[selinux-policy/f18] * Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105 - Fix typo in abrt.te - Label /srv/ww
Lukas Vrabec
lvrabec at fedoraproject.org
Thu Sep 26 09:23:01 UTC 2013
commit d302afdb115abe0d0033a3f1bb3116aca59ca458
Author: Lukas Vrabec <lvrabec at redhat.com>
Date: Thu Sep 26 11:22:40 2013 +0200
* Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105
- Fix typo in abrt.te
- Label /srv/www/logs as httpd_log_t
- Allow abrt daemon to manage abrt-watch tmp files
- Allow abrt-upload-watcher to search /var/spool directory
- Fix typo in abrt.te
- Allow getsched in staff_t
policy-f18-base.patch | 21 ++++++-----
policy-f18-contrib.patch | 88 +++++++++++++++++++++++++++++-----------------
selinux-policy.spec | 10 +++++-
3 files changed, 76 insertions(+), 43 deletions(-)
---
diff --git a/policy-f18-base.patch b/policy-f18-base.patch
index d0eb01f..5552eab 100644
--- a/policy-f18-base.patch
+++ b/policy-f18-base.patch
@@ -124809,10 +124809,10 @@ index 234a940..d340f20 100644
########################################
## <summary>
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index e5aee97..56fed3b 100644
+index e5aee97..9de0f5a 100644
--- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,67 @@ policy_module(staff, 2.3.0)
+@@ -8,12 +8,68 @@ policy_module(staff, 2.3.0)
role staff_r;
userdom_unpriv_user_template(staff)
@@ -124845,6 +124845,7 @@ index e5aee97..56fed3b 100644
+
+domain_read_all_domains_state(staff_t)
+domain_getattr_all_domains(staff_t)
++domain_getsched_all_domains(staff_t)
+domain_obj_id_change_exemption(staff_t)
+
+files_read_kernel_modules(staff_t)
@@ -124880,7 +124881,7 @@ index e5aee97..56fed3b 100644
optional_policy(`
apache_role(staff_r, staff_t)
')
-@@ -23,11 +78,106 @@ optional_policy(`
+@@ -23,11 +79,106 @@ optional_policy(`
')
optional_policy(`
@@ -124988,7 +124989,7 @@ index e5aee97..56fed3b 100644
')
optional_policy(`
-@@ -35,15 +185,31 @@ optional_policy(`
+@@ -35,15 +186,31 @@ optional_policy(`
')
optional_policy(`
@@ -125022,7 +125023,7 @@ index e5aee97..56fed3b 100644
')
optional_policy(`
-@@ -52,10 +218,60 @@ optional_policy(`
+@@ -52,10 +219,60 @@ optional_policy(`
')
optional_policy(`
@@ -125083,7 +125084,7 @@ index e5aee97..56fed3b 100644
xserver_role(staff_r, staff_t)
')
-@@ -65,10 +281,6 @@ ifndef(`distro_redhat',`
+@@ -65,10 +282,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -125094,7 +125095,7 @@ index e5aee97..56fed3b 100644
cdrecord_role(staff_r, staff_t)
')
-@@ -93,18 +305,10 @@ ifndef(`distro_redhat',`
+@@ -93,18 +306,10 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -125113,7 +125114,7 @@ index e5aee97..56fed3b 100644
java_role(staff_r, staff_t)
')
-@@ -125,10 +329,6 @@ ifndef(`distro_redhat',`
+@@ -125,10 +330,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -125124,7 +125125,7 @@ index e5aee97..56fed3b 100644
pyzor_role(staff_r, staff_t)
')
-@@ -141,10 +341,6 @@ ifndef(`distro_redhat',`
+@@ -141,10 +342,6 @@ ifndef(`distro_redhat',`
')
optional_policy(`
@@ -125135,7 +125136,7 @@ index e5aee97..56fed3b 100644
spamassassin_role(staff_r, staff_t)
')
-@@ -176,3 +372,22 @@ ifndef(`distro_redhat',`
+@@ -176,3 +373,22 @@ ifndef(`distro_redhat',`
wireshark_role(staff_r, staff_t)
')
')
diff --git a/policy-f18-contrib.patch b/policy-f18-contrib.patch
index fffec53..256fe0f 100644
--- a/policy-f18-contrib.patch
+++ b/policy-f18-contrib.patch
