_t)
libs_use_ld_so(system_dbusd_t)
libs_use_shared_libs(system_dbusd_t)
-@@ -116,9 +140,26 @@
+@@ -116,9 +141,26 @@
')
optional_policy(`
@@ -10004,7 +10023,7 @@
+')
+
+optional_policy(`
-+ networkmanager_init_script_domtrans_spec(system_dbusd_t)
++ networkmanager_script_domtrans(system_dbusd_t)
+')
+
+optional_policy(`
@@ -12773,25 +12792,37 @@
#
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.fc serefpolicy-3.0.8/policy/modules/services/networkmanager.fc
--- nsaserefpolicy/policy/modules/services/networkmanager.fc 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/networkmanager.fc 2008-07-24 14:08:47.000000000 -0400
-@@ -1,7 +1,13 @@
++++ serefpolicy-3.0.8/policy/modules/services/networkmanager.fc 2008-09-23 15:25:05.000000000 -0400
+@@ -1,7 +1,16 @@
++/etc/NetworkManager/dispatcher\.d(/.*) gen_context(system_u:object_r:NetworkManager_script_exec_t,s0)
++
++/sbin/wpa_supplicant -- gen_context(system_u:object_r:NetworkManager_exec_t,s0)
++
/usr/s?bin/NetworkManager -- gen_context(system_u:object_r:NetworkManager_exec_t,s0)
/usr/s?bin/wpa_supplicant -- gen_context(system_u:object_r:NetworkManager_exec_t,s0)
+/usr/sbin/NetworkManagerDispatcher -- gen_context(system_u:object_r:NetworkManager_exec_t,s0)
+/usr/sbin/nm-system-settings -- gen_context(system_u:object_r:NetworkManager_exec_t,s0)
++
++/var/log/wpa_supplicant.* -- gen_context(system_u:object_r:NetworkManager_log_t,s0)
/var/run/NetworkManager\.pid -- gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
/var/run/NetworkManager(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
/var/run/wpa_supplicant(/.*)? gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
/var/run/wpa_supplicant-global -s gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
+/var/run/nm-dhclient.* gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
-+
-+/var/log/wpa_supplicant\.log.* -- gen_context(system_u:object_r:NetworkManager_log_t,s0)
-+/etc/NetworkManager/dispatcher.d(/.*) gen_context(system_u:object_r:NetworkManager_script_exec_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.if serefpolicy-3.0.8/policy/modules/services/networkmanager.if
--- nsaserefpolicy/policy/modules/services/networkmanager.if 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/networkmanager.if 2008-07-24 14:08:32.000000000 -0400
-@@ -97,3 +97,59 @@
++++ serefpolicy-3.0.8/policy/modules/services/networkmanager.if 2008-09-23 15:25:58.000000000 -0400
+@@ -74,7 +74,7 @@
+ ')
+
+ corecmd_search_bin($1)
+- domtrans_pattern($1,NetworkManager_exec_t,NetworkManager_t)
++ domtrans_pattern($1, NetworkManager_exec_t, NetworkManager_t)
+ ')
+
+ ########################################
+@@ -97,3 +97,58 @@
allow $1 NetworkManager_t:dbus send_msg;
allow NetworkManager_t $1:dbus send_msg;
')
@@ -12824,7 +12855,7 @@
+## </summary>
+## </param>
+#
-+interface(`networkmanager_init_script_domtrans_spec',`
++interface(`networkmanager_script_domtrans',`
+ gen_require(`
+ type NetworkManager_script_exec_t;
+ ')
@@ -12832,7 +12863,6 @@
+ init_script_domtrans_spec($1, NetworkManager_script_exec_t)
+')
+
-+
+########################################
+## <summary>
+## Read NetworkManager PID files.
