rpms/selinux-policy/F-12 policy-20100106.patch, 1.65, 1.66 selinux-policy.spec, 1.1050, 1.1051 sources, 1.207, 1.208

Miroslav Grepl mgrepl at fedoraproject.org
Fri May 21 12:53:36 UTC 2010


Author: mgrepl

Update of /cvs/pkgs/rpms/selinux-policy/F-12
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv14371

Modified Files:
	policy-20100106.patch selinux-policy.spec sources 
Log Message:
- Allow denyhosts to connect to tcp port 9911
- Fixes for munin



policy-20100106.patch:
 config/appconfig-mcs/x_contexts           |  109 ----
 config/appconfig-mls/x_contexts           |  109 ----
 config/appconfig-standard/x_contexts      |  109 ----
 policy/flask/access_vectors               |   55 +-
 policy/flask/security_classes             |    4 
 policy/mcs                                |   31 -
 policy/modules/admin/alsa.te              |    2 
 policy/modules/admin/consoletype.if       |    4 
 policy/modules/admin/dmesg.fc             |    1 
 policy/modules/admin/logrotate.te         |   13 
 policy/modules/admin/logwatch.te          |    5 
 policy/modules/admin/mcelog.fc            |    2 
 policy/modules/admin/mcelog.if            |   20 
 policy/modules/admin/mcelog.te            |   33 +
 policy/modules/admin/netutils.fc          |    1 
 policy/modules/admin/netutils.te          |    6 
 policy/modules/admin/prelink.te           |    3 
 policy/modules/admin/quota.te             |    1 
 policy/modules/admin/readahead.te         |    3 
 policy/modules/admin/rpm.if               |   62 ++
 policy/modules/admin/rpm.te               |    2 
 policy/modules/admin/shorewall.te         |    4 
 policy/modules/admin/shutdown.fc          |    5 
 policy/modules/admin/shutdown.if          |  100 ++++
 policy/modules/admin/shutdown.te          |   57 ++
 policy/modules/admin/smoltclient.te       |    2 
 policy/modules/admin/tzdata.te            |    1 
 policy/modules/admin/usermanage.te        |    8 
 policy/modules/admin/vbetool.te           |   13 
 policy/modules/admin/vpn.if               |   18 
 policy/modules/admin/vpn.te               |    7 
 policy/modules/apps/cdrecord.te           |    2 
 policy/modules/apps/chrome.fc             |    2 
 policy/modules/apps/chrome.if             |    5 
 policy/modules/apps/chrome.te             |   16 
 policy/modules/apps/execmem.if            |   10 
 policy/modules/apps/firewallgui.te        |    6 
 policy/modules/apps/gnome.fc              |    9 
 policy/modules/apps/gnome.if              |   99 +++-
 policy/modules/apps/gnome.te              |    8 
 policy/modules/apps/gpg.fc                |    2 
 policy/modules/apps/gpg.te                |   12 
 policy/modules/apps/java.if               |    1 
 policy/modules/apps/java.te               |    1 
 policy/modules/apps/kdumpgui.te           |    4 
 policy/modules/apps/livecd.if             |   57 ++
 policy/modules/apps/livecd.te             |    9 
 policy/modules/apps/mono.if               |    4 
 policy/modules/apps/mozilla.fc            |    1 
 policy/modules/apps/mozilla.if            |   36 +
 policy/modules/apps/nsplugin.fc           |    1 
 policy/modules/apps/nsplugin.if           |   40 +
 policy/modules/apps/nsplugin.te           |   10 
 policy/modules/apps/openoffice.if         |    1 
 policy/modules/apps/podsleuth.te          |    1 
 policy/modules/apps/ptchown.te            |    1 
 policy/modules/apps/pulseaudio.fc         |    8 
 policy/modules/apps/pulseaudio.if         |   70 ++
 policy/modules/apps/pulseaudio.te         |   42 +
 policy/modules/apps/qemu.te               |    1 
 policy/modules/apps/sambagui.te           |    4 
 policy/modules/apps/sandbox.if            |  118 ++++
 policy/modules/apps/sandbox.te            |   67 +-
 policy/modules/apps/slocate.te            |    3 
 policy/modules/apps/vmware.if             |   18 
 policy/modules/apps/vmware.te             |   14 
 policy/modules/apps/wine.if               |    5 
 policy/modules/apps/wine.te               |   18 
 policy/modules/apps/wm.if                 |   16 
 policy/modules/kernel/corecommands.fc     |    8 
 policy/modules/kernel/corenetwork.if.in   |  279 ++++++++++-
 policy/modules/kernel/corenetwork.te.in   |   62 +-
 policy/modules/kernel/corenetwork.te.m4   |   19 
 policy/modules/kernel/devices.fc          |    5 
 policy/modules/kernel/devices.if          |  343 ++++++++++++-
 policy/modules/kernel/devices.te          |   25 -
 policy/modules/kernel/domain.if           |   24 
 policy/modules/kernel/domain.te           |    6 
 policy/modules/kernel/files.fc            |    6 
 policy/modules/kernel/files.if            |  370 ++++++++++++---
 policy/modules/kernel/files.te            |    7 
 policy/modules/kernel/filesystem.if       |  212 ++++++++
 policy/modules/kernel/filesystem.te       |   12 
 policy/modules/kernel/kernel.if           |   54 ++
 policy/modules/kernel/mcs.if              |   40 +
 policy/modules/kernel/mcs.te              |    2 
 policy/modules/kernel/storage.if          |   20 
 policy/modules/kernel/terminal.if         |  247 +++++++++-
 policy/modules/roles/auditadm.te          |    2 
 policy/modules/roles/secadm.te            |    2 
 policy/modules/roles/staff.te             |   22 
 policy/modules/roles/sysadm.te            |   12 