@@ -370,7 +370,7 @@ index 0b827c5..cce58bb 100644
+ dontaudit $1 abrt_t:sock_file write;
')
diff --git a/abrt.te b/abrt.te
-index 30861ec..6c5549d 100644
+index 30861ec..c23e41d 100644
--- a/abrt.te
+++ b/abrt.te
@@ -5,13 +5,41 @@ policy_module(abrt, 1.2.0)
@@ -518,7 +518,7 @@ index 30861ec..6c5549d 100644
# abrt var/cache files
manage_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
-@@ -76,16 +147,18 @@ manage_dirs_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
+@@ -76,16 +147,22 @@ manage_dirs_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
manage_lnk_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
files_var_filetrans(abrt_t, abrt_var_cache_t, { file dir })
files_spool_filetrans(abrt_t, abrt_var_cache_t, dir)
@@ -531,6 +531,10 @@ index 30861ec..6c5549d 100644
manage_lnk_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t)
-files_pid_filetrans(abrt_t, abrt_var_run_t, { file dir })
+files_pid_filetrans(abrt_t, abrt_var_run_t, { file dir sock_file })
++
++manage_files_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_dirs_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_lnk_files_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
kernel_read_ring_buffer(abrt_t)
-kernel_read_system_state(abrt_t)
@@ -539,7 +543,7 @@ index 30861ec..6c5549d 100644
kernel_rw_kernel_sysctl(abrt_t)
corecmd_exec_bin(abrt_t)
-@@ -93,7 +166,6 @@ corecmd_exec_shell(abrt_t)
+@@ -93,7 +170,6 @@ corecmd_exec_shell(abrt_t)
corecmd_read_all_executables(abrt_t)
corenet_all_recvfrom_netlabel(abrt_t)
@@ -547,7 +551,7 @@ index 30861ec..6c5549d 100644
corenet_tcp_sendrecv_generic_if(abrt_t)
corenet_tcp_sendrecv_generic_node(abrt_t)
corenet_tcp_sendrecv_generic_port(abrt_t)
-@@ -104,6 +176,8 @@ corenet_tcp_connect_all_ports(abrt_t)
+@@ -104,6 +180,8 @@ corenet_tcp_connect_all_ports(abrt_t)
corenet_sendrecv_http_client_packets(abrt_t)
dev_getattr_all_chr_files(abrt_t)
@@ -556,7 +560,7 @@ index 30861ec..6c5549d 100644
dev_read_urand(abrt_t)
dev_rw_sysfs(abrt_t)
dev_dontaudit_read_raw_memory(abrt_t)
-@@ -113,7 +187,8 @@ domain_read_all_domains_state(abrt_t)
+@@ -113,7 +191,8 @@ domain_read_all_domains_state(abrt_t)
domain_signull_all_domains(abrt_t)
files_getattr_all_files(abrt_t)
@@ -566,7 +570,7 @@ index 30861ec..6c5549d 100644
files_read_var_symlinks(abrt_t)
files_read_var_lib_files(abrt_t)
files_read_usr_files(abrt_t)
-@@ -121,6 +196,9 @@ files_read_generic_tmp_files(abrt_t)
+@@ -121,6 +200,9 @@ files_read_generic_tmp_files(abrt_t)
files_read_kernel_modules(abrt_t)
files_dontaudit_list_default(abrt_t)
files_dontaudit_read_default_files(abrt_t)
@@ -576,7 +580,7 @@ index 30861ec..6c5549d 100644
fs_list_inotifyfs(abrt_t)
fs_getattr_all_fs(abrt_t)
-@@ -131,22 +209,39 @@ fs_read_nfs_files(abrt_t)
+@@ -131,22 +213,39 @@ fs_read_nfs_files(abrt_t)
fs_read_nfs_symlinks(abrt_t)
fs_search_all(abrt_t)
@@ -620,7 +624,7 @@ index 30861ec..6c5549d 100644
')
optional_policy(`
-@@ -167,6 +262,7 @@ optional_policy(`
+@@ -167,6 +266,7 @@ optional_policy(`
rpm_exec(abrt_t)
rpm_dontaudit_manage_db(abrt_t)
rpm_manage_cache(abrt_t)
@@ -628,7 +632,7 @@ index 30861ec..6c5549d 100644
rpm_manage_pid_files(abrt_t)
rpm_read_db(abrt_t)
rpm_signull(abrt_t)
-@@ -178,9 +274,36 @@ optional_policy(`
+@@ -178,9 +278,36 @@ optional_policy(`
')
optional_policy(`
@@ -665,7 +669,7 @@ index 30861ec..6c5549d 100644
