Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@sugar-dev:/etc/yum.repos.d$ curl -4 --trace-time --trace-ascii - -O http://mirrors.ch-center.com/centos/7.3.1611/updates/x86_64/Packages/selinux-policy-3.13.1-102.el7_3.13.noarch.rpm
- % Total % Received % Xferd Average Speed Time Time Time Current
- Dload Upload Total Spent Left Speed
- 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 013:00:16.709925 == Info: About to connect() to mirrors.ch-center.com port 80 (#0)
- 13:00:16.710297 == Info: Trying 93.113.36.66...
- 13:00:16.731068 == Info: Connected to mirrors.ch-center.com (93.113.36.66) port 80 (#0)
- 13:00:16.731532 => Send header, 170 bytes (0xaa)
- 0000: GET /centos/7.3.1611/updates/x86_64/Packages/selinux-policy-3.13
- 0040: .1-102.el7_3.13.noarch.rpm HTTP/1.1
- 0065: User-Agent: curl/7.29.0
- 007e: Host: mirrors.ch-center.com
- 009b: Accept: */*
- 00a8:
- 13:00:16.754909 <= Recv header, 17 bytes (0x11)
- 0000: HTTP/1.1 200 OK
- 13:00:16.754980 <= Recv header, 37 bytes (0x25)
- 0000: Date: Mon, 06 Feb 2017 13:00:16 GMT
- 13:00:16.755018 <= Recv header, 31 bytes (0x1f)
- 0000: Server: Apache/2.4.6 (CentOS)
- 13:00:16.755067 <= Recv header, 46 bytes (0x2e)
- 0000: Last-Modified: Wed, 18 Jan 2017 13:03:18 GMT
- 13:00:16.755116 <= Recv header, 29 bytes (0x1d)
- 0000: ETag: "6760c-5465e0a589180"
- 13:00:16.755153 <= Recv header, 22 bytes (0x16)
- 0000: Accept-Ranges: bytes
- 13:00:16.755235 <= Recv header, 24 bytes (0x18)
- 0000: Content-Length: 423436
- 13:00:16.755283 <= Recv header, 33 bytes (0x21)
- 0000: Content-Type: application/x-rpm
- 13:00:16.755318 <= Recv header, 2 bytes (0x2)
- 0000:
- 13:00:16.755346 <= Recv data, 2627 bytes (0xa43)
- 0000: ..........selinux-policy-3.13.1-102.el7_3.13....................
- 0040: ...................................................>.......t....
- 0080: ...........................................D...............H....
- 00c0: ...........`...............p..........Xg.$.........a...]JB...M.
- 0100: .{.SM.S7..|I...e..X(d.~....~.#.%...ZO..`..,...f.f.:Y ,.........N
- 0140: .m>T.......[.f@..5..KK#W... .P...yZ3L.D.a..h.$..p.....,......Y.
- 0180: E.B....... .Y..M.5.=.]boa..._...h..f,u<......y..3:aD31.&'{?g...I
- 01c0: .......pm...q........JT.n.[..}...........`.'.J.T...N~.\.a.(N.,.9
- 0200: .N..m..|...~G?.pzL.$.....#a]..5.W.z.J..Q_..g.hY#.,..x..I.!#Y_.x
- 0240: ....0U.......Ft..o...{.w.Cz..;..u....)t...\6~..ov.....x.q/.t....
- 0280: H.R....G......w..F....ZB2Y:.._..O.K<h..i..dV.:I.r-..r.....d.I...
- 02c0: h.......;.1..f......U2g..zE...$...A.Y....[c.L..<B...P...9b3b5eb3
- 0300: dc686b1411edeadca989c74880c311ad......p.......Xg.$.............
- 0340: ...v....."$.u@5Y..I.\b.r..o...Q1...X.mI..4.).....>.....8......\
- 0380: ....z..!..J...[..;e.:v\....N.&{H.<.3J.....M.YZ!..N0..#..-......
- 03c0: w...._V.......R..y....>.1.<.*h.......$a.t......2$\..n.^<~.....2
- 0400: ..T.....X.....t|..&.s.d.q+..O..2....e....d....>W.P.....{......Oa
- 0440: 5.'..Kj..2..b..z..O.%.......!?el..O=3a......9.C0..(..=...92....v
- 0480: ?..ur.3......}.........w.,Qb.........1..~v...E.}u.6.TMW.B.5|..x.
