[selinux-policy/f18] * Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105 - Fix typo in abrt.te - Label /srv/ww

Lukas Vrabec lvrabec at fedoraproject.org
Thu Sep 26 09:23:01 UTC 2013


commit d302afdb115abe0d0033a3f1bb3116aca59ca458
Author: Lukas Vrabec <lvrabec at redhat.com>
Date:   Thu Sep 26 11:22:40 2013 +0200

    * Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105
    - Fix typo in abrt.te
    - Label /srv/www/logs as httpd_log_t
    - Allow abrt daemon to manage abrt-watch tmp files
    - Allow abrt-upload-watcher to search /var/spool directory
    - Fix typo in abrt.te
    - Allow getsched in staff_t

 policy-f18-base.patch    |   21 ++++++-----
 policy-f18-contrib.patch |   88 +++++++++++++++++++++++++++++-----------------
 selinux-policy.spec      |   10 +++++-
 3 files changed, 76 insertions(+), 43 deletions(-)
---
diff --git a/policy-f18-base.patch b/policy-f18-base.patch
index d0eb01f..5552eab 100644
--- a/policy-f18-base.patch
+++ b/policy-f18-base.patch
@@ -124809,10 +124809,10 @@ index 234a940..d340f20 100644
  ########################################
  ## <summary>
 diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
-index e5aee97..56fed3b 100644
+index e5aee97..9de0f5a 100644
 --- a/policy/modules/roles/staff.te
 +++ b/policy/modules/roles/staff.te
-@@ -8,12 +8,67 @@ policy_module(staff, 2.3.0)
+@@ -8,12 +8,68 @@ policy_module(staff, 2.3.0)
  role staff_r;
  
  userdom_unpriv_user_template(staff)
@@ -124845,6 +124845,7 @@ index e5aee97..56fed3b 100644
 +
 +domain_read_all_domains_state(staff_t)
 +domain_getattr_all_domains(staff_t)
++domain_getsched_all_domains(staff_t)
 +domain_obj_id_change_exemption(staff_t)
 +
 +files_read_kernel_modules(staff_t)
@@ -124880,7 +124881,7 @@ index e5aee97..56fed3b 100644
  optional_policy(`
  	apache_role(staff_r, staff_t)
  ')
-@@ -23,11 +78,106 @@ optional_policy(`
+@@ -23,11 +79,106 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -124988,7 +124989,7 @@ index e5aee97..56fed3b 100644
  ')
  
  optional_policy(`
-@@ -35,15 +185,31 @@ optional_policy(`
+@@ -35,15 +186,31 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -125022,7 +125023,7 @@ index e5aee97..56fed3b 100644
  ')
  
  optional_policy(`
-@@ -52,10 +218,60 @@ optional_policy(`
+@@ -52,10 +219,60 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -125083,7 +125084,7 @@ index e5aee97..56fed3b 100644
  	xserver_role(staff_r, staff_t)
  ')
  
-@@ -65,10 +281,6 @@ ifndef(`distro_redhat',`
+@@ -65,10 +282,6 @@ ifndef(`distro_redhat',`
  	')
  
  	optional_policy(`
@@ -125094,7 +125095,7 @@ index e5aee97..56fed3b 100644
  		cdrecord_role(staff_r, staff_t)
  	')
  
-@@ -93,18 +305,10 @@ ifndef(`distro_redhat',`
+@@ -93,18 +306,10 @@ ifndef(`distro_redhat',`
  	')
  
  	optional_policy(`
@@ -125113,7 +125114,7 @@ index e5aee97..56fed3b 100644
  		java_role(staff_r, staff_t)
  	')
  
-@@ -125,10 +329,6 @@ ifndef(`distro_redhat',`
+@@ -125,10 +330,6 @@ ifndef(`distro_redhat',`
  	')
  
  	optional_policy(`
@@ -125124,7 +125125,7 @@ index e5aee97..56fed3b 100644
  		pyzor_role(staff_r, staff_t)
  	')
  
