[selinux-policy] Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them

Daniel J Walsh dwalsh at fedoraproject.org
Thu Jul 12 23:20:50 UTC 2012


commit 9d1d9952b1c120a80325616cc1355e6f042d64ac
Author: Dan Walsh <dwalsh at redhat.com>
Date:   Thu Jul 12 19:20:37 2012 -0400

    Until we figure out how to fix systemd issues, allow all apps that send syslog messages to send them to kernel_t
    
    - Add init_access_check() interface
    - Fix label on /usr/bin/pingus to not be labeled as ping_exec_t
    - Allow tcpdump to create a netlink_socket
    - Label newusers like useradd
    - Change xdm log files to be labeled xdm_log_t
    - Allow sshd_t with privsep to work in MLS
    - Allow freshclam to update databases thru HTTP proxy
    - Allow s-m-config to access check on systemd
    - Allow abrt to read public files by default
    - Fix amavis_create_pid_files() interface
    - Add labeling and filename transition for dbomatic.log
    - Allow system_dbusd_t to stream connect to bluetooth, and use its socket
    - Allow amavisd to execute fsav
    - Allow tuned to use sys_admin and sys_nice capabilities
    - Add php-fpm policy from Bryan
    - Add labeling for aeolus-configserver-thinwrapper
    - Allow thin domains to execute shell
    - Fix gnome_role_gkeyringd() interface description
    - Lot of interface fixes
    - Allow OpenMPI job running as condor_startd_ssh_t to manage condor lib files
    - Allow OpenMPI job to use kerberos
    - Make deltacloudd_t as nsswitch_domain
    - Allow xend_t to run lsscsi
    - Allow qemu-dm running as xend_t to create tun_socket
    - Add labeling for /opt/brother/Printers(.*/)?inf
    - Allow jockey-backend to read pyconfig-64.h labeled as usr_t
    - Fix clamscan_can_scan_system boolean
    - Allow lpr to connectto to /run/user/$USER/keyring-22uREb/pkcs11

 selinux-policy.spec |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 1544972..b234898 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -55,7 +55,7 @@ Url: http://oss.tresys.com/repos/refpolicy/
 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 BuildArch: noarch
 BuildRequires: python gawk checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils-python >= %{POLICYCOREUTILSVER} bzip2 
-Requires(pre): policycoreutils >= %{POLICYCOREUTILSVER} libsemanage >= 2.0.46-6
+Requires(pre): policycoreutils >= %{POLICYCOREUTILSVER} libsemanage >= 2.1.8-2
 Requires(post): /bin/awk /usr/bin/sha512sum
 Requires: checkpolicy >= %{CHECKPOLICYVER} m4 
 


More information about the scm-commits mailing list