@@ -12853,47 +12883,62 @@
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-3.0.8/policy/modules/services/networkmanager.te
--- nsaserefpolicy/policy/modules/services/networkmanager.te 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/networkmanager.te 2008-08-11 15:45:47.000000000 -0400
++++ serefpolicy-3.0.8/policy/modules/services/networkmanager.te 2008-09-23 16:05:47.000000000 -0400
@@ -1,5 +1,5 @@
-policy_module(networkmanager,1.7.1)
-+policy_module(networkmanager,1.9.0)
++policy_module(networkmanager, 1.10.2)
########################################
#
-@@ -13,6 +13,13 @@
- type NetworkManager_var_run_t;
- files_pid_file(NetworkManager_var_run_t)
+@@ -8,7 +8,16 @@
+ type NetworkManager_t;
+ type NetworkManager_exec_t;
+-init_daemon_domain(NetworkManager_t,NetworkManager_exec_t)
++init_daemon_domain(NetworkManager_t, NetworkManager_exec_t)
++
+type NetworkManager_log_t;
+logging_log_file(NetworkManager_log_t)
+
+type NetworkManager_script_exec_t;
+init_script_type(NetworkManager_script_exec_t)
-+init_script_domtrans_spec(NetworkManager_t, NetworkManager_script_exec_t)
+
- ########################################
- #
- # Local policy
-@@ -20,9 +27,9 @@
++type NetworkManager_tmp_t;
++files_tmp_file(NetworkManager_tmp_t)
+
+ type NetworkManager_var_run_t;
+ files_pid_file(NetworkManager_var_run_t)
+@@ -20,9 +29,9 @@
# networkmanager will ptrace itself if gdb is installed
# and it receives a unexpected signal (rh bug #204161)
-allow NetworkManager_t self:capability { kill setgid setuid sys_nice dac_override net_admin net_raw net_bind_service ipc_lock };
-+allow NetworkManager_t self:capability { chown fsetid kill setgid setuid sys_nice dac_override net_admin net_raw net_bind_service ipc_lock };
++allow NetworkManager_t self:capability { chown fsetid kill setgid setuid sys_admin sys_nice dac_override net_admin net_raw net_bind_service ipc_lock };
dontaudit NetworkManager_t self:capability { sys_tty_config sys_ptrace };
-allow NetworkManager_t self:process { ptrace setcap setpgid getsched signal_perms };
+allow NetworkManager_t self:process { ptrace getcap setcap setpgid getsched setsched signal_perms };
allow NetworkManager_t self:fifo_file rw_fifo_file_perms;
allow NetworkManager_t self:unix_dgram_socket { sendto create_socket_perms };
allow NetworkManager_t self:unix_stream_socket create_stream_socket_perms;
-@@ -38,10 +45,14 @@
- manage_sock_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+@@ -33,15 +42,22 @@
+
+ can_exec(NetworkManager_t, NetworkManager_exec_t)
+
+-manage_dirs_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+-manage_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+-manage_sock_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
++manage_files_pattern(NetworkManager_t, NetworkManager_log_t, NetworkManager_log_t)
++logging_log_filetrans(NetworkManager_t, NetworkManager_log_t, file)
++
++manage_sock_files_pattern(NetworkManager_t, NetworkManager_tmp_t, NetworkManager_tmp_t)
++files_tmp_filetrans(NetworkManager_t, NetworkManager_tmp_t, sock_file)
++
++manage_dirs_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
++manage_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
++manage_sock_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
files_pid_filetrans(NetworkManager_t,NetworkManager_var_run_t, { dir file sock_file })
-+manage_files_pattern(NetworkManager_t,NetworkManager_log_t,NetworkManager_log_t)
-+logging_log_filetrans(NetworkManager_t,NetworkManager_log_t, file)
-+
kernel_read_system_state(NetworkManager_t)
kernel_read_network_state(NetworkManager_t)
kernel_read_kernel_sysctls(NetworkManager_t)
@@ -12902,7 +12947,7 @@
corenet_all_recvfrom_unlabeled(NetworkManager_t)
corenet_all_recvfrom_netlabel(NetworkManager_t)