########################################
#
# abrt--helper local policy
-@@ -196,13 +319,16 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
+@@ -196,13 +323,16 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_lnk_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
files_var_filetrans(abrt_helper_t, abrt_var_cache_t, { file dir })
@@ -683,7 +687,7 @@ index 30861ec..6c5549d 100644
fs_list_inotifyfs(abrt_helper_t)
fs_getattr_all_fs(abrt_helper_t)
-@@ -211,12 +337,11 @@ auth_use_nsswitch(abrt_helper_t)
+@@ -211,12 +341,11 @@ auth_use_nsswitch(abrt_helper_t)
logging_send_syslog_msg(abrt_helper_t)
@@ -698,7 +702,7 @@ index 30861ec..6c5549d 100644
userdom_dontaudit_read_user_home_content_files(abrt_helper_t)
userdom_dontaudit_read_user_tmp_files(abrt_helper_t)
dev_dontaudit_read_all_blk_files(abrt_helper_t)
-@@ -224,4 +349,188 @@ ifdef(`hide_broken_symptoms', `
+@@ -224,4 +353,191 @@ ifdef(`hide_broken_symptoms', `
dev_dontaudit_write_all_chr_files(abrt_helper_t)
dev_dontaudit_write_all_blk_files(abrt_helper_t)
fs_dontaudit_rw_anon_inodefs_files(abrt_helper_t)
@@ -706,7 +710,7 @@ index 30861ec..6c5549d 100644
+ optional_policy(`
+ rpm_dontaudit_leaks(abrt_helper_t)
+ ')
- ')
++')
+
+ifdef(`hide_broken_symptoms',`
+ gen_require(`
@@ -716,7 +720,7 @@ index 30861ec..6c5549d 100644
+ allow abrt_t self:capability sys_resource;
+ allow abrt_t domain:file write;
+ allow abrt_t domain:process setrlimit;
-+')
+ ')
+
+#######################################
+#
@@ -854,16 +858,19 @@ index 30861ec..6c5549d 100644
+
+manage_files_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
+manage_dirs_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_lnk_files_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
+files_tmp_filetrans(abrt_upload_watch_t, abrt_upload_watch_tmp_t, {file dir})
+
+read_files_pattern(abrt_upload_watch_t, abrt_etc_t, abrt_etc_t)
+
-+manage_dirs_pattern(abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_cache_t)
++manage_dirs_pattern(abrt_upload_watch_t, abrt_var_cache_t, abrt_var_cache_t)
+
+corecmd_exec_bin(abrt_upload_watch_t)
+
+dev_read_urand(abrt_upload_watch_t)
+
++files_search_spool(abrt_upload_watch_t)
++
+auth_read_passwd(abrt_upload_watch_t)
+
+tunable_policy(`abrt_upload_watch_anon_write',`
@@ -2321,10 +2328,10 @@ index 0000000..5fe8447
+ dev_getattr_all_blk_files(antivirus_domain)
+')
diff --git a/apache.fc b/apache.fc
-index fd9fa07..3f948ab 100644
+index fd9fa07..913433c 100644
--- a/apache.fc
+++ b/apache.fc
-@@ -1,20 +1,39 @@
+@@ -1,41 +1,67 @@
HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
+HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
+HOME_DIR/((www)|(web)|(public_html))(/.*)?/\.htaccess -- gen_context(system_u:object_r:httpd_user_htaccess_t,s0)
@@ -2364,8 +2371,9 @@ index fd9fa07..3f948ab 100644
+/usr/libexec/httpd-ssl-pass-dialog -- gen_context(system_u:object_r:httpd_passwd_exec_t,s0)
/srv/([^/]*/)?www(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
++/srv/([^/]*/)?www/logs(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
/srv/gallery2(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
-@@ -22,20 +41,26 @@ HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_u
+
/usr/bin/htsslpass -- gen_context(system_u:object_r:httpd_helper_exec_t,s0)
/usr/bin/mongrel_rails -- gen_context(system_u:object_r:httpd_exec_t,s0)