- 04c0: ..E(f.LW.-.uf@p..+.|....^..;..t/u.hQ.!..D_3s.N.En...r~..oy...^%
- 0500: ..u......2GV.._...@..;.2.@...........idE.c...g.p.d.m@.p..<.bm.Q.
- 0540: .'......[..2v..........>...........................A..g....?....
- 0580: ..g........d....................................................
- 05c0: ...................%...............B............................
- 0600: ................................................................
- 0640: ...................................................A............
- 0680: ...G...............N............................................
- 06c0: ................................................................
- 0700: ...................................(...............U............
- 0740: ................................................................
- 0780: ...,.......................(.......3.......).......:.......*....
- 07c0: ...........+...............,...............-...............8....
- 0800: ...........9......"........:...............>......dg.......@....
- 0840: ..do.......D......dw.......G......d........H......d........I....
- 0880: ..d........X......d........Y......d........\......e........]....
- 08c0: ..e0.......^......e........b......f........d......f........e....
- 0900: ..f........f......f........l......f........t......f........u....
- 0940: ..f........v......g........w......g4.......x......gX............
- 0980: ..g|....C.selinux-policy.3.13.1.102.el7_3.13.SELinux policy conf
- 09c0: iguration.SELinux Reference Policy - modular..Based off of refer
- 0a00: ence policy: Checked out revision 2.20091117...X~.-c1bm.rdu2.ce
- 0a40: nto
- 13:00:16.758047 <= Recv data, 11612 bytes (0x2d5c)
- 0000: s.org........CentOS.GPLv2+.CentOS BuildSystem <http://bugs.cento
- 0040: s.org>.System Environment/Base.http://oss.tresys.com/repos/refpo
- 0080: licy/.linux.noarch.if [ ! -s /etc/selinux/config ]; then.#.#
- 00c0: New install so we will default to targeted policy.#.echo ".# Th
- 0100: is file controls the state of SELinux on the system..# SELINUX=
- 0140: can take one of these three values:.# enforcing - SELinux se
- 0180: curity policy is enforced..# permissive - SELinux prints war
- 01c0: nings instead of enforcing..# disabled - No SELinux policy i
- 0200: s loaded..SELINUX=enforcing.# SELINUXTYPE= can take one of three
- 0240: two values:.# targeted - Targeted processes are protected,.
- 0280: # minimum - Modification of targeted policy. Only selected p
- 02c0: rocesses are protected. .# mls - Multi Level Security protec
- 0300: tion..SELINUXTYPE=targeted .." > /etc/selinux/config.. ln -s
- 0340: f ../selinux/config /etc/sysconfig/selinux . restorecon /etc
- 0380: /selinux/config 2> /dev/null || :.else. . /etc/selinux/confi
- 03c0: g.fi.exit 0.if [ $1 = 0 ]; then. setenforce 0 2> /dev/null.
- 0400: if [ ! -s /etc/selinux/config ]; then. echo "SELINU
- 0440: X=disabled" > /etc/selinux/config. else. sed -i 's/
- 0480: ^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config. fi.fi.e
- 04c0: xit 0.......T..............."...........V....A.....A.A.....A.A..
- 0500: .................X~.tX~..X~..X~..X~..X~..X~..X~..X~...e3b0c44298
- 0540: fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.e3b0c4429
- 0580: 8fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855...bbc0a2
- 05c0: 36546caf6a1acfd7c0058aa02eb4615e31063958f03618a109c73dd49b.8a0be
- 0600: ca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185.....
- 0640: ................Q...@........................root.root.root.root
- 0680: .root.root.root.root.root.root.root.root.root.root.root.root.roo
- 06c0: t.root.selinux-policy-3.13.1-102.el7_3.13.src.rpm...............
- 0700: .........................config(selinux-policy).selinux-policy..
- 0740: ................................................./bin/awk./bin/s
- 0780: h./bin/sh./bin/sh./usr/bin/sha512sum.config(selinux-policy).libs
- 07c0: emanage.policycoreutils.rpmlib(CompressedFileNames).rpmlib(FileD
- 0800: igests).rpmlib(PayloadFilesHavePrefix).rpmlib(PayloadIsXz)......
