rpms/selinux-policy/F-12 policy-20100106.patch, 1.67, 1.68 selinux-policy.spec, 1.1052, 1.1053
Miroslav Grepl
mgrepl at fedoraproject.org
Fri Jun 4 10:51:21 UTC 2010
Author: mgrepl
Update of /cvs/pkgs/rpms/selinux-policy/F-12
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv2371
Modified Files:
policy-20100106.patch selinux-policy.spec
Log Message:
- Fixes for abrt
policy-20100106.patch:
config/appconfig-mcs/x_contexts | 109 ----
config/appconfig-mls/x_contexts | 109 ----
config/appconfig-standard/x_contexts | 109 ----
policy/flask/access_vectors | 55 +-
policy/flask/security_classes | 4
policy/mcs | 31 -
policy/modules/admin/alsa.te | 2
policy/modules/admin/consoletype.if | 4
policy/modules/admin/dmesg.fc | 1
policy/modules/admin/logrotate.te | 13
policy/modules/admin/logwatch.te | 5
policy/modules/admin/mcelog.fc | 2
policy/modules/admin/mcelog.if | 20
policy/modules/admin/mcelog.te | 33 +
policy/modules/admin/netutils.fc | 1
policy/modules/admin/netutils.te | 7
policy/modules/admin/prelink.te | 3
policy/modules/admin/quota.te | 1
policy/modules/admin/readahead.te | 3
policy/modules/admin/rpm.if | 62 ++
policy/modules/admin/rpm.te | 2
policy/modules/admin/shorewall.te | 4
policy/modules/admin/shutdown.fc | 5
policy/modules/admin/shutdown.if | 100 ++++
policy/modules/admin/shutdown.te | 57 ++
policy/modules/admin/smoltclient.te | 2
policy/modules/admin/tzdata.te | 1
policy/modules/admin/usermanage.te | 8
policy/modules/admin/vbetool.te | 13
policy/modules/admin/vpn.if | 18
policy/modules/admin/vpn.te | 7
policy/modules/apps/cdrecord.te | 2
policy/modules/apps/chrome.fc | 2
policy/modules/apps/chrome.if | 5
policy/modules/apps/chrome.te | 16
policy/modules/apps/execmem.if | 10
policy/modules/apps/firewallgui.te | 6
policy/modules/apps/gnome.fc | 9
policy/modules/apps/gnome.if | 99 +++-
policy/modules/apps/gnome.te | 8
policy/modules/apps/gpg.fc | 2
policy/modules/apps/gpg.if | 38 +
policy/modules/apps/gpg.te | 45 +
policy/modules/apps/java.if | 1
policy/modules/apps/java.te | 1
policy/modules/apps/kdumpgui.te | 4
policy/modules/apps/livecd.if | 57 ++
policy/modules/apps/livecd.te | 9
policy/modules/apps/mono.if | 4
policy/modules/apps/mozilla.fc | 1
policy/modules/apps/mozilla.if | 36 +
policy/modules/apps/nsplugin.fc | 1
policy/modules/apps/nsplugin.if | 40 +
policy/modules/apps/nsplugin.te | 10
policy/modules/apps/openoffice.if | 1
policy/modules/apps/podsleuth.te | 1
policy/modules/apps/ptchown.te | 1
policy/modules/apps/pulseaudio.fc | 8
policy/modules/apps/pulseaudio.if | 70 ++
policy/modules/apps/pulseaudio.te | 43 +
policy/modules/apps/qemu.te | 1
policy/modules/apps/sambagui.te | 4
policy/modules/apps/sandbox.if | 118 ++++
policy/modules/apps/sandbox.te | 67 +-
policy/modules/apps/slocate.te | 3
policy/modules/apps/vmware.if | 18
policy/modules/apps/vmware.te | 14
policy/modules/apps/wine.if | 5
policy/modules/apps/wine.te | 18
policy/modules/apps/wm.if | 16
policy/modules/kernel/corecommands.fc | 8
policy/modules/kernel/corenetwork.if.in | 279 ++++++++++-
policy/modules/kernel/corenetwork.te.in | 62 +-
policy/modules/kernel/corenetwork.te.m4 | 19
policy/modules/kernel/devices.fc | 5
policy/modules/kernel/devices.if | 343 ++++++++++++-
policy/modules/kernel/devices.te | 25 -
policy/modules/kernel/domain.if | 24
policy/modules/kernel/domain.te | 6
policy/modules/kernel/files.fc | 6
policy/modules/kernel/files.if | 370 ++++++++++++---