@@ -2399,7 +2407,7 @@ index fd9fa07..3f948ab 100644
/usr/sbin/rotatelogs -- gen_context(system_u:object_r:httpd_rotatelogs_exec_t,s0)
/usr/sbin/suexec -- gen_context(system_u:object_r:httpd_suexec_exec_t,s0)
-@@ -43,8 +68,9 @@ ifdef(`distro_suse', `
+@@ -43,8 +69,9 @@ ifdef(`distro_suse', `
/usr/sbin/httpd2-.* -- gen_context(system_u:object_r:httpd_exec_t,s0)
')
@@ -2411,7 +2419,7 @@ index fd9fa07..3f948ab 100644
/usr/share/htdig(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/usr/share/icecast(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/usr/share/mythweb(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
-@@ -54,9 +80,13 @@ ifdef(`distro_suse', `
+@@ -54,9 +81,13 @@ ifdef(`distro_suse', `
/usr/share/ntop/html(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/usr/share/openca/htdocs(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/usr/share/selinux-policy[^/]*/html(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
@@ -2425,7 +2433,7 @@ index fd9fa07..3f948ab 100644
/var/cache/httpd(/.*)? gen_context(system_u:object_r:httpd_cache_t,s0)
/var/cache/lighttpd(/.*)? gen_context(system_u:object_r:httpd_cache_t,s0)
-@@ -69,35 +99,59 @@ ifdef(`distro_suse', `
+@@ -69,35 +100,59 @@ ifdef(`distro_suse', `
/var/cache/php-.* gen_context(system_u:object_r:httpd_cache_t,s0)
/var/cache/php-eaccelerator(/.*)? gen_context(system_u:object_r:httpd_cache_t,s0)
/var/cache/php-mmcache(/.*)? gen_context(system_u:object_r:httpd_cache_t,s0)
@@ -2491,7 +2499,7 @@ index fd9fa07..3f948ab 100644
/var/spool/gosa(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
/var/spool/squirrelmail(/.*)? gen_context(system_u:object_r:squirrelmail_spool_t,s0)
-@@ -109,3 +163,38 @@ ifdef(`distro_debian', `
+@@ -109,3 +164,38 @@ ifdef(`distro_debian', `
/var/www/cgi-bin(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
/var/www/icons(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
/var/www/perl(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
@@ -37082,10 +37090,19 @@ index d4fcb75..1b888e9 100644
+ fs_manage_dos_files(mozilla_plugin_t)
')
diff --git a/mpd.fc b/mpd.fc
-index ddc14d6..5c34d21 100644
+index ddc14d6..9463a44 100644
--- a/mpd.fc
+++ b/mpd.fc
-@@ -6,3 +6,7 @@
+@@ -1,4 +1,7 @@
+-/etc/mpd\.conf -- gen_context(system_u:object_r:mpd_etc_t,s0)
++HOME_DIR/\.mpd(/.*)? gen_context(system_u:object_r:mpd_home_t,s0)
++
++/etc/mpd\.conf -- gen_context(system_u:object_r:mpd_etc_t,s0)
++
+ /etc/rc\.d/init\.d/mpd -- gen_context(system_u:object_r:mpd_initrc_exec_t,s0)
+
+ /usr/bin/mpd -- gen_context(system_u:object_r:mpd_exec_t,s0)
+@@ -6,3 +9,7 @@
/var/lib/mpd(/.*)? gen_context(system_u:object_r:mpd_var_lib_t,s0)
/var/lib/mpd/music(/.*)? gen_context(system_u:object_r:mpd_data_t,s0)
/var/lib/mpd/playlists(/.*)? gen_context(system_u:object_r:mpd_data_t,s0)
@@ -37186,23 +37203,26 @@ index d72276f..695854e 100644
mpd_initrc_domtrans($1)
domain_system_change_exemption($1)
diff --git a/mpd.te b/mpd.te
-index 7f68872..65970eb 100644
+index 7f68872..6b8af19 100644
--- a/mpd.te
+++ b/mpd.te
-@@ -31,6 +31,12 @@ files_tmpfs_file(mpd_tmpfs_t)
+@@ -31,6 +31,15 @@ files_tmpfs_file(mpd_tmpfs_t)
type mpd_var_lib_t;
files_type(mpd_var_lib_t)
+type mpd_user_data_t;
+userdom_user_home_content(mpd_user_data_t) # customizable
+
++type mpd_home_t;
++userdom_user_home_content(mpd_home_t)
++
+type mpd_var_run_t;
+files_pid_file(mpd_var_run_t)