- 0840: 3.13.1-102.el7_3.13.2.5.2.5.3.0.4-1.4.6.0-1.4.0-1.5.2-1.4.11.3.s
- 0880: elinuxenabled && semodule -nB.exit 0.rm -f /etc/selinux/*/module
- 08c0: s/active/modules/sandbox.pp.disabled 2>/dev/null.exit 0.pcre.sel
- 0900: inux-policy-targeted..3.12.1-74..................Xs{@Xl..XW..XR.
- 0940: .XO..XEV.X).@X#..X#..X.`@W.%.W.S.W._@W._@W.v@W.;.W..@W...W...W.:
- 0980: .W.Q.W..@W...W..@W..@W...W.~.W..@W..W~D@W{.@Ws.@Wrf.Wj}.Wb..W^.
- 09c0: @WYZ@WYZ@WUe.WM|.WB..W9.@W9.@W1.@W(..W ..V..@V..@V..@V...V.2.V..
- 0a00: @V._.V...V.C.V..@V.Z.V..@V.q.V.}@V.}@V.B.U...U...U..@U..@U.p.U..
- 0a40: .U...U...U.o.U.o.U.5@U...U..@U...U...U.W.U...U..@U...U.K@U...U..
- 0a80: .U.'.U.a@U~.@Uz..Uv.@UT.@U..@T.r@T..@T..@T.7.T...T...T.C@T..@T..
- 0ac0: .T...T}..Tto@Ts..Tk4.T`..T[b.TWn@T?.@T>a.T6x.T6x.T..@S..@S...S.D
- 0b00: .Sg}@SB.@S>..S;..S:.@S9X.S5d@S4..S2.@S0.@S,).S*.@S)..S)..S&..S&.
- 0b40: .S".@S!..S L@S...S...S..@S...S.c@S...S.n.S..@S...S.K@R...R...R..
- 0b80: @R...R.J@R.a@R...R...R.&.R.&.R...R...R.=.R...R...R..@R..@R..@R.v
- 0bc0: @R.v@R..@R...R..@R...R..@R..@R|.@Rz/@Rz/@Rs..Rp..RnQ.Ri..Rfh.R_.
- 0c00: @R_.@R[..R[..RS..RN..RN..RL..RIg.RB.@RB.@R:.@R1..R-.@R-.@R(r@R'
- 0c40: .R%.@R.7.R...R.N.R...R..@Q..@Q...Q.d.Q...Q..@Q...Q..@Q..@Q...Q..
- 0c80: .Q..@Q.z.Q...Q.4.Q.@@Q..@Q.K.Q...Q..@Q..@Q..@Q..@Q...Q..@Q...Q..
- 0cc0: .Q...Q..@Q..@Q...Q...Q.@Qzl@Qw.@Qvw.Qo.@Qo.@Qn..Qm=@Qk..Qf..Qb.
- 0d00: @Q`.@Q^..QZ.@QQ..QI..QG..Q@j@Q9..Q8.@Q4..Q0.@Q-.@Q&.@Q$..Q...Q..
- 0d40: @Q...Q..@Q..@Q.h@Q.s.P...P..@P..@P...P..@P.[.P...P.!@P.8@P.O@P..
- 0d80: @P.f@P...P.q.P. @P...P.7@P..@P...P...P.Y.P..@P..@P...P...P.M@P..
- 0dc0: .P.d@P..@P.o.P.{@P.{@P..@P...P.5@P.@.P~..P}L@Px.@Pv..Pv..Puc@Puc
- 0e00: @Pr.@Pmz@Pmz@Pmz@Pj.@Pd?.Pd?.Pb.@Pa..Pa..P[.@PXb@PW..PS.@PQ..PO'
- 0e40: .PM.@PI..P@.@P>.@P8.@P7l.P2&.P2&.P,..P,..P*=.P(.@P#.@P#.@P!.@P!.
- 0e80: @P..@P.k.P.w@P.w@P...P.<.P...P..@O.j.O...O...O.R.O.i.O.#.O./@O.:
- 0ec0: .O...O...O.h.O..@O...O.\@O...O..@O...O.!.O...O.D@O...O...O...O..
- 0f00: @O. .O. .O~..Oz.@Ou.@Or.@Or.@Ok.@Oi..Og..Og..Oc+@O`.@O`.@O].@OY.
