Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 293439 Details for
Bug 430829
SELinux is preventing the /usr/sbin/cupsd from using potentially mislabeled files ().
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
local.te
local.te (text/plain), 3.31 KB, created by
Rick Richardson
on 2008-01-30 16:37:37 UTC
(
hide
)
Description:
local.te
Filename:
MIME Type:
Creator:
Rick Richardson
Created:
2008-01-30 16:37:37 UTC
Size:
3.31 KB
patch
obsolete
> >module local 1.0; > >require { > type unconfined_t; > type home_root_t; > type user_home_t; > type var_run_t; > type default_t; > type automount_t; > type cvs_t; > type setroubleshootd_t; > type rpm_script_t; > type bluetooth_t; > type httpd_user_content_t; > type iso9660_t; > type lib_t; > type fs_t; > type nfsd_t; > type dosfs_t; > type httpd_t; > type cupsd_t; > type fixed_disk_device_t; > type lvm_control_t; > type httpd_sys_script_t; > type rpcd_t; > type smbd_t; > type unconfined_tmp_t; > type sshd_t; > class file { rename execute setattr read lock execmod ioctl execute_no_trans write getattr unlink create append }; > class dbus send_msg; > class chr_file { read write ioctl getattr }; > class fifo_file write; > class filesystem associate; > class sock_file getattr; > class lnk_file { read getattr }; > class blk_file { read ioctl }; > class dir { search read create write getattr rmdir remove_name add_name }; >} > >#============= bluetooth_t ============== >allow bluetooth_t cupsd_t:dbus send_msg; > >#============= cupsd_t ============== >allow cupsd_t bluetooth_t:dbus send_msg; >allow cupsd_t default_t:file { read getattr execute ioctl execute_no_trans }; >allow cupsd_t home_root_t:file { write getattr ioctl }; >allow cupsd_t unconfined_tmp_t:file { write setattr }; >allow cupsd_t user_home_t:file { write ioctl getattr }; > >#============= cvs_t ============== >allow cvs_t home_root_t:dir { write rmdir read remove_name create add_name }; >allow cvs_t home_root_t:file { rename setattr read create write getattr unlink append }; > >#============= httpd_sys_script_t ============== >allow httpd_sys_script_t home_root_t:file { read ioctl getattr }; >allow httpd_sys_script_t user_home_t:dir search; >allow httpd_sys_script_t user_home_t:file { read ioctl getattr }; > >#============= httpd_t ============== >allow httpd_t dosfs_t:file { read getattr }; >allow httpd_t home_root_t:dir read; >allow httpd_t home_root_t:file { read getattr }; >allow httpd_t home_root_t:lnk_file { read getattr }; >allow httpd_t user_home_t:dir { search getattr }; >allow httpd_t user_home_t:file getattr; > >#============= iso9660_t ============== >allow iso9660_t fs_t:filesystem associate; > >#============= nfsd_t ============== >allow nfsd_t fixed_disk_device_t:blk_file { read ioctl }; >allow nfsd_t lvm_control_t:chr_file { read write ioctl }; > >#============= rpcd_t ============== >allow rpcd_t automount_t:fifo_file write; >allow rpcd_t var_run_t:file unlink; > >#============= rpm_script_t ============== >allow rpm_script_t unconfined_t:dbus send_msg; > >#============= setroubleshootd_t ============== >allow setroubleshootd_t lvm_control_t:chr_file getattr; > >#============= smbd_t ============== >allow smbd_t home_root_t:chr_file getattr; >allow smbd_t home_root_t:dir { read write search getattr add_name }; >allow smbd_t home_root_t:file { write getattr setattr read lock create }; >allow smbd_t home_root_t:lnk_file read; >allow smbd_t home_root_t:sock_file getattr; >allow smbd_t httpd_user_content_t:dir getattr; >allow smbd_t iso9660_t:dir { read getattr search }; >allow smbd_t iso9660_t:file { read lock getattr }; >allow smbd_t unconfined_tmp_t:file getattr; >allow smbd_t user_home_t:dir getattr; >allow smbd_t user_home_t:file getattr; > >#============= sshd_t ============== >allow sshd_t home_root_t:file { read getattr }; > >#============= unconfined_t ============== >allow unconfined_t home_root_t:file execmod; >allow unconfined_t lib_t:file execmod;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 430829
:
293421
| 293439