+
########################################
#
# mpd local policy
-@@ -44,6 +50,9 @@ allow mpd_t self:unix_stream_socket { connectto create_stream_socket_perms };
+@@ -44,6 +53,9 @@ allow mpd_t self:unix_stream_socket { connectto create_stream_socket_perms };
allow mpd_t self:unix_dgram_socket { create_socket_perms sendto };
allow mpd_t self:tcp_socket create_stream_socket_perms;
allow mpd_t self:netlink_kobject_uevent_socket create_socket_perms;
@@ -37212,7 +37232,7 @@ index 7f68872..65970eb 100644
manage_dirs_pattern(mpd_t, mpd_data_t, mpd_data_t)
manage_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
-@@ -51,6 +60,10 @@ manage_lnk_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
+@@ -51,6 +63,10 @@ manage_lnk_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
read_files_pattern(mpd_t, mpd_etc_t, mpd_etc_t)
@@ -37223,7 +37243,7 @@ index 7f68872..65970eb 100644
manage_dirs_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
manage_files_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
manage_sock_files_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
-@@ -65,14 +78,18 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
+@@ -65,14 +81,22 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
files_var_lib_filetrans(mpd_t, mpd_var_lib_t, { dir file lnk_file })
@@ -37234,6 +37254,10 @@ index 7f68872..65970eb 100644
+manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
+files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file })
+
++manage_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
++manage_dirs_pattern(mpd_t, mpd_home_t, mpd_home_t)
++manage_lnk_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
++
kernel_getattr_proc(mpd_t)
kernel_read_system_state(mpd_t)
kernel_read_kernel_sysctls(mpd_t)
@@ -37244,7 +37268,7 @@ index 7f68872..65970eb 100644
corenet_all_recvfrom_netlabel(mpd_t)
corenet_tcp_sendrecv_generic_if(mpd_t)
corenet_tcp_sendrecv_generic_node(mpd_t)
-@@ -87,13 +104,15 @@ corenet_sendrecv_http_cache_client_packets(mpd_t)
+@@ -87,13 +111,15 @@ corenet_sendrecv_http_cache_client_packets(mpd_t)
corenet_sendrecv_pulseaudio_client_packets(mpd_t)
corenet_sendrecv_soundd_client_packets(mpd_t)
@@ -37261,7 +37285,7 @@ index 7f68872..65970eb 100644
fs_list_inotifyfs(mpd_t)
fs_rw_anon_inodefs_files(mpd_t)
-@@ -101,7 +120,9 @@ auth_use_nsswitch(mpd_t)
+@@ -101,7 +127,9 @@ auth_use_nsswitch(mpd_t)
logging_send_syslog_msg(mpd_t)
@@ -37272,7 +37296,7 @@ index 7f68872..65970eb 100644
optional_policy(`
alsa_read_rw_config(mpd_t)
-@@ -122,5 +143,20 @@ optional_policy(`
+@@ -122,5 +150,20 @@ optional_policy(`
')
optional_policy(`
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 4f78bfc..a826e75 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.11.1
-Release: 104%{?dist}
+Release: 105%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -521,6 +521,14 @@ SELinux Reference policy mls base module.
%endif
%Changelog
+* Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105
+- Fix typo in abrt.te
+- Label /srv/www/logs as httpd_log_t
+- Allow abrt daemon to manage abrt-watch tmp files
+- Allow abrt-upload-watcher to search /var/spool directory
+- Fix typo in abrt.te
+- Allow getsched in staff_t
+
* Tue Sep 24 2013 Miroslav Grepl <mgrepl at redhat.com> 3.10.1-104
- Add back selinux-policy-{minimum,mls} pkgs
More information about the scm-commits
mailing list