- 0f40: .OX.@OT..OL..OKp@OF*@OD..OC.@OC.@O<..O:L.O8.@O5..O3.@O1.@O/..O+.
- 0f80: @O'..O&.@O!@@O..@O.K.O.K.O.W@O..@O...O.y.O.y.O.?@N.x.N.'@N...N.>
- 0fc0: @N...N.U@N...N.l@N..@N..@N...N..@N...N...N...N..@N...N...N..@N..
- 1000: @N.G.N.G.N.G.N..@N..@N...N.S@N.S@N.^.N.^.N..@N..@N...N.j@N.j@N..
- 1040: .N.$@N...N..@N./.N..@N..@N.F.N.F.N..@N...N...N..@N..@N..@N.].N.i
- 1080: @N.i@N.i@N|t.Ny..Nx.@Ns:@NoE.NoE.Ni..Nf.@N^"@N\..N[@NT..NS.@NS.
- 10c0: @NC.@NBr.N:..N98@N7..N6.@N2..N..@N*..N)f@N(..N%q.N$ @N..@N.7@N.e
- 1100: @N.p.N.p.M..@M..@M.d@M.d@M...M.{@M.@.M...M..@M..@M..@M..@M..@M..
- 1140: @M.y@M.y@M.3@M..@M..@M...M...M..@M...M...M...MT.Mx.@Mx.@Mv.@Ml.
- 1180: .MbS.M[.@MR..MQ0@MQ0@MJ..MG..MG..MA^@M>.@M9u@M6.@M5..M4/@M4/@M0:
- 11c0: .M,F@M$]@M..@M.9.M...M...M...M...M.\@M...M...M..@L.!.L.!.L..@L..
- 1200: .L..@L..@L..@L.O.L.O.L.[@L..@L..@L.r@L. .L.,@L.,@L..@L.7.L...L..
- 1240: .L.N.L..@L...L.e.L.|.L..@L.B@L.B@L.B@L..@L.M.L...L..@L.d.L...L.{
- 1280: .L.*@L..@L.5.L...L.A@L...L...L...L..@L.c.L..@L..@L..@L.z.L.)@L|.
- 12c0: .L|..L|..L{.@LvW@LvW@Ls.@Ls.@Lrb.Lrb.Lm..Lk.@Ljy.Le3.Lc.@La?@LZ.
- 1300: .LYV@LX..LN.@LN.@LMx.LMx.LI.@LH2.LF.@LE..L=..L=..L=..L;..L7.@L .
- 1340: .L.T@L..@L...L..@L..@L.0.L...L.G.L..@K.^.K.^.K...K...K.j@K.$@K..
- 1380: .K...K..@K..@K...K..@K.].K...K..@K.t.K.#@K...K..@K.:@K...K..@K..
- 13c0: @K.\.K.\.K..@K...K...K...K...K.9@K...K..@K...K..@K..@K...K...K..
- 1400: .K.r.K...K.~@K.,.K.,.K.,.K..@K...K.8@K...K...K..@K...K..@K.q.K.q
- 1440: .K}+.K{.@K{.@KuB.Ks.@KqN@Kj..Kie@Kf.@Ka|@K`*.K]..KXA.KTM@KPX.KE.
- 1480: .KE..KE..KD{@KC).KA.@K;@.K2.@K0..K/c@K+n.K*.@K(..K"4@K...K.>.K.>
- 14c0: .K.>.J...J...J.H@J.H@J...J...J._@J..@J.j.J.j.J..@J.v@J.v@J.v@J.v
- 1500: @J.$.J..@J...J.0@J..@J..@J.G@J.G@J..@J...J..@J..@J..@J...J...J.#
- 1540: .J..@J...J...J..@J.:.J..@J...J.Q.J..@J...J...J|.@Jz..Jyt@Jyt@Jx"
- 1580: .Jr..Jr..Jq.@Jn.@Jn.@Jm..JhP.Je..J\s@JW-@JT.@JS8.JKO.JI.@JCf.JCf
- 15c0: .JB.@J@..J@..J?r@J<.@J;}.J:,@J7.@J67.J2C@J0..J/.@J,.@J%.@J...J.B
- 1600: @J...J.M.J...J.d.J..@J..@J...J..@J.*@J.*@I...I..@I...I.A@I...I..
