diff --git a/policy-20080710.patch b/policy-20080710.patch index f4ecbae..da900d8 100644 --- a/policy-20080710.patch +++ b/policy-20080710.patch @@ -18090,7 +18090,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. +') diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-3.5.13/policy/modules/services/hal.te --- nsaserefpolicy/policy/modules/services/hal.te 2008-10-17 14:49:13.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/hal.te 2009-04-14 10:23:38.000000000 +0200 ++++ serefpolicy-3.5.13/policy/modules/services/hal.te 2009-05-19 10:45:26.000000000 +0200 @@ -49,6 +49,15 @@ type hald_var_lib_t; files_type(hald_var_lib_t) @@ -18115,8 +18115,11 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. kernel_read_system_state(hald_t) kernel_read_network_state(hald_t) -@@ -143,11 +153,16 @@ +@@ -141,13 +151,19 @@ + # hal is now execing pm-suspend + files_create_boot_flag(hald_t) files_getattr_all_dirs(hald_t) ++files_getattr_all_files(hald_t) files_read_kernel_img(hald_t) files_rw_lock_dirs(hald_t) +files_read_generic_pids(hald_t) @@ -18132,7 +18135,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. files_getattr_all_mountpoints(hald_t) mls_file_read_all_levels(hald_t) -@@ -197,6 +212,7 @@ +@@ -197,6 +213,7 @@ seutil_read_file_contexts(hald_t) sysnet_read_config(hald_t) @@ -18140,7 +18143,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. userdom_dontaudit_use_unpriv_user_fds(hald_t) -@@ -280,6 +296,16 @@ +@@ -280,6 +297,16 @@ ') optional_policy(` @@ -18157,7 +18160,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. rpc_search_nfs_state_data(hald_t) ') -@@ -300,12 +326,20 @@ +@@ -300,12 +327,20 @@ vbetool_domtrans(hald_t) ') @@ -18179,7 +18182,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. allow hald_acl_t self:process { getattr signal }; allow hald_acl_t self:fifo_file rw_fifo_file_perms; -@@ -326,6 +360,7 @@ +@@ -326,6 +361,7 @@ dev_getattr_all_chr_files(hald_acl_t) dev_setattr_all_chr_files(hald_acl_t) dev_getattr_generic_usb_dev(hald_acl_t) @@ -18187,7 +18190,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. dev_getattr_video_dev(hald_acl_t) dev_setattr_video_dev(hald_acl_t) dev_getattr_sound_dev(hald_acl_t) -@@ -338,19 +373,30 @@ +@@ -338,19 +374,30 @@ storage_getattr_removable_dev(hald_acl_t) storage_setattr_removable_dev(hald_acl_t) @@ -18218,7 +18221,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. domtrans_pattern(hald_t, hald_mac_exec_t, hald_mac_t) allow hald_t hald_mac_t:process signal; allow hald_mac_t hald_t:unix_stream_socket connectto; -@@ -359,6 +405,8 @@ +@@ -359,6 +406,8 @@ manage_files_pattern(hald_mac_t, hald_var_lib_t, hald_var_lib_t) files_search_var_lib(hald_mac_t) @@ -18227,7 +18230,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. kernel_read_system_state(hald_mac_t) dev_read_raw_memory(hald_mac_t) -@@ -366,10 +414,15 @@ +@@ -366,10 +415,15 @@ dev_read_sysfs(hald_mac_t) files_read_usr_files(hald_mac_t) @@ -18243,7 +18246,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. miscfiles_read_localization(hald_mac_t) ######################################## -@@ -388,6 +441,8 @@ +@@ -388,6 +442,8 @@ manage_files_pattern(hald_sonypic_t, hald_var_lib_t, hald_var_lib_t) files_search_var_lib(hald_sonypic_t) @@ -18252,7 +18255,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. files_read_usr_files(hald_sonypic_t) libs_use_ld_so(hald_sonypic_t) -@@ -408,6 +463,8 @@ +@@ -408,6 +464,8 @@ manage_files_pattern(hald_keymap_t, hald_var_lib_t, hald_var_lib_t) files_search_var_lib(hald_keymap_t) @@ -18261,7 +18264,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal. dev_rw_input_dev(hald_keymap_t) files_read_usr_files(hald_keymap_t) -@@ -419,4 +476,53 @@ +@@ -419,4 +477,53 @@ # This is caused by a bug in hald and PolicyKit. # Should be removed when this is fixed @@ -25543,8 +25546,10 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/psad + diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pyzor.fc serefpolicy-3.5.13/policy/modules/services/pyzor.fc --- nsaserefpolicy/policy/modules/services/pyzor.fc 2008-10-17 14:49:11.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/pyzor.fc 2009-02-10 15:07:15.000000000 +0100 -@@ -1,6 +1,8 @@ ++++ serefpolicy-3.5.13/policy/modules/services/pyzor.fc 2009-05-21 14:36:40.000000000 +0200 +@@ -1,6 +1,10 @@ ++/root/\.pyzor(/.*)? gen_context(system_u:object_r:spamc_home_t,s0) ++ /etc/pyzor(/.*)? gen_context(system_u:object_r:pyzor_etc_t, s0) +/etc/rc\.d/init\.d/pyzord -- gen_context(system_u:object_r:pyzord_initrc_exec_t,s0) @@ -28219,9 +28224,11 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/snor ') diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/spamassassin.fc serefpolicy-3.5.13/policy/modules/services/spamassassin.fc --- nsaserefpolicy/policy/modules/services/spamassassin.fc 2008-10-17 14:49:11.000000000 +0200 -+++ serefpolicy-3.5.13/policy/modules/services/spamassassin.fc 2009-04-14 17:49:28.000000000 +0200 -@@ -1,16 +1,24 @@ ++++ serefpolicy-3.5.13/policy/modules/services/spamassassin.fc 2009-05-21 14:36:57.000000000 +0200 +@@ -1,16 +1,26 @@ -HOME_DIR/\.spamassassin(/.*)? gen_context(system_u:object_r:ROLE_spamassassin_home_t,s0) ++/root/\.spamassassin(/.*)? gen_context(system_u:object_r:spamc_home_t,s0) ++ +HOME_DIR/\.spamassassin(/.*)? gen_context(system_u:object_r:spamc_home_t,s0) + +/etc/rc\.d/init\.d/spamd -- gen_context(system_u:object_r:spamd_initrc_exec_t,s0) diff --git a/selinux-policy.spec b/selinux-policy.spec index a96af4b..d3c7973 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -20,7 +20,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.5.13 -Release: 60%{?dist} +Release: 61%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -44,7 +44,7 @@ Source17: booleans-minimum.conf Source18: setrans-minimum.conf Source19: securetty_types-minimum -Url: http://serefpolicy.sourceforge.net +Url: http://oss.tresys.com/repos/refpolicy/ BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) BuildArch: noarch BuildRequires: python gawk checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils >= %{POLICYCOREUTILSVER} bzip2 @@ -462,6 +462,9 @@ exit 0 %endif %changelog +* Fri May 22 2009 Miroslav Grepl 3.5.13-61 +- Allow hald to gettattr on all files + * Fri May 15 2009 Miroslav Grepl 3.5.13-60 - Fixes for kpropd - Add /usr/share/selinux/packages