 policy/modules/roles/unconfineduser.fc    |    5 
 policy/modules/roles/unconfineduser.te    |   17 
 policy/modules/roles/unprivuser.te        |    2 
 policy/modules/roles/xguest.te            |    7 
 policy/modules/services/abrt.if           |    5 
 policy/modules/services/abrt.te           |   28 +
 policy/modules/services/afs.te            |   11 
 policy/modules/services/aisexec.fc        |    2 
 policy/modules/services/aisexec.te        |    8 
 policy/modules/services/amavis.te         |    1 
 policy/modules/services/apache.fc         |   11 
 policy/modules/services/apache.if         |   87 +++
 policy/modules/services/apache.te         |   48 +
 policy/modules/services/apcupsd.te        |    6 
 policy/modules/services/arpwatch.te       |    2 
 policy/modules/services/asterisk.if       |   19 
 policy/modules/services/asterisk.te       |    3 
 policy/modules/services/avahi.fc          |    2 
 policy/modules/services/avahi.if          |    1 
 policy/modules/services/avahi.te          |    4 
 policy/modules/services/bind.if           |   19 
 policy/modules/services/bluetooth.te      |    2 
 policy/modules/services/cachefilesd.fc    |   28 +
 policy/modules/services/cachefilesd.if    |   41 +
 policy/modules/services/cachefilesd.te    |  146 +++++
 policy/modules/services/ccs.te            |    6 
 policy/modules/services/chronyd.fc        |    2 
 policy/modules/services/chronyd.if        |   22 
 policy/modules/services/chronyd.te        |   22 
 policy/modules/services/clamav.te         |    2 
 policy/modules/services/clogd.if          |   24 
 policy/modules/services/clogd.te          |    7 
 policy/modules/services/cobbler.fc        |    5 
 policy/modules/services/cobbler.if        |  156 ++++++
 policy/modules/services/cobbler.te        |  132 +++++
 policy/modules/services/consolekit.te     |   19 
 policy/modules/services/corosync.fc       |    3 
 policy/modules/services/corosync.te       |   15 
 policy/modules/services/cron.if           |   18 
 policy/modules/services/cron.te           |    9 
 policy/modules/services/cups.te           |    8 
 policy/modules/services/dbus.if           |    7 
 policy/modules/services/dcc.te            |    2 
 policy/modules/services/denyhosts.fc      |    7 
 policy/modules/services/denyhosts.if      |   87 +++
 policy/modules/services/denyhosts.te      |   76 +++
 policy/modules/services/devicekit.fc      |    4 
 policy/modules/services/devicekit.te      |   14 
 policy/modules/services/dhcp.if           |   19 
 policy/modules/services/dhcp.te           |    4 
 policy/modules/services/djbdns.if         |   38 +
 policy/modules/services/djbdns.te         |    8 
 policy/modules/services/dnsmasq.fc        |    2 
 policy/modules/services/dnsmasq.if        |   38 +
 policy/modules/services/dnsmasq.te        |    8 
 policy/modules/services/dovecot.te        |    6 
 policy/modules/services/exim.if           |   18 
 policy/modules/services/fail2ban.if       |   18 
 policy/modules/services/ftp.fc            |    2 
 policy/modules/services/ftp.if            |   37 +
 policy/modules/services/ftp.te            |  116 ++++
 policy/modules/services/git.fc            |   17 
 policy/modules/services/git.if            |  466 ++++++++++++++----
 policy/modules/services/git.te            |  145 +++--
 policy/modules/services/gpm.fc            |    2 
 policy/modules/services/gpsd.if           |   21 
 policy/modules/services/gpsd.te           |    4 
 policy/modules/services/hal.if            |   18 
 policy/modules/services/hal.te            |   36 +
 policy/modules/services/inn.te            |    2 
 policy/modules/services/kerberos.if       |   21 
 policy/modules/services/ksmtuned.te       |    9 
 policy/modules/services/ldap.fc           |    3 
 policy/modules/services/ldap.if           |   24 
 policy/modules/services/ldap.te           |   13 
 policy/modules/services/likewise.fc       |   54 ++
 policy/modules/services/likewise.if       |  105 ++++
 policy/modules/services/likewise.te       |  247 ++++++++++
 policy/modules/services/lircd.te          |    9 
 policy/modules/services/mailman.te        |    1 
 policy/modules/services/memcached.te      |   14 
 policy/modules/services/modemmanager.te   |    2 
 policy/modules/services/mta.if            |   41 +
 policy/modules/services/mta.te            |    6 
 policy/modules/services/munin.fc          |   55 ++
 policy/modules/services/munin.if          |   66 ++
 policy/modules/services/munin.te          |  165 ++++++
 policy/modules/services/mysql.te          |    8 
 policy/modules/services/nagios.fc         |   46 +
 policy/modules/services/nagios.if         |   28 +
 policy/modules/services/nagios.te         |   90 +++
 policy/modules/services/networkmanager.fc |    1 
 policy/modules/services/networkmanager.if |   19 
 policy/modules/services/networkmanager.te |    5 
 policy/modules/services/nis.fc            |    5 
 policy/modules/services/nis.te            |    8 
 policy/modules/services/ntp.te            |    2 
 policy/modules/services/nut.te            |   11 
 policy/modules/services/nx.if             |   18 
 policy/modules/services/openvpn.te        |   11 
 policy/modules/services/plymouth.fc       |    5 
