diff --git a/policy-F16.patch b/policy-F16.patch index 25d1257..e5be303 100644 --- a/policy-F16.patch +++ b/policy-F16.patch @@ -5446,7 +5446,7 @@ index 00a19e3..9f6139c 100644 +/usr/libexec/gnome-system-monitor-mechanism -- gen_context(system_u:object_r:gnomesystemmm_exec_t,s0) +/usr/libexec/kde(3|4)/ksysguardprocesslist_helper -- gen_context(system_u:object_r:gnomesystemmm_exec_t,s0) diff --git a/policy/modules/apps/gnome.if b/policy/modules/apps/gnome.if -index f5afe78..9b1de02 100644 +index f5afe78..c57fc1e 100644 --- a/policy/modules/apps/gnome.if +++ b/policy/modules/apps/gnome.if @@ -1,44 +1,862 @@ @@ -6521,7 +6521,7 @@ index f5afe78..9b1de02 100644 ## ## ## -@@ -140,51 +1029,299 @@ interface(`gnome_domtrans_gconfd',` +@@ -140,51 +1029,298 @@ interface(`gnome_domtrans_gconfd',` ## ## # @@ -6715,7 +6715,6 @@ index f5afe78..9b1de02 100644 + allow gkeyringd_domain $1:fifo_file rw_inherited_fifo_file_perms; +') + -+ +######################################## +## +## Create gnome content in the user home directory @@ -7931,7 +7930,7 @@ index 93ac529..800b5c8 100644 + +/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0) diff --git a/policy/modules/apps/mozilla.if b/policy/modules/apps/mozilla.if -index fbb5c5a..e187982 100644 +index fbb5c5a..ffeec16 100644 --- a/policy/modules/apps/mozilla.if +++ b/policy/modules/apps/mozilla.if @@ -29,6 +29,8 @@ interface(`mozilla_role',` @@ -7943,7 +7942,7 @@ index fbb5c5a..e187982 100644 # Allow the user domain to signal/ps. ps_process_pattern($2, mozilla_t) allow $2 mozilla_t:process signal_perms; -@@ -49,8 +51,16 @@ interface(`mozilla_role',` +@@ -49,9 +51,19 @@ interface(`mozilla_role',` mozilla_run_plugin(mozilla_t, $1) mozilla_dbus_chat($2) @@ -7958,9 +7957,12 @@ index fbb5c5a..e187982 100644 + pulseaudio_filetrans_admin_home_content(mozilla_t) + pulseaudio_filetrans_home_content(mozilla_t) ') ++ ++ mozilla_filetrans_home_content($2) ') -@@ -109,7 +119,7 @@ interface(`mozilla_dontaudit_rw_user_home_files',` + ######################################## +@@ -109,7 +121,7 @@ interface(`mozilla_dontaudit_rw_user_home_files',` type mozilla_home_t; ') @@ -7969,7 +7971,7 @@ index fbb5c5a..e187982 100644 ') ######################################## -@@ -197,12 +207,29 @@ interface(`mozilla_domtrans',` +@@ -197,12 +209,31 @@ interface(`mozilla_domtrans',` # interface(`mozilla_domtrans_plugin',` gen_require(` @@ -7997,10 +7999,12 @@ index fbb5c5a..e187982 100644 + read_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t) + read_lnk_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t) + can_exec($1, mozilla_plugin_rw_t) ++ ++ #mozilla_filetrans_home_content($1) ') ######################################## -@@ -228,6 +255,27 @@ interface(`mozilla_run_plugin',` +@@ -228,6 +259,27 @@ interface(`mozilla_run_plugin',` mozilla_domtrans_plugin($1) role $2 types mozilla_plugin_t; @@ -8028,7 +8032,7 @@ index fbb5c5a..e187982 100644 ') ######################################## -@@ -269,9 +317,27 @@ interface(`mozilla_rw_tcp_sockets',` +@@ -269,9 +321,27 @@ interface(`mozilla_rw_tcp_sockets',` allow $1 mozilla_t:tcp_socket rw_socket_perms; ') @@ -8057,7 +8061,7 @@ index fbb5c5a..e187982 100644 ## ## ## -@@ -279,28 +345,48 @@ interface(`mozilla_rw_tcp_sockets',` +@@ -279,28 +349,79 @@ interface(`mozilla_rw_tcp_sockets',` ## ## # @@ -8113,6 +8117,37 @@ index fbb5c5a..e187982 100644 + allow $1 mozilla_plugin_rw_t:file manage_file_perms; + allow $1 mozilla_plugin_rw_t:dir rw_dir_perms; ') ++ ++######################################## ++## ++## Create mozilla content in the user home directory ++## with an correct label. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`mozilla_filetrans_home_content',` ++ ++ gen_require(` ++ type mozilla_home_t; ++ ') ++ ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".galeon") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".java") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".mozilla") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".thunderbird") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".netscape") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".phoenix") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".adobe") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".macromedia") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gnash") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gcjwebplugin") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".icedteaplugin") ++') ++ diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te index 2e9318b..bb90a3b 100644 --- a/policy/modules/apps/mozilla.te @@ -16430,7 +16465,7 @@ index 6a1e4d1..3ded83e 100644 + dontaudit $1 domain:socket_class_set { read write }; ') diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te -index fae1ab1..facd6a8 100644 +index fae1ab1..b3fbad5 100644 --- a/policy/modules/kernel/domain.te +++ b/policy/modules/kernel/domain.te @@ -4,6 +4,21 @@ policy_module(domain, 1.9.1) @@ -16531,7 +16566,7 @@ index fae1ab1..facd6a8 100644 # Create/access any System V IPC objects. allow unconfined_domain_type domain:{ sem msgq shm } *; -@@ -158,5 +199,219 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock }; +@@ -158,5 +199,223 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock }; # act on all domains keys allow unconfined_domain_type domain:key *; @@ -16595,6 +16630,10 @@ index fae1ab1..facd6a8 100644 +') + +optional_policy(` ++ mozilla_filetrans_home_content(unconfined_domain_type) ++') ++ ++optional_policy(` + networkmanager_filetrans_named_content(unconfined_domain_type) +') + @@ -23987,7 +24026,7 @@ index 0b827c5..d83d4dc 100644 + dontaudit $1 abrt_t:sock_file write; +') diff --git a/policy/modules/services/abrt.te b/policy/modules/services/abrt.te -index 30861ec..e203cd3 100644 +index 30861ec..939e294 100644 --- a/policy/modules/services/abrt.te +++ b/policy/modules/services/abrt.te @@ -5,7 +5,25 @@ policy_module(abrt, 1.2.0) @@ -24095,7 +24134,7 @@ index 30861ec..e203cd3 100644 # abrt var/cache files manage_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t) -@@ -82,10 +133,9 @@ manage_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t) +@@ -82,10 +133,10 @@ manage_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t) manage_dirs_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t) manage_sock_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t) manage_lnk_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t) @@ -24104,10 +24143,11 @@ index 