-@@ -141,10 +341,6 @@ ifndef(`distro_redhat',`
+@@ -141,10 +342,6 @@ ifndef(`distro_redhat',`
  	')
  
  	optional_policy(`
@@ -125135,7 +125136,7 @@ index e5aee97..56fed3b 100644
  		spamassassin_role(staff_r, staff_t)
  	')
  
-@@ -176,3 +372,22 @@ ifndef(`distro_redhat',`
+@@ -176,3 +373,22 @@ ifndef(`distro_redhat',`
  		wireshark_role(staff_r, staff_t)
  	')
  ')
diff --git a/policy-f18-contrib.patch b/policy-f18-contrib.patch
index fffec53..256fe0f 100644
--- a/policy-f18-contrib.patch
+++ b/policy-f18-contrib.patch
@@ -370,7 +370,7 @@ index 0b827c5..cce58bb 100644
 +	dontaudit $1 abrt_t:sock_file write;
  ')
 diff --git a/abrt.te b/abrt.te
-index 30861ec..6c5549d 100644
+index 30861ec..c23e41d 100644
 --- a/abrt.te
 +++ b/abrt.te
 @@ -5,13 +5,41 @@ policy_module(abrt, 1.2.0)
@@ -518,7 +518,7 @@ index 30861ec..6c5549d 100644
  
  # abrt var/cache files
  manage_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
-@@ -76,16 +147,18 @@ manage_dirs_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
+@@ -76,16 +147,22 @@ manage_dirs_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
  manage_lnk_files_pattern(abrt_t, abrt_var_cache_t, abrt_var_cache_t)
  files_var_filetrans(abrt_t, abrt_var_cache_t, { file dir })
  files_spool_filetrans(abrt_t, abrt_var_cache_t, dir)
@@ -531,6 +531,10 @@ index 30861ec..6c5549d 100644
  manage_lnk_files_pattern(abrt_t, abrt_var_run_t, abrt_var_run_t)
 -files_pid_filetrans(abrt_t, abrt_var_run_t, { file dir })
 +files_pid_filetrans(abrt_t, abrt_var_run_t, { file dir sock_file })
++
++manage_files_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_dirs_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_lnk_files_pattern(abrt_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
  
  kernel_read_ring_buffer(abrt_t)
 -kernel_read_system_state(abrt_t)
@@ -539,7 +543,7 @@ index 30861ec..6c5549d 100644
  kernel_rw_kernel_sysctl(abrt_t)
  
  corecmd_exec_bin(abrt_t)
-@@ -93,7 +166,6 @@ corecmd_exec_shell(abrt_t)
+@@ -93,7 +170,6 @@ corecmd_exec_shell(abrt_t)
  corecmd_read_all_executables(abrt_t)
  
  corenet_all_recvfrom_netlabel(abrt_t)
@@ -547,7 +551,7 @@ index 30861ec..6c5549d 100644
  corenet_tcp_sendrecv_generic_if(abrt_t)
  corenet_tcp_sendrecv_generic_node(abrt_t)
  corenet_tcp_sendrecv_generic_port(abrt_t)
-@@ -104,6 +176,8 @@ corenet_tcp_connect_all_ports(abrt_t)
+@@ -104,6 +180,8 @@ corenet_tcp_connect_all_ports(abrt_t)
  corenet_sendrecv_http_client_packets(abrt_t)
  
  dev_getattr_all_chr_files(abrt_t)
@@ -556,7 +560,7 @@ index 30861ec..6c5549d 100644
  dev_read_urand(abrt_t)
  dev_rw_sysfs(abrt_t)
  dev_dontaudit_read_raw_memory(abrt_t)
-@@ -113,7 +187,8 @@ domain_read_all_domains_state(abrt_t)
+@@ -113,7 +191,8 @@ domain_read_all_domains_state(abrt_t)
  domain_signull_all_domains(abrt_t)
  