- 1640: .I...I..@I..@I...I...I.X@I.X@I.X@I...I..@I..@I.c.I...I.o@I.o@I.z
- 1680: .I.)@I..@I...I.@@I...I..@I..@I..@I...I..@I...I.n@I.3.I.3.I..@I..
- 16c0: .I..@I..@I.V@I...I.a.I...I.m@I..@I.'@I...I.2.I.I.I..@I...I...I..
- 1700: .I...I...I...I...I..@I...I...I..@I.1.I..@I...I...I~.@I}..Iy.@Ix_
- 1740: .Iw.@Iu..Itk@Itk@Io%@Ik0.Ie..IcG.Ia.@I`..IV..IO.@IJ;@IH..IA..I>]
- 1780: .I=.@I7.@I6t.I3..I.-.I..@I...I...I.9@I.9@I...I...I.P@I..@I...I.g
- 17c0: @I.g@H...H...H..@H.r.H.~@H.,.H..@H.C.H...H...H..@H..@H.f@H.f@H..
- 1800: @H.+.H..@H...H...H.7@H.B.H..@H...H..@H...H.|@H...H...H..@H.{@H.)
- 1840: .H...H.L@H..@H..@H..@H.n.H}..H|.@Ht.@HsV.Hr.@Hl.@Hkm.Hgy@Hc..H`.
- 1880: .H_.@H^>.HRa@HQ..HQ..HO.@HF..HF..H$<.H$<.H!..H!..H H@H._@H..@H..
- 18c0: @H...H.v@H.$.H..@H.G@G..@G..@G.^@G.^@G.i.G..@G.#.G./@G..@G..@G..
- 1900: @G...G.]@G.h.G.h.G..@G..@G...G.t@G.t@G.".G...G..@G..@G...G..@G.P
- 1940: .G..@G..@G..@G..@G..@G..@G.g.G..@G...G.~.G...G...G...G...G.O.G.O
- 1980: .G.O.G..@G...G.[@G.[@G...G...G.f.G.f.G...G..@G.}.G.,@G..@G..@G..
- 19c0: @G.C@G..@G.N.G..@G..@G..@G{|.Gx..Go.@Gl.@GjY@GjY@Gi..Gi..Gi..Gg.
- 1a00: @Gfd.Ga..G_.@G^{.G^{.GUA@GS..GO.@GMX@GAz.G5.@G...G...G..@G..@G.J
- 1a40: .G.J.G...G.V@G.a.G...G.m@G...G...G.2.G..@F..@F..@F..@F...F...F..
- 1a80: .F...F..@F..@F.`.F..@F..@F...F.l@F..@F..@F.1.F.=@F.=@F...F...F..
- 1ac0: @F..@F...F..@F..@F.%@F...F..@F..@F..@F..@F...F.S@F.S@F..@F..@F..
- 1b00: @F.u.F.u.F...F...F...F...F...F..@F...F...F.R@F.R@F..@F...F...F..
- 1b40: @F.t.F...F...F...F..@F...F...FV..FM.@FM.@FM.@FLC.FJ.@FJ.@FHO@F;
- 1b80: @F5.@F1..F/B.F,..F'Y.F'Y.F'Y.F&.@F$..F$..F.p.F..@F.|@F.|@F.*.F.*
- 1bc0: .F...F..@F.A.F.A.F...F..@F.o.F.o.F..@E...E...E...E.{@E.{@E.{@E.5
- 1c00: @E..@E..@E.@.E...E..@E.n.E..@E..@E.4@E...E.K@E...E..@E..@E...E..
- 1c40: @E..@E...E...E..@E..@E..@E.2@E..@E...E..@E...E..@E...E.<.E.<.E.<
- 1c80: .E.@E~..EyS.Ev..Ev..Et..Ep.@Ep.@En..El$.Eb.@Ea..Ea..E[.@E[.@EY.
- 1cc0: .EY..EX^@EX^@EX^@ETi.ETi.ES.@ES.@EQ..EQ..EQ..EPu@EPu@EO#.EK/@EK/
- 1d00: @EI..EH.@EG:.EE.@EA..EA..EA..E<..E<..E<..E<..E<..E8.@E7h.E7h.E6.
