diff --git a/policy-20090521.patch b/policy-20090521.patch index 92f8496..20f9840 100644 --- a/policy-20090521.patch +++ b/policy-20090521.patch @@ -2568,7 +2568,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups.te serefpolicy-3.6.12/policy/modules/services/cups.te --- nsaserefpolicy/policy/modules/services/cups.te 2009-06-25 10:19:44.000000000 +0200 -+++ serefpolicy-3.6.12/policy/modules/services/cups.te 2009-08-13 09:15:32.000000000 +0200 ++++ serefpolicy-3.6.12/policy/modules/services/cups.te 2009-11-05 17:54:34.000000000 +0100 @@ -59,12 +59,13 @@ init_daemon_domain(hplip_t, hplip_exec_t) # For CUPS to run as a backend @@ -2618,7 +2618,15 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol manage_fifo_files_pattern(hplip_t, hplip_tmp_t, hplip_tmp_t) files_tmp_filetrans(hplip_t, hplip_tmp_t, fifo_file ) -@@ -615,6 +622,7 @@ +@@ -604,6 +611,7 @@ + corenet_tcp_connect_ipp_port(hplip_t) + corenet_sendrecv_hplip_client_packets(hplip_t) + corenet_receive_hplip_server_packets(hplip_t) ++corenet_udp_bind_howl_port(hplip_t) + + dev_read_sysfs(hplip_t) + dev_rw_printer(hplip_t) +@@ -615,6 +623,7 @@ fs_getattr_all_fs(hplip_t) fs_search_auto_mountpoints(hplip_t) @@ -2626,7 +2634,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol # for python corecmd_exec_bin(hplip_t) -@@ -733,6 +741,8 @@ +@@ -733,6 +742,8 @@ files_read_etc_files(cups_pdf_t) files_read_usr_files(cups_pdf_t) @@ -2635,7 +2643,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol kernel_read_system_state(cups_pdf_t) auth_use_nsswitch(cups_pdf_t) -@@ -746,6 +756,7 @@ +@@ -746,6 +757,7 @@ manage_dirs_pattern(cups_pdf_t, cups_pdf_tmp_t, cups_pdf_tmp_t) files_tmp_filetrans(cups_pdf_t, cups_pdf_tmp_t, { file dir }) @@ -2643,7 +2651,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol userdom_home_filetrans_user_home_dir(cups_pdf_t) userdom_manage_user_home_content_dirs(cups_pdf_t) userdom_manage_user_home_content_files(cups_pdf_t) -@@ -765,3 +776,10 @@ +@@ -765,3 +777,10 @@ manage_files_pattern(cups_pdf_t, cupsd_log_t, cupsd_log_t) miscfiles_read_fonts(cups_pdf_t) @@ -3479,7 +3487,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol ######################################## diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysql.te serefpolicy-3.6.12/policy/modules/services/mysql.te --- nsaserefpolicy/policy/modules/services/mysql.te 2009-06-25 10:19:44.000000000 +0200 -+++ serefpolicy-3.6.12/policy/modules/services/mysql.te 2009-08-04 11:04:57.000000000 +0200 ++++ serefpolicy-3.6.12/policy/modules/services/mysql.te 2009-11-05 17:55:55.000000000 +0100 @@ -136,10 +136,14 @@ allow mysqld_safe_t self:capability { dac_override fowner chown }; allow mysqld_safe_t self:fifo_file rw_fifo_file_perms; @@ -3490,7 +3498,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file) -mysql_append_db_files(mysqld_safe_t) -+domain_getattr_all_domains(mysqld_safe_t) ++domain_read_all_domains_state(mysqld_safe_t) + +mysql_manage_db_files(mysqld_safe_t) mysql_read_config(mysqld_safe_t) diff --git a/selinux-policy.spec b/selinux-policy.spec index 7b688e1..ad7c22a 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -20,7 +20,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.6.12 -Release: 87%{?dist} +Release: 88%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -442,6 +442,9 @@ exit 0 %endif %changelog +* Thu Nov 5 2009 Miroslav Grepl 3.6.12-88 +- Allow hplip to bind to howl_port_t + * Fri Oct 30 2009 Miroslav Grepl 3.6.12-87 - Allow consolekit to manage /var/run/console directory - Fixed sssd policy