-@@ -64,9 +75,11 @@
+@@ -64,9 +80,11 @@
dev_read_sysfs(NetworkManager_t)
dev_read_rand(NetworkManager_t)
dev_read_urand(NetworkManager_t)
@@ -12914,14 +12959,12 @@
mls_file_read_all_levels(NetworkManager_t)
-@@ -82,10 +95,16 @@
- files_read_etc_files(NetworkManager_t)
+@@ -83,9 +101,14 @@
files_read_etc_runtime_files(NetworkManager_t)
files_read_usr_files(NetworkManager_t)
-+files_list_tmp(NetworkManager_t)
-+
-+storage_getattr_fixed_disk_dev(NetworkManager_t)
++storage_getattr_fixed_disk_dev(NetworkManager_t)
++
init_read_utmp(NetworkManager_t)
+init_dontaudit_write_utmp(NetworkManager_t)
init_domtrans_script(NetworkManager_t)
@@ -12931,17 +12974,23 @@
libs_use_ld_so(NetworkManager_t)
libs_use_shared_libs(NetworkManager_t)
-@@ -113,6 +132,9 @@
+@@ -109,10 +132,14 @@
+ sysnet_etc_filetrans_config(NetworkManager_t)
+
+ userdom_dontaudit_use_unpriv_user_fds(NetworkManager_t)
+-userdom_dontaudit_search_sysadm_home_dirs(NetworkManager_t)
userdom_dontaudit_use_unpriv_users_ttys(NetworkManager_t)
# Read gnome-keyring
userdom_read_unpriv_users_home_content_files(NetworkManager_t)
+userdom_unpriv_users_stream_connect(NetworkManager_t)
+
++userdom_dontaudit_search_sysadm_home_dirs(NetworkManager_t)
++
+cron_read_system_job_lib_files(NetworkManager_t)
optional_policy(`
bind_domtrans(NetworkManager_t)
-@@ -129,28 +151,22 @@
+@@ -129,28 +156,26 @@
')
optional_policy(`
@@ -12954,12 +13003,11 @@
- dbus_system_bus_client_template(NetworkManager,NetworkManager_t)
- dbus_connect_system_bus(NetworkManager_t)
- dbus_send_system_bus(NetworkManager_t)
-+ dbus_system_domain(NetworkManager_t,NetworkManager_exec_t)
++ dbus_system_domain(NetworkManager_t, NetworkManager_exec_t)
')
optional_policy(`
- howl_signal(NetworkManager_t)
-+ hal_dontaudit_list_lib_dirs(NetworkManager_t)
+ hal_write_log(NetworkManager_t)
')
@@ -12970,35 +13018,33 @@
optional_policy(`
- nscd_socket_use(NetworkManager_t)
++ nscd_domtrans(NetworkManager_t)
nscd_signal(NetworkManager_t)
+ nscd_script_domtrans(NetworkManager_t)
-+ nscd_domtrans(NetworkManager_t)
- ')
-
- optional_policy(`
-@@ -162,19 +178,21 @@
- ppp_domtrans(NetworkManager_t)
- ppp_read_pid_files(NetworkManager_t)
- ppp_signal(NetworkManager_t)
-+ ppp_signull(NetworkManager_t)
-+ ppp_read_config(NetworkManager_t)
- ')
-
- optional_policy(`
-- seutil_sigchld_newrole(NetworkManager_t)
++')
++
++optional_policy(`
+ # Dispatcher starting and stoping ntp
+ ntp_script_domtrans(NetworkManager_t)
')
optional_policy(`
-- udev_read_db(NetworkManager_t)
-+ seutil_sigchld_newrole(NetworkManager_t)
+@@ -159,9 +184,17 @@
')
optional_policy(`
-- # Read gnome-keyring
-- unconfined_read_home_content_files(NetworkManager_t)
-+ udev_read_db(NetworkManager_t)
+- ppp_domtrans(NetworkManager_t)
++ ppp_script_domtrans(NetworkManager_t)
+ ppp_read_pid_files(NetworkManager_t)
+ ppp_signal(NetworkManager_t)
++ ppp_signull(NetworkManager_t)
++ ppp_read_config(NetworkManager_t)
++')
++
++optional_policy(`
++ rpm_exec(NetworkManager_t)
++ rpm_read_db(NetworkManager_t)
++ rpm_dontaudit_manage_db(NetworkManager_t)
')
optional_policy(`
@@ -14393,7 +14439,7 @@
# Fix pptp sockets
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ppp.if serefpolicy-3.0.8/policy/modules/services/ppp.if
--- nsaserefpolicy/policy/modules/services/ppp.if 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/ppp.if 2008-08-11 15:46:05.000000000 -0400
++++ serefpolicy-3.0.8/policy/modules/services/ppp.if 2008-09-23 15:56:03.000000000 -0400
@@ -76,6 +76,24 @@
########################################
@@ -14419,7 +14465,41 @@
## Execute domain in the ppp domain.
## </summary>
## <param name="domain">
-@@ -159,6 +177,25 @@
+@@ -102,6 +120,16 @@
+ ## Domain allowed access.