30861ec..e203cd3 100644 kernel_read_ring_buffer(abrt_t) -kernel_read_system_state(abrt_t) ++kernel_request_load_module(abrt_t) kernel_rw_kernel_sysctl(abrt_t) corecmd_exec_bin(abrt_t) -@@ -104,6 +154,8 @@ corenet_tcp_connect_all_ports(abrt_t) +@@ -104,6 +155,8 @@ corenet_tcp_connect_all_ports(abrt_t) corenet_sendrecv_http_client_packets(abrt_t) dev_getattr_all_chr_files(abrt_t) @@ -24116,7 +24156,7 @@ index 30861ec..e203cd3 100644 dev_read_urand(abrt_t) dev_rw_sysfs(abrt_t) dev_dontaudit_read_raw_memory(abrt_t) -@@ -113,7 +165,8 @@ domain_read_all_domains_state(abrt_t) +@@ -113,7 +166,8 @@ domain_read_all_domains_state(abrt_t) domain_signull_all_domains(abrt_t) files_getattr_all_files(abrt_t) @@ -24126,7 +24166,7 @@ index 30861ec..e203cd3 100644 files_read_var_symlinks(abrt_t) files_read_var_lib_files(abrt_t) files_read_usr_files(abrt_t) -@@ -121,6 +174,8 @@ files_read_generic_tmp_files(abrt_t) +@@ -121,6 +175,8 @@ files_read_generic_tmp_files(abrt_t) files_read_kernel_modules(abrt_t) files_dontaudit_list_default(abrt_t) files_dontaudit_read_default_files(abrt_t) @@ -24135,7 +24175,7 @@ index 30861ec..e203cd3 100644 fs_list_inotifyfs(abrt_t) fs_getattr_all_fs(abrt_t) -@@ -131,22 +186,26 @@ fs_read_nfs_files(abrt_t) +@@ -131,22 +187,26 @@ fs_read_nfs_files(abrt_t) fs_read_nfs_symlinks(abrt_t) fs_search_all(abrt_t) @@ -24168,7 +24208,7 @@ index 30861ec..e203cd3 100644 ') optional_policy(` -@@ -167,6 +226,7 @@ optional_policy(` +@@ -167,6 +227,7 @@ optional_policy(` rpm_exec(abrt_t) rpm_dontaudit_manage_db(abrt_t) rpm_manage_cache(abrt_t) @@ -24176,7 +24216,7 @@ index 30861ec..e203cd3 100644 rpm_manage_pid_files(abrt_t) rpm_read_db(abrt_t) rpm_signull(abrt_t) -@@ -178,12 +238,35 @@ optional_policy(` +@@ -178,12 +239,35 @@ optional_policy(` ') optional_policy(` @@ -24213,7 +24253,7 @@ index 30861ec..e203cd3 100644 # allow abrt_helper_t self:capability { chown setgid sys_nice }; -@@ -200,23 +283,22 @@ files_var_filetrans(abrt_helper_t, abrt_var_cache_t, { file dir }) +@@ -200,23 +284,22 @@ files_var_filetrans(abrt_helper_t, abrt_var_cache_t, { file dir }) read_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t) read_lnk_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t) @@ -24242,7 +24282,7 @@ index 30861ec..e203cd3 100644 userdom_dontaudit_read_user_home_content_files(abrt_helper_t) userdom_dontaudit_read_user_tmp_files(abrt_helper_t) dev_dontaudit_read_all_blk_files(abrt_helper_t) -@@ -224,4 +306,128 @@ ifdef(`hide_broken_symptoms', ` +@@ -224,4 +307,128 @@ ifdef(`hide_broken_symptoms', ` dev_dontaudit_write_all_chr_files(abrt_helper_t) dev_dontaudit_write_all_blk_files(abrt_helper_t) fs_dontaudit_rw_anon_inodefs_files(abrt_helper_t) @@ -28274,10 +28314,10 @@ index 0000000..9fe3f9e +') diff --git a/policy/modules/services/boinc.te b/policy/modules/services/boinc.te new file mode 100644 -index 0000000..61db909 +index 0000000..788087e --- /dev/null +++ b/policy/modules/services/boinc.te -@@ -0,0 +1,178 @@ +@@ -0,0 +1,173 @@ +policy_module(boinc, 1.0.0) + +######################################## @@ -28285,6 +28325,8 @@ index 0000000..61db909 +# Declarations +# + ++attribute boinc_domain; ++ +type boinc_t; +type boinc_exec_t; +init_daemon_domain(boinc_t, boinc_exec_t) @@ -28311,6 +28353,37 @@ index 0000000..61db909 +type boinc_project_var_lib_t; +files_type(boinc_project_var_lib_t) + ++####################################### ++# ++# boinc domain local policy ++# ++ ++allow boinc_domain self:fifo_file rw_fifo_file_perms; ++allow boinc_domain self:sem create_sem_perms; ++ ++# needs read /proc/interrupts ++kernel_read_system_state(boinc_domain) ++ ++corecmd_exec_bin(boinc_domain) ++corecmd_exec_shell(boinc_domain) ++ ++dev_read_rand(boinc_domain) ++dev_read_urand(boinc_domain) ++dev_read_sysfs(boinc_domain) ++ ++domain_read_all_domains_state(boinc_domain) ++ ++files_read_etc_files(boinc_domain) ++files_read_etc_runtime_files(boinc_domain) ++files_read_usr_files(boinc_domain) ++ ++miscfiles_read_fonts(boinc_domain) ++miscfiles_read_localization(boinc_domain) ++ ++optional_policy(` ++ sysnet_dns_name_resolve(boinc_domain) ++') ++ +######################################## +# +# boinc local policy @@ -28319,10 +28392,8 @@ index 0000000..61db909 +allow boinc_t self:capability { kill }; +allow boinc_t self:process { setsched sigkill }; + -+allow boinc_t self:fifo_file rw_fifo_file_perms; +allow boinc_t self:unix_stream_socket create_stream_socket_perms; +allow boinc_t self:tcp_socket create_stream_socket_perms; -+allow boinc_t self:sem create_sem_perms; +allow boinc_t self:shm create_shm_perms; + +manage_dirs_pattern(boinc_t, boinc_tmp_t, boinc_tmp_t) @@ -28340,15 +28411,9 @@ index 0000000..61db909 +manage_dirs_pattern(boinc_t, boinc_project_var_lib_t, boinc_project_var_lib_t) +manage_files_pattern(boinc_t, boinc_project_var_lib_t, boinc_project_var_lib_t) + -+# needs read /proc/interrupts -+kernel_read_system_state(boinc_t) -+ +files_getattr_all_dirs(boinc_t) +files_getattr_all_files(boinc_t) + -+corecmd_exec_bin(boinc_t) -+corecmd_exec_shell(boinc_t) -+ +corenet_all_recvfrom_unlabeled(boinc_t) +corenet_all_recvfrom_netlabel(boinc_t) +corenet_tcp_sendrecv_generic_if(boinc_t) @@ -28365,18 +28430,8 @@ index 0000000..61db909 +corenet_tcp_connect_http_port(boinc_t) +corenet_tcp_connect_http_cache_port(boinc_t) + -+dev_list_sysfs(boinc_t) -+dev_read_rand(boinc_t) -+dev_read_urand(boinc_t) -+dev_read_sysfs(boinc_t) -+ -+domain_read_all_domains_state(boinc_t) -+ +files_dontaudit_getattr_boot_dirs(boinc_t) + -+files_read_etc_files(boinc_t) -+files_read_usr_files(boinc_t) -+ +fs_getattr_all_fs(boinc_t) + +term_getattr_all_ptys(boinc_t) @@ -28384,14 +28439,11 @@ index 0000000..61db909 + +init_read_utmp(boinc_t) + -+miscfiles_read_localization(boinc_t) -+miscfiles_read_generic_certs(boinc_t) -+ +logging_send_syslog_msg(boinc_t) + -+sysnet_dns_name_resolve(boinc_t) -+ -+mta_send_mail(boinc_t) ++optional_policy(` ++ mta_send_mail(boinc_t) ++') + +######################################## +# @@ -28408,9 +28460,6 @@ index 0000000..61db909 + allow boinc_project_t self:process ptrace; +') + -+allow boinc_project_t self:fifo_file rw_fifo_file_perms; -+allow boinc_project_t self:sem create_sem_perms; -+ +manage_dirs_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t) +manage_files_pattern(boinc_project_t, boinc_project_tmp_t, boinc_project_tmp_t) +files_tmp_filetrans(boinc_project_t, boinc_project_tmp_t, { dir file }) @@ -28429,29 +28478,15 @@ index 0000000..61db909 +list_dirs_pattern(boinc_project_t, boinc_var_lib_t, boinc_var_lib_t) +rw_files_pattern(boinc_project_t, boinc_var_lib_t, boinc_var_lib_t) + -+kernel_read_system_state(boinc_project_t) +kernel_read_kernel_sysctls(boinc_project_t) +kernel_search_vm_sysctl(boinc_project_t) +kernel_read_network_state(boinc_project_t) + -+corecmd_exec_bin(boinc_project_t) -+corecmd_exec_shell(boinc_project_t) -+ +corenet_tcp_connect_boinc_port(boinc_project_t) + -+domain_read_all_domains_state(boinc_project_t) -+ -+dev_read_rand(boinc_project_t) -+dev_read_urand(boinc_project_t) -+dev_read_sysfs(boinc_project_t) +dev_rw_xserver_misc(boinc_project_t) + -+files_read_etc_files(boinc_project_t) -+files_read_etc_runtime_files(boinc_project_t) -+files_read_usr_files(boinc_project_t) -+ -+miscfiles_read_fonts(boinc_project_t) -+miscfiles_read_localization(boinc_project_t) ++files_dontaudit_search_home(boinc_project_t) + +optional_policy(` + java_exec(boinc_project_t) @@ -46347,7 +46382,7 @@ index c358d8f..7c097ec 100644 init_labeled_script_domtrans($1, munin_initrc_exec_t) domain_system_change_exemption($1) diff --git a/policy/modules/services/munin.te b/policy/modules/services/munin.te -index f17583b..9850f4d 100644 +index f17583b..171ebec 100644 --- a/policy/modules/services/munin.te +++ b/policy/modules/services/munin.te @@ -5,6 +5,8 @@ policy_module(munin, 1.8.0) @@ -46442,7 +46477,7 @@ index f17583b..9850f4d 100644 sysnet_read_config(disk_munin_plugin_t) -@@ -221,19 +231,17 @@ rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) +@@ -221,19 +231,23 @@ rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) dev_read_urand(mail_munin_plugin_t) @@ -46452,10 +46487,19 @@ index f17583b..9850f4d 100644 - logging_read_generic_logs(mail_munin_plugin_t) - mta_read_config(mail_munin_plugin_t) - mta_send_mail(mail_munin_plugin_t) -+mta_list_queue(mail_munin_plugin_t) - mta_read_queue(mail_munin_plugin_t) +-mta_read_config(mail_munin_plugin_t) +-mta_send_mail(mail_munin_plugin_t) +-mta_read_queue(mail_munin_plugin_t) ++optional_policy(` ++ mta_read_config(mail_munin_plugin_t) ++ mta_send_mail(mail_munin_plugin_t) ++ mta_list_queue(mail_munin_plugin_t) ++ mta_read_queue(mail_munin_plugin_t) ++') ++ ++optional_policy(` ++ nscd_socket_use(mail_munin_plugin_t) ++') optional_policy(` postfix_read_config(mail_munin_plugin_t) @@ -46464,7 +46508,7 @@ index f17583b..9850f4d 100644 ') optional_policy(` -@@ -245,6 +253,8 @@ optional_policy(` +@@ -245,6 +259,8 @@ optional_policy(` # local policy for service plugins # @@ -46473,7 +46517,7 @@ index f17583b..9850f4d 100644 allow services_munin_plugin_t self:tcp_socket create_stream_socket_perms; allow services_munin_plugin_t self:udp_socket create_socket_perms; allow services_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms; -@@ -255,13 +265,10 @@ corenet_tcp_connect_http_port(services_munin_plugin_t) +@@ -255,13 +271,10 @@ corenet_tcp_connect_http_port(services_munin_plugin_t) dev_read_urand(services_munin_plugin_t) dev_read_rand(services_munin_plugin_t) @@ -46488,7 +46532,18 @@ index f17583b..9850f4d 100644 cups_stream_connect(services_munin_plugin_t) ') -@@ -286,6 +293,10 @@ optional_policy(` +@@ -279,6 +292,10 @@ optional_policy(` + ') + + optional_policy(` ++ nscd_socket_use(services_munin_plugin_t) ++') ++ ++optional_policy(` + postgresql_stream_connect(services_munin_plugin_t) + ') + +@@ -286,6 +303,10 @@ optional_policy(` snmp_read_snmp_var_lib_files(services_munin_plugin_t) ') @@ -46499,7 +46554,7 @@ index f17583b..9850f4d 100644 ################################## # # local policy for system plugins -@@ -295,13 +306,12 @@ allow system_munin_plugin_t self:udp_socket create_socket_perms; +@@ -295,13 +316,12 @@ allow system_munin_plugin_t self:udp_socket create_socket_perms; rw_files_pattern(system_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) @@ -46516,7 +46571,7 @@ index f17583b..9850f4d 100644 dev_read_sysfs(system_munin_plugin_t) dev_read_urand(system_munin_plugin_t) -@@ -313,3 +323,31 @@ init_read_utmp(system_munin_plugin_t) +@@ -313,3 +333,31 @@ init_read_utmp(system_munin_plugin_t) sysnet_exec_ifconfig(system_munin_plugin_t) term_getattr_unallocated_ttys(system_munin_plugin_t) @@ -62829,7 +62884,7 @@ index 8294f6f..4847b43 100644 /var/lib/tgtd(/.*)? gen_context(system_u:object_r:tgtd_var_lib_t,s0) +/var/run/tgtd.* -s gen_context(system_u:object_r:tgtd_var_run_t,s0) diff --git a/policy/modules/services/tgtd.te b/policy/modules/services/tgtd.te -index 665bf7c..d100080 100644 +index 665bf7c..a1ea37a 100644 --- a/policy/modules/services/tgtd.te +++ b/policy/modules/services/tgtd.te @@ -21,6 +21,9 @@ files_tmpfs_file(tgtd_tmpfs_t) @@ -62851,7 +62906,7 @@ index 665bf7c..d100080 100644 allow tgtd_t self:shm create_shm_perms; allow tgtd_t self:sem create_sem_perms; allow tgtd_t self:tcp_socket create_stream_socket_perms; -@@ -46,6 +49,11 @@ manage_dirs_pattern(tgtd_t, tgtd_var_lib_t, tgtd_var_lib_t) +@@ -46,6 +49,12 @@ manage_dirs_pattern(tgtd_t, tgtd_var_lib_t, tgtd_var_lib_t) manage_files_pattern(tgtd_t, tgtd_var_lib_t, tgtd_var_lib_t) files_var_lib_filetrans(tgtd_t, tgtd_var_lib_t, { dir file }) @@ -62860,10 +62915,11 @@ index 665bf7c..d100080 100644 +manage_sock_files_pattern(tgtd_t, tgtd_var_run_t,tgtd_var_run_t) +files_pid_filetrans(tgtd_t,tgtd_var_run_t, { file sock_file }) + ++kernel_read_system_state(tgtd_t) kernel_read_fs_sysctls(tgtd_t) corenet_all_recvfrom_netlabel(tgtd_t) -@@ -57,10 +65,18 @@ corenet_tcp_bind_generic_node(tgtd_t) +@@ -57,10 +66,18 @@ corenet_tcp_bind_generic_node(tgtd_t) corenet_tcp_bind_iscsi_port(tgtd_t) corenet_sendrecv_iscsi_server_packets(tgtd_t) diff --git a/selinux-policy.spec b/selinux-policy.spec index 503daba..54e97bc 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -17,7 +17,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.10.0 -Release: 67%{?dist} +Release: 68%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -470,6 +470,15 @@ SELinux Reference policy mls base module. %endif %changelog +* Tue Dec 13 2011 Miroslav Grepl 3.10.0-68 +- Allow abrt to request the kernel to load a module +- Make sure mozilla content is labeled correctly +- Allow tgtd to read system state +- More fixes for boinc + * allow to resolve dns name + * re-write boinc policy to use boinc_domain attribute +- Allow munin services plugins to use NSCD services + * Thu Dec 8 2011 Miroslav Grepl 3.10.0-67 - Allow mozilla_plugin_t to manage mozilla_home_t - Allow ssh derived domain to execute ssh-keygen in the ssh_keygen_t domain