- 1d40: @E3t@E3t@E..@E+.@E(.@E&E@E$..E$..E$..E#.@E"P.E"P.E .@E...E...E..
- 1d80: .E...E..@E.g.E.g.E...E...E...E..@E..@E.-@E...E..@E..@E...E...E.D
- 1dc0: @E...E.O.E...E...D..@D.f.D.f.D. .D. .D..@D.}.D.,@D...D..@D...D..
- 1e00: .D...D.C@D...D...D.q@D...D..@D.|.D.+@D..@D..@D..@D...D.B@D...D.M
- 1e40: .D..@D.Y@D.Y@D.Y@D..@D..@D...D...D...D...D..@D.{.D.{.D..@D..@D.L
- 1e80: .D.L.D.L.D..@D.4.D..@D..@D..@D.K.D...D...D...D.W@D.W@D..@D.n@D.n
- 1ec0: @Dy..Dx?@Dv..Dv..DtJ.Dq..Dla.Dla.Dk.@Di..Dhm@Dhm@Ddx.Dc'@Dc'@Da.
- 1f00: .D_2.D[>@DX.@DU.@DN.@DN.@DL..DH.@DGw.DGw.DD..D@.@D?..D?..D;.@D;.
- 1f40: @D:H.D:H.D2_.D1.@D1.@D-..D+.@D+.@D'..D!<@D!<@D!<@D...D...D..@D..
- 1f80: @D..@D...D...D...D...D...D..@D..@D..@D..@D.u.D.$@D...D..@D..@D..
- 1fc0: .D...D.F.C..@C..@C..@C..@C...C...C...C...C.R@C...C...C...C...C..
- 2000: @C.i@C...C..@C..@C.t.C..@C..@C...C.:@C.E.C...C...C..@C..@C...C..
- 2040: .C...C...C...C..@C.-.C.-.C.-.C..@C..@C...C..@C..@C...C...C.P@C.P
- 2080: @C.[.C..@C..@C...C.g@C.g@C...C...C.!@C.~@C.,.C..@C.C.C.C.C..@C..
- 20c0: .C..@C..@C..@C.Z.C.Z.C..@C..@C...C...C.f@C.f@C.f@C...C..@C.q.C.q
- 2100: .C. @C. @C. @C...C...C.}@C.7@C.7@C.7@C.B.C.B.C.Y.C..@C..@C...C}.
- 2140: @Cq..Cq..Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-102.13.Lukas
- 2180: Vrabec <lvrabec@redhat.com> - 3.13.1-102.12.Lukas Vrabec <lvrab
- 21c0: ec@redhat.com> - 3.13.1-102.11.Lukas Vrabec <lvrabec@redhat.com>
- 2200: - 3.13.1-102.10.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-102.
- 2240: 9.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-102.8.Lukas Vrabec
- 2280: <lvrabec@redhat.com> - 3.13.1-102.7.Lukas Vrabec <lvrabec@redhat
- 22c0: .com> - 3.13.1-102.6.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-
- 2300: 102.5.Miroslav Grepl <mgrepl@redhat.com> - 3.13.1-102.4.Petr Lau
- 2340: trbach <plautrba@redhat.com> - 3.13.1-102.3.Lukas Vrabec <lvrabe
- 2380: c@redhat.com> - 3.13.1-102.1.Dan Walsh <dwalsh@redhat.com> - 3.1
- 23c0: 3.1-102.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-101.Lukas Vra
- 2400: bec <lvrabec@redhat.com> - 3.13.1-100.Lukas Vrabec <lvrabec@redh
- 2440: at.com> - 3.13.1-99.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-9
- 2480: 8.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-97.Lukas Vrabec <lv
- 24c0: rabec@redhat.com> - 3.13.1-96.Lukas Vrabec <lvrabec@redhat.com>
- 2500: - 3.13.1-95.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-94.Lukas
- 2540: Vrabec <lvrabec@redhat.com> - 3.13.1-93.Lukas Vrabec <lvrabec@re
- 2580: dhat.com> - 3.13.1-92.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1
- 25c0: -91.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-90.Lukas Vrabec <
- 2600: lvrabec@redhat.com> - 3.13.1-89.Lukas Vrabec <lvrabec@redhat.com
- 2640: > - 3.13.1-88.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-87.Luka
- 2680: s Vrabec <lvrabec@redhat.com> - 3.13.1-86.Lukas Vrabec <lvrabec@