  files_getattr_all_files(abrt_t)
@@ -566,7 +570,7 @@ index 30861ec..6c5549d 100644
  files_read_var_symlinks(abrt_t)
  files_read_var_lib_files(abrt_t)
  files_read_usr_files(abrt_t)
-@@ -121,6 +196,9 @@ files_read_generic_tmp_files(abrt_t)
+@@ -121,6 +200,9 @@ files_read_generic_tmp_files(abrt_t)
  files_read_kernel_modules(abrt_t)
  files_dontaudit_list_default(abrt_t)
  files_dontaudit_read_default_files(abrt_t)
@@ -576,7 +580,7 @@ index 30861ec..6c5549d 100644
  
  fs_list_inotifyfs(abrt_t)
  fs_getattr_all_fs(abrt_t)
-@@ -131,22 +209,39 @@ fs_read_nfs_files(abrt_t)
+@@ -131,22 +213,39 @@ fs_read_nfs_files(abrt_t)
  fs_read_nfs_symlinks(abrt_t)
  fs_search_all(abrt_t)
  
@@ -620,7 +624,7 @@ index 30861ec..6c5549d 100644
  ')
  
  optional_policy(`
-@@ -167,6 +262,7 @@ optional_policy(`
+@@ -167,6 +266,7 @@ optional_policy(`
  	rpm_exec(abrt_t)
  	rpm_dontaudit_manage_db(abrt_t)
  	rpm_manage_cache(abrt_t)
@@ -628,7 +632,7 @@ index 30861ec..6c5549d 100644
  	rpm_manage_pid_files(abrt_t)
  	rpm_read_db(abrt_t)
  	rpm_signull(abrt_t)
-@@ -178,9 +274,36 @@ optional_policy(`
+@@ -178,9 +278,36 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -665,7 +669,7 @@ index 30861ec..6c5549d 100644
  ########################################
  #
  # abrt--helper local policy
-@@ -196,13 +319,16 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
+@@ -196,13 +323,16 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
  manage_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
  manage_lnk_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
  files_var_filetrans(abrt_helper_t, abrt_var_cache_t, { file dir })
@@ -683,7 +687,7 @@ index 30861ec..6c5549d 100644
  
  fs_list_inotifyfs(abrt_helper_t)
  fs_getattr_all_fs(abrt_helper_t)
-@@ -211,12 +337,11 @@ auth_use_nsswitch(abrt_helper_t)
+@@ -211,12 +341,11 @@ auth_use_nsswitch(abrt_helper_t)
  
  logging_send_syslog_msg(abrt_helper_t)
  