+ ## </summary>
+ ## </param>
++## <param name="role">
++## <summary>
++## The role to allow the ppp domain.
++## </summary>
++## </param>
++## <param name="terminal">
++## <summary>
++## The type of the terminal allow the ppp domain to use.
++## </summary>
++## </param>
+ ## <rolecap/>
+ #
+ interface(`ppp_run_cond',`
+@@ -126,6 +154,16 @@
+ ## Domain allowed access.
+ ## </summary>
+ ## </param>
++## <param name="role">
++## <summary>
++## The role to allow the ppp domain.
++## </summary>
++## </param>
++## <param name="terminal">
++## <summary>
++## The type of the terminal allow the ppp domain to use.
++## </summary>
++## </param>
+ ## <rolecap/>
+ #
+ interface(`ppp_run',`
+@@ -159,6 +197,25 @@
########################################
## <summary>
@@ -14445,9 +14525,41 @@
## Read PPP-writable configuration files.
## </summary>
## <param name="domain">
+@@ -248,5 +305,23 @@
+ type pppd_var_run_t;
+ ')
+
+- files_pid_filetrans($1,pppd_var_run_t,file)
++ files_pid_filetrans($1, pppd_var_run_t, file)
++')
++
++########################################
++## <summary>
++## Execute ppp server in the ntpd domain.
++## </summary>
++## <param name="domain">
++## <summary>
++## The type of the process performing this action.
++## </summary>
++## </param>
++#
++interface(`ppp_script_domtrans',`
++ gen_require(`
++ type pppd_script_exec_t;
++ ')
++
++ init_script_domtrans_spec($1, pppd_script_exec_t)
+ ')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ppp.te serefpolicy-3.0.8/policy/modules/services/ppp.te
--- nsaserefpolicy/policy/modules/services/ppp.te 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/ppp.te 2008-08-11 16:47:54.000000000 -0400
++++ serefpolicy-3.0.8/policy/modules/services/ppp.te 2008-09-23 16:00:30.000000000 -0400
+@@ -1,5 +1,5 @@
+
+-policy_module(ppp,1.5.0)
++policy_module(ppp,1.6.1)
+
+ ########################################
+ #
@@ -71,7 +71,7 @@
# PPPD Local policy
#
@@ -14466,7 +14578,33 @@
kernel_read_network_state(pppd_t)
kernel_load_module(pppd_t)
-@@ -197,11 +197,7 @@
+@@ -162,6 +162,8 @@
+ init_read_utmp(pppd_t)
+ init_dontaudit_write_utmp(pppd_t)
+
++auth_use_nsswitch(pppd_t)
++
+ libs_use_ld_so(pppd_t)
+ libs_use_shared_libs(pppd_t)
+
+@@ -174,10 +176,9 @@
+ sysnet_etc_filetrans_config(pppd_t)
+
+ userdom_dontaudit_use_unpriv_user_fds(pppd_t)
+-userdom_dontaudit_search_sysadm_home_dirs(pppd_t)
+ # for ~/.ppprc - if it actually exists then you need some policy to read it
+ #allow pppd_t { sysadm_home_dir_t home_root_t user_home_dir_type }:dir search;
+-userdom_search_sysadm_home_dirs(pppd_t)
++userdom_dontaudit_search_sysadm_home_dirs(pppd_t)
+ userdom_search_unpriv_users_home_dirs(pppd_t)
+
+ ppp_exec(pppd_t)
+@@ -194,14 +195,12 @@
+
+ optional_policy(`
+ mta_send_mail(pppd_t)
++ mta_mailcontent(pppd_etc_t)
++ mta_mailcontent(pppd_etc_rw_t)
')
optional_policy(`
@@ -14479,14 +14617,32 @@
')
optional_policy(`
-@@ -221,6 +217,7 @@
+@@ -221,8 +220,9 @@
# PPTP Local policy
#
-+allow pptp_t self:process signal;
- dontaudit pptp_t self:capability sys_tty_config;
+-dontaudit pptp_t self:capability sys_tty_config;
allow pptp_t self:capability net_raw;
++dontaudit pptp_t self:capability sys_tty_config;