 policy/modules/services/plymouth.if       |  304 ------------
 policy/modules/services/plymouth.te       |  102 ----
 policy/modules/services/plymouthd.fc      |    9 
 policy/modules/services/plymouthd.if      |  322 +++++++++++++
 policy/modules/services/plymouthd.te      |  108 ++++
 policy/modules/services/policykit.te      |   23 
 policy/modules/services/postfix.if        |   37 +
 policy/modules/services/postfix.te        |    9 
 policy/modules/services/ppp.fc            |    2 
 policy/modules/services/ppp.if            |   20 
 policy/modules/services/ppp.te            |    9 
 policy/modules/services/prelude.te        |    2 
 policy/modules/services/qmail.if          |   18 
 policy/modules/services/qpidd.fc          |    9 
 policy/modules/services/qpidd.if          |  236 +++++++++
 policy/modules/services/qpidd.te          |   61 ++
 policy/modules/services/rgmanager.if      |   40 +
 policy/modules/services/rgmanager.te      |   58 +-
 policy/modules/services/rhcs.fc           |    9 
 policy/modules/services/rhcs.if           |   58 ++
 policy/modules/services/rhcs.te           |  279 ++---------
 policy/modules/services/ricci.te          |    8 
 policy/modules/services/rpc.if            |    1 
 policy/modules/services/rpc.te            |    8 
 policy/modules/services/rsync.if          |   38 +
 policy/modules/services/rsync.te          |    1 
 policy/modules/services/samba.te          |   20 
 policy/modules/services/sasl.te           |    2 
 policy/modules/services/sendmail.te       |    4 
 policy/modules/services/setroubleshoot.te |    4 
 policy/modules/services/snmp.te           |    6 
 policy/modules/services/snort.te          |    3 
 policy/modules/services/spamassassin.if   |   18 
 policy/modules/services/spamassassin.te   |    6 
 policy/modules/services/squid.te          |   12 
 policy/modules/services/ssh.if            |    4 
 policy/modules/services/ssh.te            |   84 ---
 policy/modules/services/sssd.fc           |    4 
 policy/modules/services/sssd.if           |   85 ++-
 policy/modules/services/sssd.te           |   20 
 policy/modules/services/tftp.if           |   20 
 policy/modules/services/tftp.te           |    1 
 policy/modules/services/tgtd.te           |    3 
 policy/modules/services/tor.fc            |    1 
 policy/modules/services/tuned.fc          |    3 
 policy/modules/services/tuned.te          |   15 
 policy/modules/services/ucspitcp.te       |    5 
 policy/modules/services/usbmuxd.fc        |    6 
 policy/modules/services/usbmuxd.if        |   64 ++
 policy/modules/services/usbmuxd.te        |   51 ++
 policy/modules/services/varnishd.if       |   19 
 policy/modules/services/virt.if           |   11 
 policy/modules/services/virt.te           |   26 -
 policy/modules/services/xserver.fc        |   18 
 policy/modules/services/xserver.if        |  738 ++++++++++--------------------
 policy/modules/services/xserver.te        |  392 ++++++++-------
 policy/modules/system/application.te      |   16 
 policy/modules/system/authlogin.if        |    4 
 policy/modules/system/daemontools.if      |   62 ++
 policy/modules/system/daemontools.te      |   26 -
 policy/modules/system/fstools.fc          |    2 
 policy/modules/system/hostname.te         |    7 
 policy/modules/system/hotplug.te          |    4 
 policy/modules/system/init.if             |   38 +
 policy/modules/system/init.te             |   32 +
 policy/modules/system/ipsec.te            |   13 
 policy/modules/system/iptables.if         |   10 
 policy/modules/system/iptables.te         |    6 
 policy/modules/system/iscsi.fc            |    3 
 policy/modules/system/iscsi.te            |   10 
 policy/modules/system/libraries.fc        |   34 +
 policy/modules/system/locallogin.te       |   22 
 policy/modules/system/logging.fc          |    9 
 policy/modules/system/logging.if          |   18 
 policy/modules/system/logging.te          |   10 
 policy/modules/system/lvm.fc              |    1 
 policy/modules/system/lvm.if              |    4 
 policy/modules/system/lvm.te              |    6 
 policy/modules/system/miscfiles.fc        |    7 
 policy/modules/system/miscfiles.if        |   37 +
 policy/modules/system/modutils.te         |    2 
 policy/modules/system/mount.if            |   56 ++
 policy/modules/system/mount.te            |   58 ++
 policy/modules/system/selinuxutil.if      |   21 
 policy/modules/system/selinuxutil.te      |   25 -
 policy/modules/system/sosreport.fc        |    2 
 policy/modules/system/sosreport.if        |   74 +++
 policy/modules/system/sosreport.te        |  129 +++++
 policy/modules/system/sysnetwork.fc       |    3 
 policy/modules/system/sysnetwork.if       |    4 
 policy/modules/system/sysnetwork.te       |    4 
 policy/modules/system/udev.te             |    5 
 policy/modules/system/unconfined.if       |    2 
 policy/modules/system/userdomain.fc       |    2 
 policy/modules/system/userdomain.if       |   45 +
 policy/modules/system/userdomain.te       |    4 
 policy/modules/system/xen.if              |    2 
 policy/modules/system/xen.te              |   22 
 policy/support/obj_perm_sets.spt          |   11 
 policy/users                              |    2 
 293 files changed, 8386 insertions(+), 2444 deletions(-)