policy/modules/kernel/files.te | 7
policy/modules/kernel/filesystem.if | 212 ++++++++
policy/modules/kernel/filesystem.te | 12
policy/modules/kernel/kernel.if | 54 ++
policy/modules/kernel/mcs.if | 40 +
policy/modules/kernel/mcs.te | 2
policy/modules/kernel/storage.if | 20
policy/modules/kernel/terminal.if | 247 +++++++++-
policy/modules/roles/auditadm.te | 2
policy/modules/roles/secadm.te | 2
policy/modules/roles/staff.te | 22
policy/modules/roles/sysadm.te | 12
policy/modules/roles/unconfineduser.fc | 5
policy/modules/roles/unconfineduser.te | 17
policy/modules/roles/unprivuser.te | 2
policy/modules/roles/xguest.te | 7
policy/modules/services/abrt.fc | 4
policy/modules/services/abrt.if | 5
policy/modules/services/abrt.te | 30 +
policy/modules/services/afs.te | 11
policy/modules/services/aisexec.fc | 2
policy/modules/services/aisexec.te | 8
policy/modules/services/amavis.te | 1
policy/modules/services/apache.fc | 12
policy/modules/services/apache.if | 129 +++++
policy/modules/services/apache.te | 61 ++
policy/modules/services/apcupsd.te | 6
policy/modules/services/arpwatch.te | 2
policy/modules/services/asterisk.if | 19
policy/modules/services/asterisk.te | 3
policy/modules/services/avahi.fc | 2
policy/modules/services/avahi.if | 1
policy/modules/services/avahi.te | 4
policy/modules/services/bind.if | 19
policy/modules/services/bluetooth.te | 2
policy/modules/services/cachefilesd.fc | 28 +
policy/modules/services/cachefilesd.if | 41 +
policy/modules/services/cachefilesd.te | 146 +++++
policy/modules/services/ccs.te | 6
policy/modules/services/chronyd.fc | 2
policy/modules/services/chronyd.if | 22
policy/modules/services/chronyd.te | 22
policy/modules/services/clamav.te | 2
policy/modules/services/clogd.if | 24
policy/modules/services/clogd.te | 7
policy/modules/services/cobbler.fc | 5
policy/modules/services/cobbler.if | 156 ++++++
policy/modules/services/cobbler.te | 132 +++++
policy/modules/services/consolekit.te | 19
policy/modules/services/corosync.fc | 3
policy/modules/services/corosync.te | 15
policy/modules/services/cron.if | 18
policy/modules/services/cron.te | 9
policy/modules/services/cups.te | 8
policy/modules/services/dbus.if | 7
policy/modules/services/dcc.te | 2
policy/modules/services/denyhosts.fc | 7
policy/modules/services/denyhosts.if | 87 +++
policy/modules/services/denyhosts.te | 76 +++
policy/modules/services/devicekit.fc | 4
policy/modules/services/devicekit.te | 14
policy/modules/services/dhcp.if | 19
policy/modules/services/dhcp.te | 4
policy/modules/services/djbdns.if | 38 +
policy/modules/services/djbdns.te | 8
policy/modules/services/dnsmasq.fc | 2
policy/modules/services/dnsmasq.if | 38 +
policy/modules/services/dnsmasq.te | 8
policy/modules/services/dovecot.te | 6
policy/modules/services/exim.if | 18
policy/modules/services/fail2ban.if | 18
policy/modules/services/ftp.fc | 2
policy/modules/services/ftp.if | 37 +
policy/modules/services/ftp.te | 116 ++++
policy/modules/services/git.fc | 17
policy/modules/services/git.if | 466 ++++++++++++++----
policy/modules/services/git.te | 145 +++--
policy/modules/services/gpm.fc | 2
policy/modules/services/gpsd.if | 21
policy/modules/services/gpsd.te | 4
policy/modules/services/hal.if | 18
policy/modules/services/hal.te | 36 +
policy/modules/services/inn.te | 2
policy/modules/services/kerberos.if | 21
policy/modules/services/ksmtuned.te | 9
policy/modules/services/ldap.fc | 3