@@ -698,7 +702,7 @@ index 30861ec..6c5549d 100644
  	userdom_dontaudit_read_user_home_content_files(abrt_helper_t)
  	userdom_dontaudit_read_user_tmp_files(abrt_helper_t)
  	dev_dontaudit_read_all_blk_files(abrt_helper_t)
-@@ -224,4 +349,188 @@ ifdef(`hide_broken_symptoms', `
+@@ -224,4 +353,191 @@ ifdef(`hide_broken_symptoms', `
  	dev_dontaudit_write_all_chr_files(abrt_helper_t)
  	dev_dontaudit_write_all_blk_files(abrt_helper_t)
  	fs_dontaudit_rw_anon_inodefs_files(abrt_helper_t)
@@ -706,7 +710,7 @@ index 30861ec..6c5549d 100644
 +	optional_policy(`
 +		rpm_dontaudit_leaks(abrt_helper_t)
 +	')
- ')
++')
 +
 +ifdef(`hide_broken_symptoms',`
 +	gen_require(`
@@ -716,7 +720,7 @@ index 30861ec..6c5549d 100644
 +	allow abrt_t self:capability sys_resource;
 +	allow abrt_t domain:file write;
 +	allow abrt_t domain:process setrlimit;
-+')
+ ')
 +
 +#######################################
 +#
@@ -854,16 +858,19 @@ index 30861ec..6c5549d 100644
 +
 +manage_files_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
 +manage_dirs_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
++manage_lnk_files_pattern(abrt_upload_watch_t, abrt_upload_watch_tmp_t, abrt_upload_watch_tmp_t)
 +files_tmp_filetrans(abrt_upload_watch_t, abrt_upload_watch_tmp_t, {file dir})
 +
 +read_files_pattern(abrt_upload_watch_t, abrt_etc_t, abrt_etc_t)
 +
-+manage_dirs_pattern(abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_cache_t)
++manage_dirs_pattern(abrt_upload_watch_t, abrt_var_cache_t, abrt_var_cache_t)
 +
 +corecmd_exec_bin(abrt_upload_watch_t)
 +
 +dev_read_urand(abrt_upload_watch_t)
 +
++files_search_spool(abrt_upload_watch_t)
++
 +auth_read_passwd(abrt_upload_watch_t)
 +
 +tunable_policy(`abrt_upload_watch_anon_write',`
@@ -2321,10 +2328,10 @@ index 0000000..5fe8447
 +        dev_getattr_all_blk_files(antivirus_domain)
 +')
 diff --git a/apache.fc b/apache.fc
-index fd9fa07..3f948ab 100644
+index fd9fa07..913433c 100644
 --- a/apache.fc
 +++ b/apache.fc
-@@ -1,20 +1,39 @@
+@@ -1,41 +1,67 @@
  HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
 +HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
 +HOME_DIR/((www)|(web)|(public_html))(/.*)?/\.htaccess	--	gen_context(system_u:object_r:httpd_user_htaccess_t,s0)
@@ -2364,8 +2371,9 @@ index fd9fa07..3f948ab 100644
 +/usr/libexec/httpd-ssl-pass-dialog      --      gen_context(system_u:object_r:httpd_passwd_exec_t,s0)
  
  /srv/([^/]*/)?www(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
++/srv/([^/]*/)?www/logs(/.*)?        gen_context(system_u:object_r:httpd_log_t,s0)
  /srv/gallery2(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
-@@ -22,20 +41,26 @@ HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_u
+ 
  /usr/bin/htsslpass 		--	gen_context(system_u:object_r:httpd_helper_exec_t,s0)
  /usr/bin/mongrel_rails		--	gen_context(system_u:object_r:httpd_exec_t,s0)
  
@@ -2399,7 +2407,7 @@ index fd9fa07..3f948ab 100644
  /usr/sbin/rotatelogs		--	gen_context(system_u:object_r:httpd_rotatelogs_exec_t,s0)
  /usr/sbin/suexec		--	gen_context(system_u:object_r:httpd_suexec_exec_t,s0)
  
-@@ -43,8 +68,9 @@ ifdef(`distro_suse', `
+@@ -43,8 +69,9 @@ ifdef(`distro_suse', `
  /usr/sbin/httpd2-.*		--	gen_context(system_u:object_r:httpd_exec_t,s0)
  ')
  
@@ -2411,7 +2419,7 @@ index fd9fa07..3f948ab 100644
  /usr/share/htdig(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /usr/share/icecast(/.*)?		gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /usr/share/mythweb(/.*)?		gen_context(system_u:object_r:httpd_sys_content_t,s0)
-@@ -54,9 +80,13 @@ ifdef(`distro_suse', `
+@@ -54,9 +81,13 @@ ifdef(`distro_suse', `
  /usr/share/ntop/html(/.*)?		gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /usr/share/openca/htdocs(/.*)?		gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /usr/share/selinux-policy[^/]*/html(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
@@ -2425,7 +2433,7 @@ index fd9fa07..3f948ab 100644
  