Index: policy-20100106.patch
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/policy-20100106.patch,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -p -r1.65 -r1.66
--- policy-20100106.patch	11 May 2010 16:14:27 -0000	1.65
+++ policy-20100106.patch	21 May 2010 12:53:35 -0000	1.66
@@ -1245,6 +1245,31 @@ diff -b -B --ignore-all-space --exclude-
  optional_policy(`
  	hal_rw_pid_files(vbetool_t)
  	hal_write_log(vbetool_t)
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/vpn.if serefpolicy-3.6.32/policy/modules/admin/vpn.if
+--- nsaserefpolicy/policy/modules/admin/vpn.if	2009-09-16 16:01:19.000000000 +0200
++++ serefpolicy-3.6.32/policy/modules/admin/vpn.if	2010-05-21 14:13:45.300140025 +0200
+@@ -119,3 +119,21 @@
+ 	allow $1 vpnc_t:dbus send_msg;
+ 	allow vpnc_t $1:dbus send_msg;
+ ')
++
++#######################################
++## <summary>
++## Relabelfrom from vpnc socket.
++## </summary>
++## <param name="domain">
++## <summary>
++## Domain allowed access.
++## </summary>
++## </param>
++#
++interface(`vpn_relabelfrom_tun_socket',`
++	gen_require(`
++		type vpnc_t;
++	')
++
++	allow $1 vpnc_t:tun_socket relabelfrom;
++')
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/vpn.te serefpolicy-3.6.32/policy/modules/admin/vpn.te
 --- nsaserefpolicy/policy/modules/admin/vpn.te	2010-01-18 18:24:22.585539991 +0100
 +++ serefpolicy-3.6.32/policy/modules/admin/vpn.te	2010-03-09 17:28:45.666384350 +0100
@@ -3328,7 +3353,7 @@ diff -b -B --ignore-all-space --exclude-
  	gen_require(`
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/corenetwork.te.in serefpolicy-3.6.32/policy/modules/kernel/corenetwork.te.in
 --- nsaserefpolicy/policy/modules/kernel/corenetwork.te.in	2010-01-18 18:24:22.668540002 +0100
-+++ serefpolicy-3.6.32/policy/modules/kernel/corenetwork.te.in	2010-04-16 10:33:18.848863853 +0200
++++ serefpolicy-3.6.32/policy/modules/kernel/corenetwork.te.in	2010-05-21 13:29:04.023389987 +0200
 @@ -1,5 +1,5 @@
  