policy/modules/services/ldap.if | 24
policy/modules/services/ldap.te | 13
policy/modules/services/likewise.fc | 54 ++
policy/modules/services/likewise.if | 105 ++++
policy/modules/services/likewise.te | 247 ++++++++++
policy/modules/services/lircd.te | 9
policy/modules/services/mailman.te | 1
policy/modules/services/memcached.te | 14
policy/modules/services/modemmanager.te | 2
policy/modules/services/mta.if | 41 +
policy/modules/services/mta.te | 6
policy/modules/services/munin.fc | 55 ++
policy/modules/services/munin.if | 66 ++
policy/modules/services/munin.te | 165 ++++++
policy/modules/services/mysql.te | 8
policy/modules/services/nagios.fc | 46 +
policy/modules/services/nagios.if | 46 +
policy/modules/services/nagios.te | 97 +++
policy/modules/services/networkmanager.fc | 1
policy/modules/services/networkmanager.if | 19
policy/modules/services/networkmanager.te | 5
policy/modules/services/nis.fc | 5
policy/modules/services/nis.te | 8
policy/modules/services/ntp.te | 2
policy/modules/services/nut.te | 11
policy/modules/services/nx.if | 18
policy/modules/services/openvpn.te | 11
policy/modules/services/plymouth.fc | 5
policy/modules/services/plymouth.if | 304 ------------
policy/modules/services/plymouth.te | 102 ----
policy/modules/services/plymouthd.fc | 9
policy/modules/services/plymouthd.if | 322 +++++++++++++
policy/modules/services/plymouthd.te | 108 ++++
policy/modules/services/policykit.te | 23
policy/modules/services/postfix.if | 37 +
policy/modules/services/postfix.te | 9
policy/modules/services/ppp.fc | 2
policy/modules/services/ppp.if | 20
policy/modules/services/ppp.te | 9
policy/modules/services/prelude.te | 2
policy/modules/services/qmail.if | 18
policy/modules/services/qpidd.fc | 9
policy/modules/services/qpidd.if | 236 +++++++++
policy/modules/services/qpidd.te | 61 ++
policy/modules/services/rgmanager.if | 40 +
policy/modules/services/rgmanager.te | 58 +-
policy/modules/services/rhcs.fc | 9
policy/modules/services/rhcs.if | 58 ++
policy/modules/services/rhcs.te | 279 ++---------
policy/modules/services/ricci.te | 8
policy/modules/services/rpc.if | 1
policy/modules/services/rpc.te | 8
policy/modules/services/rsync.if | 38 +
policy/modules/services/rsync.te | 1
policy/modules/services/samba.te | 20
policy/modules/services/sasl.te | 2
policy/modules/services/sendmail.te | 4
policy/modules/services/setroubleshoot.te | 4
policy/modules/services/snmp.te | 6
policy/modules/services/snort.te | 3
policy/modules/services/spamassassin.if | 18
policy/modules/services/spamassassin.te | 6
policy/modules/services/squid.te | 12
policy/modules/services/ssh.if | 4
policy/modules/services/ssh.te | 84 ---
policy/modules/services/sssd.fc | 4
policy/modules/services/sssd.if | 85 ++-
policy/modules/services/sssd.te | 20
policy/modules/services/tftp.if | 20
policy/modules/services/tftp.te | 1
policy/modules/services/tgtd.te | 3
policy/modules/services/tor.fc | 1
policy/modules/services/tuned.fc | 3
policy/modules/services/tuned.te | 15
policy/modules/services/ucspitcp.te | 5
policy/modules/services/usbmuxd.fc | 6
policy/modules/services/usbmuxd.if | 64 ++
policy/modules/services/usbmuxd.te | 51 ++
policy/modules/services/varnishd.if | 19
policy/modules/services/virt.if | 11
policy/modules/services/virt.te | 26 -
policy/modules/services/xserver.fc | 18
policy/modules/services/xserver.if | 738 ++++++++++--------------------