++allow pptp_t self:process signal;
allow pptp_t self:fifo_file { read write };
+ allow pptp_t self:unix_dgram_socket create_socket_perms;
+ allow pptp_t self:unix_stream_socket { connectto create_stream_socket_perms };
+@@ -292,6 +292,14 @@
+ ')
+
+ optional_policy(`
++ dbus_system_domain(pppd_t,pppd_exec_t)
++
++ optional_policy(`
++ networkmanager_dbus_chat(pppd_t)
++ ')
++')
++
++optional_policy(`
+ hostname_exec(pptp_t)
+ ')
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/prelude.fc serefpolicy-3.0.8/policy/modules/services/prelude.fc
--- nsaserefpolicy/policy/modules/services/prelude.fc 1969-12-31 19:00:00.000000000 -0500
+++ serefpolicy-3.0.8/policy/modules/services/prelude.fc 2008-06-12 23:37:59.000000000 -0400
@@ -17141,15 +17297,27 @@
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.fc serefpolicy-3.0.8/policy/modules/services/spamassassin.fc
--- nsaserefpolicy/policy/modules/services/spamassassin.fc 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/spamassassin.fc 2008-06-12 23:37:58.000000000 -0400
-@@ -11,6 +11,7 @@
++++ serefpolicy-3.0.8/policy/modules/services/spamassassin.fc 2008-09-09 08:19:50.000000000 -0400
+@@ -6,11 +6,18 @@
+ /usr/bin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0)
+
+ /usr/sbin/spamd -- gen_context(system_u:object_r:spamd_exec_t,s0)
++/usr/sbin/spamass-milter -- gen_context(system_u:object_r:spamd_exec_t,s0)
++/usr/bin/mimedefang-multiplexor -- gen_context(system_u:object_r:spamd_exec_t,s0)
+
+ /var/lib/spamassassin(/.*)? gen_context(system_u:object_r:spamd_var_lib_t,s0)
++/var/log/spamd\.log -- gen_context(system_u:object_r:spamd_log_t,s0)
++/var/log/mimedefang -- gen_context(system_u:object_r:spamd_log_t,s0)
++
/var/run/spamassassin(/.*)? gen_context(system_u:object_r:spamd_var_run_t,s0)
/var/run/spamass-milter(/.*)? gen_context(system_u:object_r:spamd_var_run_t,s0)
+-
+/var/spool/milter-regex(/.*)? gen_context(system_u:object_r:spamd_var_run_t,s0)
-
/var/spool/spamassassin(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
/var/spool/spamd(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
++/var/spool/MD-Quarantine(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
++/var/spool/MIMEDefang(/.*)? gen_context(system_u:object_r:spamd_spool_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.if serefpolicy-3.0.8/policy/modules/services/spamassassin.if
--- nsaserefpolicy/policy/modules/services/spamassassin.if 2008-06-12 23:37:57.000000000 -0400
+++ serefpolicy-3.0.8/policy/modules/services/spamassassin.if 2008-06-12 23:37:59.000000000 -0400
@@ -17267,8 +17435,18 @@
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.te serefpolicy-3.0.8/policy/modules/services/spamassassin.te
--- nsaserefpolicy/policy/modules/services/spamassassin.te 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/services/spamassassin.te 2008-06-12 23:37:58.000000000 -0400
-@@ -53,7 +53,7 @@
++++ serefpolicy-3.0.8/policy/modules/services/spamassassin.te 2008-09-09 08:22:51.000000000 -0400
+@@ -31,6 +31,9 @@
+ type spamd_spool_t;
+ files_type(spamd_spool_t)
+
++type spamd_log_t;
++logging_log_file(spamd_log_t)
++
+ type spamd_tmp_t;
+ files_tmp_file(spamd_tmp_t)