 -policy_module(corenetwork, 1.13.0)
@@ -3443,7 +3468,12 @@ diff -b -B --ignore-all-space --exclude-
  type socks_port_t, port_type; dnl network_port(socks) # no defined portcon
  network_port(soundd, tcp,8000,s0, tcp,9433,s0, tcp, 16001, s0)
  network_port(spamd, tcp,783,s0)
-@@ -209,25 +212,22 @@
+@@ -205,29 +208,27 @@
+ network_port(streaming, tcp, 1755, s0, udp, 1755, s0)
+ type stunnel_port_t, port_type; dnl network_port(stunnel) # no defined portcon in current strict
+ network_port(swat, tcp,901,s0)
++network_port(sype, tcp,9911,s0, udp,9911,s0)
+ network_port(syslogd, udp,514,s0)
  network_port(telnetd, tcp,23,s0)
  network_port(tftp, udp,69,s0)
  network_port(tor, tcp, 6969, s0, tcp,9001,s0, tcp,9030,s0, tcp,9050,s0, tcp,9051,s0)
@@ -3475,7 +3505,7 @@ diff -b -B --ignore-all-space --exclude-
  network_port(zope, tcp,8021,s0)
  
  # Defaults for reserved ports.  Earlier portcon entries take precedence;
-@@ -249,9 +249,8 @@
+@@ -249,9 +250,8 @@
  # nodes in net_contexts or net_contexts.mls.
  #
  type node_t, node_type;
@@ -7016,6 +7046,18 @@ diff -b -B --ignore-all-space --exclude-
 +    gpsd_rw_shm(chronyd_t)
 +')
 +
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/clamav.te serefpolicy-3.6.32/policy/modules/services/clamav.te
+--- nsaserefpolicy/policy/modules/services/clamav.te	2010-01-18 18:24:22.756540300 +0100
++++ serefpolicy-3.6.32/policy/modules/services/clamav.te	2010-05-21 13:23:07.973140539 +0200
+@@ -57,6 +57,8 @@
+ #
+ 
+ allow clamd_t self:capability { kill setgid setuid dac_override };
++dontaudit clamd_t self:capability sys_tty_config; 
++
+ allow clamd_t self:fifo_file rw_fifo_file_perms;
+ allow clamd_t self:unix_stream_socket { create_stream_socket_perms connectto };
+ allow clamd_t self:unix_dgram_socket create_socket_perms;
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/clogd.if serefpolicy-3.6.32/policy/modules/services/clogd.if
 --- nsaserefpolicy/policy/modules/services/clogd.if	2010-01-18 18:24:22.757540078 +0100
 +++ serefpolicy-3.6.32/policy/modules/services/clogd.if	2010-02-17 11:59:55.124863336 +0100
@@ -7803,8 +7845,8 @@ diff -b -B --ignore-all-space --exclude-
 +')
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/denyhosts.te serefpolicy-3.6.32/policy/modules/services/denyhosts.te
 --- nsaserefpolicy/policy/modules/services/denyhosts.te	1970-01-01 01:00:00.000000000 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/denyhosts.te	2010-05-05 13:07:41.253629289 +0200
-@@ -0,0 +1,75 @@
++++ serefpolicy-3.6.32/policy/modules/services/denyhosts.te	2010-05-21 13:28:34.975140060 +0200
+@@ -0,0 +1,76 @@
 +
 +policy_module(denyhosts, 1.0.0) 
 +
@@ -7862,6 +7904,7 @@ diff -b -B --ignore-all-space --exclude-
 +corenet_tcp_bind_generic_node(denyhosts_t)
 +corenet_sendrecv_smtp_client_packets(denyhosts_t)
 +corenet_tcp_connect_smtp_port(denyhosts_t)
++corenet_tcp_connect_sype_port(denyhosts_t)
 +
 +dev_read_urand(denyhosts_t)
 +
@@ -10489,7 +10532,7 @@ diff -b -B --ignore-all-space --exclude-
  ##	All of the rules required to administrate 
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/munin.te serefpolicy-3.6.32/policy/modules/services/munin.te
 --- nsaserefpolicy/policy/modules/services/munin.te	2010-01-18 18:24:22.815530066 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/munin.te	2010-05-11 15:18:42.193873511 +0200
++++ serefpolicy-3.6.32/policy/modules/services/munin.te	2010-05-21 13:20:57.917140425 +0200
 @@ -28,6 +28,20 @@
  type munin_var_run_t alias lrrd_var_run_t;
  files_pid_file(munin_var_run_t)
@@ -10519,7 +10562,7 @@ diff -b -B --ignore-all-space --exclude-
  	mta_read_queue(munin_t)
  ')
  