policy/modules/services/xserver.te | 392 ++++++++-------
policy/modules/system/application.te | 16
policy/modules/system/authlogin.if | 4
policy/modules/system/daemontools.if | 62 ++
policy/modules/system/daemontools.te | 26 -
policy/modules/system/fstools.fc | 2
policy/modules/system/hostname.te | 7
policy/modules/system/hotplug.te | 4
policy/modules/system/init.if | 38 +
policy/modules/system/init.te | 32 +
policy/modules/system/ipsec.te | 13
policy/modules/system/iptables.if | 10
policy/modules/system/iptables.te | 6
policy/modules/system/iscsi.fc | 3
policy/modules/system/iscsi.te | 10
policy/modules/system/libraries.fc | 38 +
policy/modules/system/locallogin.te | 22
policy/modules/system/logging.fc | 9
policy/modules/system/logging.if | 18
policy/modules/system/logging.te | 10
policy/modules/system/lvm.fc | 1
policy/modules/system/lvm.if | 4
policy/modules/system/lvm.te | 6
policy/modules/system/miscfiles.fc | 7
policy/modules/system/miscfiles.if | 37 +
policy/modules/system/modutils.te | 2
policy/modules/system/mount.if | 56 ++
policy/modules/system/mount.te | 58 ++
policy/modules/system/selinuxutil.if | 21
policy/modules/system/selinuxutil.te | 25 -
policy/modules/system/sosreport.fc | 2
policy/modules/system/sosreport.if | 74 +++
policy/modules/system/sosreport.te | 129 +++++
policy/modules/system/sysnetwork.fc | 3
policy/modules/system/sysnetwork.if | 4
policy/modules/system/sysnetwork.te | 4
policy/modules/system/udev.te | 5
policy/modules/system/unconfined.if | 2
policy/modules/system/userdomain.fc | 2
policy/modules/system/userdomain.if | 45 +
policy/modules/system/userdomain.te | 4
policy/modules/system/xen.if | 2
policy/modules/system/xen.te | 22
policy/support/obj_perm_sets.spt | 11
policy/users | 2
295 files changed, 8543 insertions(+), 2451 deletions(-)
Index: policy-20100106.patch
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/policy-20100106.patch,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -p -r1.67 -r1.68
--- policy-20100106.patch 31 May 2010 16:15:53 -0000 1.67
+++ policy-20100106.patch 4 Jun 2010 10:51:20 -0000 1.68
@@ -6132,7 +6132,7 @@ diff -b -B --ignore-all-space --exclude-
corenet_all_recvfrom_netlabel(xguest_usertype)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/abrt.fc serefpolicy-3.6.32/policy/modules/services/abrt.fc
--- nsaserefpolicy/policy/modules/services/abrt.fc 2010-01-18 18:24:22.725543271 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/abrt.fc 2010-05-31 18:07:17.167111902 +0200
++++ serefpolicy-3.6.32/policy/modules/services/abrt.fc 2010-06-04 12:24:49.891425944 +0200
@@ -13,5 +13,7 @@
/var/log/abrt-logger -- gen_context(system_u:object_r:abrt_var_log_t,s0)
@@ -6141,7 +6141,7 @@ diff -b -B --ignore-all-space --exclude-
+/var/run/abrtd?\.lock -- gen_context(system_u:object_r:abrt_var_run_t,s0)
/var/run/abrt(/.*)? gen_context(system_u:object_r:abrt_var_run_t,s0)
+
-+var/spool/abrt(/.*)? gen_context(system_u:object_r:abrt_var_cache_t,s0)
++/var/spool/abrt(/.*)? gen_context(system_u:object_r:abrt_var_cache_t,s0)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/abrt.if serefpolicy-3.6.32/policy/modules/services/abrt.if
--- nsaserefpolicy/policy/modules/services/abrt.if 2010-01-18 18:24:22.726539977 +0100
+++ serefpolicy-3.6.32/policy/modules/services/abrt.if 2010-02-01 21:01:00.945160840 +0100
@@ -6159,8 +6159,16 @@ diff -b -B --ignore-all-space --exclude-
######################################