+
+@@ -53,7 +56,7 @@
# setuids to the user running spamc. Comment this if you are not
# using this ability.
@@ -17277,7 +17455,22 @@
dontaudit spamd_t self:capability sys_tty_config;
allow spamd_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
allow spamd_t self:fd use;
-@@ -81,11 +81,12 @@
+@@ -69,10 +72,13 @@
+ allow spamd_t self:unix_stream_socket connectto;
+ allow spamd_t self:tcp_socket create_stream_socket_perms;
+ allow spamd_t self:udp_socket create_socket_perms;
+-allow spamd_t self:netlink_route_socket r_netlink_socket_perms;
++
++manage_files_pattern(spamd_t, spamd_log_t, spamd_log_t)
++logging_log_filetrans(spamd_t, spamd_log_t, file)
+
+ manage_dirs_pattern(spamd_t,spamd_spool_t,spamd_spool_t)
+ manage_files_pattern(spamd_t,spamd_spool_t,spamd_spool_t)
++manage_sock_files_pattern(spamd_t, spamd_spool_t, spamd_spool_t)
+ files_spool_filetrans(spamd_t,spamd_spool_t, { file dir })
+
+ manage_dirs_pattern(spamd_t,spamd_tmp_t,spamd_tmp_t)
+@@ -81,11 +87,12 @@
# var/lib files for spamd
allow spamd_t spamd_var_lib_t:dir list_dir_perms;
@@ -17292,7 +17485,25 @@
kernel_read_all_sysctls(spamd_t)
kernel_read_system_state(spamd_t)
-@@ -150,10 +151,12 @@
+@@ -134,6 +141,8 @@
+
+ init_dontaudit_rw_utmp(spamd_t)
+
++auth_use_nsswitch(spamd_t)
++
+ libs_use_ld_so(spamd_t)
+ libs_use_shared_libs(spamd_t)
+
+@@ -141,19 +150,17 @@
+
+ miscfiles_read_localization(spamd_t)
+
+-sysnet_read_config(spamd_t)
+-sysnet_use_ldap(spamd_t)
+-sysnet_dns_name_resolve(spamd_t)
+-
+ userdom_use_unpriv_users_fds(spamd_t)
+ userdom_search_unpriv_users_home_dirs(spamd_t)
userdom_dontaudit_search_sysadm_home_dirs(spamd_t)
tunable_policy(`use_nfs_home_dirs',`
@@ -17305,7 +17516,7 @@
fs_manage_cifs_files(spamd_t)
')
-@@ -171,6 +174,7 @@
+@@ -171,6 +178,7 @@
optional_policy(`
dcc_domtrans_client(spamd_t)
@@ -17313,6 +17524,17 @@
dcc_stream_connect_dccifd(spamd_t)
')
+@@ -180,10 +188,6 @@
+ ')
+
+ optional_policy(`
+- nis_use_ypbind(spamd_t)
+-')
+-
+-optional_policy(`
+ postfix_read_config(spamd_t)
+ ')
+
@@ -212,3 +216,30 @@
optional_policy(`
udev_read_db(spamd_t)
@@ -23598,7 +23820,7 @@
/tmp/gconfd-USER -d gen_context(system_u:object_r:ROLE_tmp_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.if serefpolicy-3.0.8/policy/modules/system/userdomain.if
--- nsaserefpolicy/policy/modules/system/userdomain.if 2008-06-12 23:37:57.000000000 -0400
-+++ serefpolicy-3.0.8/policy/modules/system/userdomain.if 2008-07-02 17:13:24.000000000 -0400
++++ serefpolicy-3.0.8/policy/modules/system/userdomain.if 2008-09-23 15:36:50.000000000 -0400
@@ -29,8 +29,9 @@
')
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-8/selinux-policy.spec,v
retrieving revision 1.643
retrieving revision 1.644
diff -u -r1.643 -r1.644
--- selinux-policy.spec 8 Sep 2008 20:59:24 -0000 1.643
+++ selinux-policy.spec 23 Sep 2008 20:09:05 -0000 1.644
@@ -17,7 +17,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.0.8
-Release: 115%{?dist}
+Release: 116%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -381,6 +381,9 @@
%endif
%changelog
+* Tue Sep 9 2008 Dan Walsh <dwalsh at redhat.com> 3.0.8-116
+- add mimedefang to spamd
+
* Tue Aug 26 2008 Dan Walsh <dwalsh at redhat.com> 3.0.8-115
- Remove definition for /var/run/mod_fcgid(/.*)?
- Previous message (by thread): rpms/hamster-applet/devel .cvsignore, 1.12, 1.13 hamster-applet.spec, 1.17, 1.18 sources, 1.12, 1.13
- Next message (by thread): rpms/selinux-policy/F-9 policy-20071130.patch, 1.214, 1.215 selinux-policy.spec, 1.710, 1.711
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-extras-commits
mailing list