-@@ -166,3 +181,149 @@
+@@ -166,3 +181,153 @@
  optional_policy(`
  	udev_read_db(munin_t)
  ')
@@ -10603,6 +10646,8 @@ diff -b -B --ignore-all-space --exclude-
 +corenet_tcp_connect_all_ports(munin_services_plugin_t)
 +corenet_tcp_connect_http_port(munin_services_plugin_t)
 +
++corecmd_exec_shell(munin_services_plugin_t)
++
 +dev_read_urand(munin_services_plugin_t)
 +dev_read_rand(munin_services_plugin_t)
 +
@@ -10664,6 +10709,8 @@ diff -b -B --ignore-all-space --exclude-
 +
 +domain_read_all_domains_state(munin_system_plugin_t)
 +
++term_getattr_all_ptys(munin_system_plugin_t)
++
 +# needed by users plugin
 +init_read_utmp(munin_system_plugin_t)
 +
@@ -11040,7 +11087,7 @@ diff -b -B --ignore-all-space --exclude-
 +
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-3.6.32/policy/modules/services/networkmanager.te
 --- nsaserefpolicy/policy/modules/services/networkmanager.te	2010-01-18 18:24:22.825542512 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/networkmanager.te	2010-04-08 10:36:24.650115367 +0200
++++ serefpolicy-3.6.32/policy/modules/services/networkmanager.te	2010-05-21 14:13:59.753140461 +0200
 @@ -45,12 +45,14 @@
  allow NetworkManager_t self:netlink_route_socket create_netlink_socket_perms;
  allow NetworkManager_t self:netlink_kobject_uevent_socket create_socket_perms;
@@ -11065,6 +11112,14 @@ diff -b -B --ignore-all-space --exclude-
  ')
  