  /var/cache/httpd(/.*)?			gen_context(system_u:object_r:httpd_cache_t,s0)
  /var/cache/lighttpd(/.*)?		gen_context(system_u:object_r:httpd_cache_t,s0)
-@@ -69,35 +99,59 @@ ifdef(`distro_suse', `
+@@ -69,35 +100,59 @@ ifdef(`distro_suse', `
  /var/cache/php-.*			gen_context(system_u:object_r:httpd_cache_t,s0)
  /var/cache/php-eaccelerator(/.*)?	gen_context(system_u:object_r:httpd_cache_t,s0)
  /var/cache/php-mmcache(/.*)?		gen_context(system_u:object_r:httpd_cache_t,s0)
@@ -2491,7 +2499,7 @@ index fd9fa07..3f948ab 100644
  
  /var/spool/gosa(/.*)?			gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
  /var/spool/squirrelmail(/.*)?		gen_context(system_u:object_r:squirrelmail_spool_t,s0)
-@@ -109,3 +163,38 @@ ifdef(`distro_debian', `
+@@ -109,3 +164,38 @@ ifdef(`distro_debian', `
  /var/www/cgi-bin(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
  /var/www/icons(/.*)?			gen_context(system_u:object_r:httpd_sys_content_t,s0)
  /var/www/perl(/.*)?			gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
@@ -37082,10 +37090,19 @@ index d4fcb75..1b888e9 100644
 +    fs_manage_dos_files(mozilla_plugin_t)
  ')
 diff --git a/mpd.fc b/mpd.fc
-index ddc14d6..5c34d21 100644
+index ddc14d6..9463a44 100644
 --- a/mpd.fc
 +++ b/mpd.fc
-@@ -6,3 +6,7 @@
+@@ -1,4 +1,7 @@
+-/etc/mpd\.conf		--	gen_context(system_u:object_r:mpd_etc_t,s0)
++HOME_DIR/\.mpd(/.*)?    gen_context(system_u:object_r:mpd_home_t,s0)
++
++/etc/mpd\.conf  	--    gen_context(system_u:object_r:mpd_etc_t,s0)
++
+ /etc/rc\.d/init\.d/mpd	--	gen_context(system_u:object_r:mpd_initrc_exec_t,s0)
+ 
+ /usr/bin/mpd		--	gen_context(system_u:object_r:mpd_exec_t,s0)
+@@ -6,3 +9,7 @@
  /var/lib/mpd(/.*)?		gen_context(system_u:object_r:mpd_var_lib_t,s0)
  /var/lib/mpd/music(/.*)?	gen_context(system_u:object_r:mpd_data_t,s0)
  /var/lib/mpd/playlists(/.*)?	gen_context(system_u:object_r:mpd_data_t,s0)
@@ -37186,23 +37203,26 @@ index d72276f..695854e 100644
  	mpd_initrc_domtrans($1)
  	domain_system_change_exemption($1)
 diff --git a/mpd.te b/mpd.te
-index 7f68872..65970eb 100644
+index 7f68872..6b8af19 100644
 --- a/mpd.te
 +++ b/mpd.te
-@@ -31,6 +31,12 @@ files_tmpfs_file(mpd_tmpfs_t)
+@@ -31,6 +31,15 @@ files_tmpfs_file(mpd_tmpfs_t)
  type mpd_var_lib_t;
  files_type(mpd_var_lib_t)
  
 +type mpd_user_data_t;
 +userdom_user_home_content(mpd_user_data_t) # customizable
 +
++type mpd_home_t;
++userdom_user_home_content(mpd_home_t)
++
 +type mpd_var_run_t;
 +files_pid_file(mpd_var_run_t)
 +
  ########################################
  #
  # mpd local policy
-@@ -44,6 +50,9 @@ allow mpd_t self:unix_stream_socket { connectto create_stream_socket_perms };
+@@ -44,6 +53,9 @@ allow mpd_t self:unix_stream_socket { connectto create_stream_socket_perms };
  allow mpd_t self:unix_dgram_socket { create_socket_perms sendto };
  allow mpd_t self:tcp_socket create_stream_socket_perms;
  allow mpd_t self:netlink_kobject_uevent_socket create_socket_perms;
@@ -37212,7 +37232,7 @@ index 7f68872..65970eb 100644
  
  manage_dirs_pattern(mpd_t, mpd_data_t, mpd_data_t)
  manage_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
-@@ -51,6 +60,10 @@ manage_lnk_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
+@@ -51,6 +63,10 @@ manage_lnk_files_pattern(mpd_t, mpd_data_t, mpd_data_t)
  
  read_files_pattern(mpd_t, mpd_etc_t, mpd_etc_t)
  