- 26c0: redhat.com> - 3.13.1-85.Lukas Vrabec <lvrabec@redhat.com> - 3.13
- 2700: .1-84.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-83.Lukas Vrabec
- 2740: <lvrabec@redhat.com> - 3.13.1-82.Lukas Vrabec <lvrabec@redhat.c
- 2780: om> - 3.13.1-81.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-80.Pe
- 27c0: tr Lautrbach <plautrba@redhat.com> - 3.13.1-79.Lukas Vrabec <lvr
- 2800: abec@redhat.com> - 3.13.1-78.Lukas Vrabec <lvrabec@redhat.com> -
- 2840: 3.13.1-77.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-76.Lukas V
- 2880: rabec <lvrabec@redhat.com> - 3.13.1-75.Lukas Vrabec <lvrabec@red
- 28c0: hat.com> - 3.13.1-74.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-
- 2900: 73.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-72.Lukas Vrabec <l
- 2940: vrabec@redhat.com> - 3.13.1-71.Lukas Vrabec <lvrabec@redhat.com>
- 2980: - 3.13.1-70.Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-69.Lukas
- 29c0: Vrabec <lvrabec@redhat.com> - 3.13.1-68.Lukas Vrabec <lvrabec@r
- 2a00: edhat.com> - 3.13.1-67.Petr Lautrbach <plautrba@redhat.com> - 3.
- 2a40: 13.1-66.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-65.Lukas Vrabec
- 2a80: <lvrabec@redhat.com> 3.13.1-64.Lukas Vrabec <lvrabec@redhat.com
- 2ac0: > 3.13.1-63.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-62.Lukas Vr
- 2b00: abec <lvrabec@redhat.com> 3.13.1-61.Miroslav Grepl <mgrepl@redha
- 2b40: t.com> 3.13.1-60.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-59.Lu
- 2b80: kas Vrabec <lvrabec@redhat.com> 3.13.1-58.Lukas Vrabec <lvrabec@
- 2bc0: redhat.com> 3.13.1-57.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-
- 2c00: 56.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-55.Lukas Vrabec <lvr
- 2c40: abec@redhat.com> 3.13.1-54.Lukas Vrabec <lvrabec@redhat.com> 3.1
- 2c80: 3.1-53.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-52.Miroslav Grep
- 2cc0: l <mgrepl@redhat.com> 3.13.1-51.Lukas Vrabec <lvrabec@redhat.com
- 2d00: > 3.13.1-50.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-49.Lukas Vr
- 2d40: abec <lvrabec@redhat.com> 3.
- 13:00:16.774683 <= Recv data, 2896 bytes (0xb50)
- 0000: 13.1-48.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-47.Lukas Vrabec
- 0040: <lvrabec@redhat.com> 3.13.1-46.Lukas Vrabec <lvrabec@redhat.com
- 0080: > 3.13.1-45.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-44.Lukas Vr
- 00c0: abec <lvrabec@redhat.com> 3.13.1-43.Lukas Vrabec <lvrabec@redhat
- 0100: .com> 3.13.1-42.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-41.Luka
- 0140: s Vrabec <lvrabec@redhat.com> 3.13.1-40.Miroslav Grepl <mgrepl@r
- 0180: edhat.com> 3.13.1-39.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-38
- 01c0: .Lukas Vrabec <lvrabec@redhat.com> 3.13.1-37.Lukas Vrabec <lvrab
- 0200: ec@redhat.com> 3.13.1-36.Lukas Vrabec <lvrabec@redhat.com> 3.13.