  optional_policy(`
+@@ -269,6 +271,7 @@
+ optional_policy(`
+ 	vpn_domtrans(NetworkManager_t)
+ 	vpn_kill(NetworkManager_t)
++	vpn_relabelfrom_tun_socket(NetworkManager_t)
+ 	vpn_signal(NetworkManager_t)
+ 	vpn_signull(NetworkManager_t)
+ ')
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/nis.fc serefpolicy-3.6.32/policy/modules/services/nis.fc
 --- nsaserefpolicy/policy/modules/services/nis.fc	2010-01-18 18:24:22.826540614 +0100
 +++ serefpolicy-3.6.32/policy/modules/services/nis.fc	2010-01-29 09:57:02.171614102 +0100
@@ -17072,7 +17127,7 @@ diff -b -B --ignore-all-space --exclude-
  /var/log/fsck(/.*)?		gen_context(system_u:object_r:fsadm_log_t,s0)
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/hostname.te serefpolicy-3.6.32/policy/modules/system/hostname.te
 --- nsaserefpolicy/policy/modules/system/hostname.te	2009-09-16 16:01:19.000000000 +0200
-+++ serefpolicy-3.6.32/policy/modules/system/hostname.te	2010-01-29 10:03:19.733864870 +0100
++++ serefpolicy-3.6.32/policy/modules/system/hostname.te	2010-05-21 13:24:52.670390563 +0200
 @@ -27,15 +27,18 @@
  
  dev_read_sysfs(hostname_t)
@@ -17092,6 +17147,16 @@ diff -b -B --ignore-all-space --exclude-
  fs_dontaudit_use_tmpfs_chr_dev(hostname_t)
  
  term_dontaudit_use_console(hostname_t)
+@@ -59,5 +62,9 @@
+ ')
+ 
+ optional_policy(`
++	nis_use_ypbind(hostname_t)
++')  
++
++optional_policy(`
+ 	unconfined_dontaudit_rw_pipes(hostname_t)
+ ')
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/hotplug.te serefpolicy-3.6.32/policy/modules/system/hotplug.te
 --- nsaserefpolicy/policy/modules/system/hotplug.te	2009-09-16 16:01:19.000000000 +0200
 +++ serefpolicy-3.6.32/policy/modules/system/hotplug.te	2010-01-18 18:27:02.780542727 +0100
@@ -17521,7 +17586,7 @@ diff -b -B --ignore-all-space --exclude-
  domain_read_all_domains_state(iscsid_t)
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.fc serefpolicy-3.6.32/policy/modules/system/libraries.fc
 --- nsaserefpolicy/policy/modules/system/libraries.fc	2010-01-18 18:24:22.945540594 +0100
-+++ serefpolicy-3.6.32/policy/modules/system/libraries.fc	2010-04-13 15:32:35.079601752 +0200
++++ serefpolicy-3.6.32/policy/modules/system/libraries.fc	2010-05-21 14:17:19.115390020 +0200
 @@ -69,6 +69,8 @@
  