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/abrt.te serefpolicy-3.6.32/policy/modules/services/abrt.te
--- nsaserefpolicy/policy/modules/services/abrt.te 2010-01-18 18:24:22.727540243 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/abrt.te 2010-05-31 17:54:25.188362074 +0200
-@@ -96,16 +96,19 @@
++++ serefpolicy-3.6.32/policy/modules/services/abrt.te 2010-06-04 12:25:03.267409676 +0200
+@@ -77,6 +77,7 @@
+ manage_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
+ manage_lnk_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
+ files_var_filetrans(abrt_t, abrt_var_cache_t, { file dir })
++files_spool_filetrans(abrt_t, abrt_var_cache_t, dir)
+
+ # abrt pid files
+ manage_dirs_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t)
+@@ -96,16 +97,19 @@
corenet_tcp_connect_ftp_port(abrt_t)
corenet_tcp_connect_all_ports(abrt_t)
@@ -6181,7 +6189,7 @@ diff -b -B --ignore-all-space --exclude-
files_read_usr_files(abrt_t)
files_read_generic_tmp_files(abrt_t)
files_read_kernel_modules(abrt_t)
-@@ -119,6 +122,7 @@
+@@ -119,6 +123,7 @@
fs_read_fusefs_files(abrt_t)
fs_read_noxattr_fs_files(abrt_t)
fs_read_nfs_files(abrt_t)
@@ -6189,7 +6197,7 @@ diff -b -B --ignore-all-space --exclude-
fs_search_all(abrt_t)
sysnet_read_config(abrt_t)
-@@ -173,9 +177,23 @@
+@@ -173,9 +178,23 @@
')
optional_policy(`
@@ -6213,7 +6221,7 @@ diff -b -B --ignore-all-space --exclude-
permissive abrt_t;
########################################
-@@ -183,12 +201,13 @@
+@@ -183,12 +202,13 @@
# abrt--helper local policy
#
@@ -6228,7 +6236,7 @@ diff -b -B --ignore-all-space --exclude-
manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_lnk_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
-@@ -200,10 +219,16 @@
+@@ -200,10 +220,16 @@
files_read_etc_files(abrt_helper_t)
files_dontaudit_all_non_security_leaks(abrt_helper_t)
@@ -11098,7 +11106,7 @@ diff -b -B --ignore-all-space --exclude-
')
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/nagios.te serefpolicy-3.6.32/policy/modules/services/nagios.te
--- nsaserefpolicy/policy/modules/services/nagios.te 2010-01-18 18:24:22.823530245 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/nagios.te 2010-05-31 17:44:49.383361808 +0200
++++ serefpolicy-3.6.32/policy/modules/services/nagios.te 2010-06-04 12:26:22.209409594 +0200
@@ -45,10 +45,18 @@
type nrpe_var_run_t;
files_pid_file(nrpe_var_run_t)
@@ -11168,20 +11176,16 @@ diff -b -B --ignore-all-space --exclude-
auth_use_nsswitch(nagios_t)
logging_send_syslog_msg(nagios_t)
-@@ -148,12 +156,6 @@
+@@ -148,8 +156,6 @@
mta_send_mail(nagios_t)
optional_policy(`
- netutils_domtrans_ping(nagios_t)
- netutils_signal_ping(nagios_t)
-- netutils_kill_ping(nagios_t)
--')
--
--optional_policy(`
- seutil_sigchld_newrole(nagios_t)
+ netutils_kill_ping(nagios_t)
')
-@@ -253,6 +255,11 @@
+@@ -253,6 +259,11 @@
')
optional_policy(`
@@ -11193,7 +11197,7 @@ diff -b -B --ignore-all-space --exclude-
seutil_sigchld_newrole(nrpe_t)
')
-@@ -264,6 +271,66 @@
+@@ -264,6 +275,66 @@
udev_read_db(nrpe_t)
')
@@ -11260,7 +11264,7 @@ diff -b -B --ignore-all-space --exclude-
######################################
#
-@@ -290,6 +357,8 @@
+@@ -290,6 +361,8 @@
allow nagios_services_plugin_t self:tcp_socket create_stream_socket_perms;
allow nagios_services_plugin_t self:udp_socket create_socket_perms;
@@ -11269,7 +11273,7 @@ diff -b -B --ignore-all-space --exclude-