@@ -37223,7 +37243,7 @@ index 7f68872..65970eb 100644
  manage_dirs_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
  manage_files_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
  manage_sock_files_pattern(mpd_t, mpd_tmp_t, mpd_tmp_t)
-@@ -65,14 +78,18 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
+@@ -65,14 +81,22 @@ manage_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
  manage_lnk_files_pattern(mpd_t, mpd_var_lib_t, mpd_var_lib_t)
  files_var_lib_filetrans(mpd_t, mpd_var_lib_t, { dir file lnk_file })
  
@@ -37234,6 +37254,10 @@ index 7f68872..65970eb 100644
 +manage_lnk_files_pattern(mpd_t, mpd_var_run_t, mpd_var_run_t)
 +files_pid_filetrans(mpd_t, mpd_var_run_t, { file dir sock_file })
 +
++manage_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
++manage_dirs_pattern(mpd_t, mpd_home_t, mpd_home_t)
++manage_lnk_files_pattern(mpd_t, mpd_home_t, mpd_home_t)
++
  kernel_getattr_proc(mpd_t)
  kernel_read_system_state(mpd_t)
  kernel_read_kernel_sysctls(mpd_t)
@@ -37244,7 +37268,7 @@ index 7f68872..65970eb 100644
  corenet_all_recvfrom_netlabel(mpd_t)
  corenet_tcp_sendrecv_generic_if(mpd_t)
  corenet_tcp_sendrecv_generic_node(mpd_t)
-@@ -87,13 +104,15 @@ corenet_sendrecv_http_cache_client_packets(mpd_t)
+@@ -87,13 +111,15 @@ corenet_sendrecv_http_cache_client_packets(mpd_t)
  corenet_sendrecv_pulseaudio_client_packets(mpd_t)
  corenet_sendrecv_soundd_client_packets(mpd_t)
  
@@ -37261,7 +37285,7 @@ index 7f68872..65970eb 100644
  fs_list_inotifyfs(mpd_t)
  fs_rw_anon_inodefs_files(mpd_t)
  
-@@ -101,7 +120,9 @@ auth_use_nsswitch(mpd_t)
+@@ -101,7 +127,9 @@ auth_use_nsswitch(mpd_t)
  
  logging_send_syslog_msg(mpd_t)
  
@@ -37272,7 +37296,7 @@ index 7f68872..65970eb 100644
  
  optional_policy(`
  	alsa_read_rw_config(mpd_t)
-@@ -122,5 +143,20 @@ optional_policy(`
+@@ -122,5 +150,20 @@ optional_policy(`
  ')
  
  optional_policy(`
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 4f78bfc..a826e75 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -19,7 +19,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.11.1
-Release: 104%{?dist}
+Release: 105%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -521,6 +521,14 @@ SELinux Reference policy mls base module.
 %endif
 
 %Changelog
+* Thu Sep 26 2013 Lukas Vrabec <lvrabec at redhat.com> 3.10.1-105
+- Fix typo in abrt.te
+- Label /srv/www/logs as httpd_log_t
+- Allow abrt daemon to manage abrt-watch tmp files
+- Allow abrt-upload-watcher to search /var/spool directory
+- Fix typo in abrt.te
+- Allow getsched in staff_t
+
 * Tue Sep 24 2013 Miroslav Grepl <mgrepl at redhat.com> 3.10.1-104
 - Add back selinux-policy-{minimum,mls} pkgs
 


More information about the scm-commits mailing list