  /opt/Acrobat[5-9]/Reader/intellinux/plugins/.*\.api -- gen_context(system_u:object_r:lib_t,s0)
@@ -17592,7 +17657,7 @@ diff -b -B --ignore-all-space --exclude-
  /usr/lib(64)?/libSDL-.*\.so.*		--	gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib(64)?/xulrunner-[^/]*/libgtkembedmoz\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
  /usr/lib(64)?/xulrunner-[^/]*/libxul\.so --	gen_context(system_u:object_r:textrel_shlib_t,s0)
-@@ -432,9 +437,23 @@
+@@ -432,9 +437,26 @@
  
  /usr/lib(64)?/octagaplayer/libapplication\.so		     --	gen_context(system_u:object_r:textrel_shlib_t,s0)
  
@@ -17614,8 +17679,11 @@ diff -b -B --ignore-all-space --exclude-
 +/usr/lib(64)?/libgpac\.so.*						--	gen_context(system_u:object_r:textrel_shlib_t,s0)	
 +/usr/lib(64)?/transcode/filter_yuvdenoise\.so	--   gen_context(system_u:object_r:textrel_shlib_t,s0)
 +/usr/lib(64)?/vdpau/libvdpau_nvidia\.so.*  --	gen_context(system_u:object_r:textrel_shlib_t,s0)	
++
 +/usr/local/lexmark/lxk08/lib(/.*)? --	gen_context(system_u:object_r:textrel_shlib_t,s0)  
 +/usr/local/MATHWORKS_R2009B/bin/glnxa(64)?/libtbb\.so.*	--   gen_context(system_u:object_r:textrel_shlib_t,s0)
++/usr/local/zend/lib/apache2/libphp.*\.so.*		--		gen_context(system_u:object_r:textrel_shlib_t,s0)
++
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/locallogin.te serefpolicy-3.6.32/policy/modules/system/locallogin.te
 --- nsaserefpolicy/policy/modules/system/locallogin.te	2010-01-18 18:24:22.948530849 +0100
 +++ serefpolicy-3.6.32/policy/modules/system/locallogin.te	2010-03-09 15:11:11.342502914 +0100


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/selinux-policy.spec,v
retrieving revision 1.1050
retrieving revision 1.1051
diff -u -p -r1.1050 -r1.1051
--- selinux-policy.spec	11 May 2010 16:14:29 -0000	1.1050
+++ selinux-policy.spec	21 May 2010 12:53:36 -0000	1.1051
@@ -20,7 +20,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.6.32
-Release: 115%{?dist}
+Release: 116%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -469,6 +469,10 @@ exit 0
 %endif
 
 %changelog
+* Fri May 21 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-116
+- Allow denyhosts to connect to tcp port 9911
+- Fixes for munin
+
 * Tue May 11 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-115
 - Allow avahi-autoipd to chat with NetworkManager over dbus
 - Allow tgtd to read files on anon_inodefs file systems


Index: sources
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/sources,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -p -r1.207 -r1.208
--- sources	3 Mar 2010 13:14:29 -0000	1.207
+++ sources	21 May 2010 12:53:36 -0000	1.208
@@ -1,2 +1,2 @@
-691512af90a425dd0d70b8c1bac558e2  config.tgz
+6f4166b770e4ad907e9a458ef53a149d  config.tgz
 d3d5eaf6fd6ca9f09f8912d694810268  serefpolicy-3.6.32.tgz



More information about the scm-commits mailing list