corecmd_exec_bin(nagios_services_plugin_t)
corenet_tcp_connect_all_ports(nagios_services_plugin_t)
-@@ -309,12 +378,18 @@
+@@ -309,12 +382,18 @@
optional_policy(`
netutils_domtrans_ping(nagios_services_plugin_t)
@@ -17826,7 +17830,7 @@ diff -b -B --ignore-all-space --exclude-
domain_read_all_domains_state(iscsid_t)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.fc serefpolicy-3.6.32/policy/modules/system/libraries.fc
--- nsaserefpolicy/policy/modules/system/libraries.fc 2010-01-18 18:24:22.945540594 +0100
-+++ serefpolicy-3.6.32/policy/modules/system/libraries.fc 2010-05-21 14:17:19.115390020 +0200
++++ serefpolicy-3.6.32/policy/modules/system/libraries.fc 2010-06-04 12:30:12.835158677 +0200
@@ -69,6 +69,8 @@
/opt/Acrobat[5-9]/Reader/intellinux/plugins/.*\.api -- gen_context(system_u:object_r:lib_t,s0)
@@ -17897,7 +17901,16 @@ diff -b -B --ignore-all-space --exclude-
/usr/lib(64)?/libSDL-.*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/xulrunner-[^/]*/libgtkembedmoz\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?/xulrunner-[^/]*/libxul\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -432,9 +437,26 @@
+@@ -411,7 +416,7 @@
+ /usr/lib(64)?/php/modules/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib(64)?/xorg/modules/dri/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/X11R6/lib/modules/dri/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+-/usr/lib(64)?/dri/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
++#/usr/lib(64)?/dri/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ /usr/lib(64)?/httpd/modules/libphp5\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+ ')
+ /opt/Komodo-Edit-5/lib/python/lib/python2.6/lib-dynload/.*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+@@ -432,9 +437,28 @@
/usr/lib(64)?/octagaplayer/libapplication\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
@@ -17915,9 +17928,11 @@ diff -b -B --ignore-all-space --exclude-
/usr/lib(64)?/libGLcore\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+/usr/lib(64)?/libGTL.*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+
-+/usr/lib(64)?/libkmplayercommon\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/lib(64)?/dri/.+\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/lib(64)?/libkmplayercommon\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+/usr/lib(64)?/libgpac\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+/usr/lib(64)?/transcode/filter_yuvdenoise\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/lib(64)?/sane/libsane-epkowa.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+/usr/lib(64)?/vdpau/libvdpau_nvidia\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+
+/usr/local/lexmark/lxk08/lib(/.*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/selinux-policy.spec,v
retrieving revision 1.1052
retrieving revision 1.1053
diff -u -p -r1.1052 -r1.1053
--- selinux-policy.spec 31 May 2010 16:15:58 -0000 1.1052
+++ selinux-policy.spec 4 Jun 2010 10:51:21 -0000 1.1053
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.6.32
-Release: 117%{?dist}
+Release: 118%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -469,6 +469,9 @@ exit 0
%endif
%changelog
+* Fri Jun 4 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-118
+- Fixes for abrt
+
* Mon May 31 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-117
- Fixes for nagios
More information about the scm-commits
mailing list