- 0240: 1-35.Lukas Vrabec <lvrabec@redhat.com> 3.13.1-34.Lukas Vrabec <l
- 0280: vrabec@redhat.com> 3.13.1-33.Lukas Vrabec <lvrabec@redhat.com> 3
- 02c0: .13.1-32.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-31.Miroslav G
- 0300: repl <mgrepl@redhat.com> 3.13.1-30.Miroslav Grepl <mgrepl@redhat
- 0340: .com> 3.13.1-29.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-28.Mir
- 0380: oslav Grepl <mgrepl@redhat.com> 3.13.1-27.Miroslav Grepl <mgrepl
- 03c0: @redhat.com> 3.13.1-26.Miroslav Grepl <mgrepl@redhat.com> 3.13.1
- 0400: -25.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-24.Miroslav Grepl
- 0440: <mgrepl@redhat.com> 3.13.1-23.Miroslav Grepl <mgrepl@redhat.com>
- 0480: 3.13.1-22.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-21.Miroslav
- 04c0: Grepl <mgrepl@redhat.com> 3.13.1-20.Miroslav Grepl <mgrepl@redh
- 0500: at.com> 3.13.1-19.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-18.M
- 0540: iroslav Grepl <mgrepl@redhat.com> 3.13.1-17.Miroslav Grepl <mgre
- 0580: pl@redhat.com> 3.13.1-16.Miroslav Grepl <mgrepl@redhat.com> 3.13
- 05c0: .1-15.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-14.Miroslav Grep
- 0600: l <mgrepl@redhat.com> 3.13.1-13.Miroslav Grepl <mgrepl@redhat.co
- 0640: m> 3.13.1-12.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-11.Mirosl
- 0680: av Grepl <mgrepl@redhat.com> 3.13.1-10.Miroslav Grepl <mgrepl@re
- 06c0: dhat.com> 3.13.1-9.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-8.M
- 0700: iroslav Grepl <mgrepl@redhat.com> 3.13.1-7.Miroslav Grepl <mgrep
- 0740: l@redhat.com> 3.13.1-6.Miroslav Grepl <mgrepl@redhat.com> 3.13.1
- 0780: -5.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-4.Miroslav Grepl <m
- 07c0: grepl@redhat.com> 3.13.1-3.Miroslav Grepl <mgrepl@redhat.com> 3.
- 0800: 13.1-2.Miroslav Grepl <mgrepl@redhat.com> 3.13.1-1.Miroslav Grep
- 0840: l <mgrepl@redhat.com> 3.12.1-156.Miroslav Grepl <mgrepl@redhat.c
- 0880: om> 3.12.1-155.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-154.Mir
- 08c0: oslav Grepl <mgrepl@redhat.com> 3.12.1-153.Miroslav Grepl <mgrep
- 0900: l@redhat.com> 3.12.1-152.Miroslav Grepl <mgrepl@redhat.com> 3.12
- 0940: .1-151.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-149.Miroslav Gre
- 0980: pl<mgrepl@redhat.com> 3.12.1-149.Miroslav Grepl<mgrepl@redhat.co
- 09c0: m> 3.12.1-148.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-147.Miros
- 0a00: lav Grepl<mgrepl@redhat.com> 3.12.1-146.Miroslav Grepl<mgrepl@re
- 0a40: dhat.com> 3.12.1-145.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-14
- 0a80: 4.Lukas Vrabec <lvrabec@redhat.com> 3.12.1-143.Miroslav Grepl<mg
- 0ac0: repl@redhat.com> 3.12.1-142.Miroslav Grepl<mgrepl@redhat.com> 3.
- 0b00: 12.1-141.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-140.Miroslav G
- 0b40: repl<mgrepl@redh
- 13:00:16.776747 <= Recv data, 8688 bytes (0x21f0)
- 0000: at.com> 3.12.1-139.Lukas Vrabec <lvrabec@redhat.com> 3.12.1-138.
- 0040: Miroslav Grepl<mgrepl@redhat.com> 3.12.1-137.Miroslav Grepl<mgre
- 0080: pl@redhat.com> 3.12.1-136.Miroslav Grepl<mgrepl@redhat.com> 3.12
- 00c0: .1-135.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-134.Miroslav Gre
- 0100: pl<mgrepl@redhat.com> 3.12.1-133.Miroslav Grepl<mgrepl@redhat.co
- 0140: m> 3.12.1-132.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-131.Miros
- 0180: lav Grepl<mgrepl@redhat.com> 3.12.1-130.Miroslav Grepl<mgrepl@re
- 01c0: dhat.com> 3.12.1-129.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-12
- 0200: 8.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-127.Miroslav Grepl<mg
- 0240: repl@redhat.com> 3.12.1-126.Miroslav Grepl<mgrepl@redhat.com> 3.
- 0280: 12.1-125.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-124.Miroslav G
- 02c0: repl<mgrepl@redhat.com> 3.12.1-123.Miroslav Grepl<mgrepl@redhat.
- 0300: com> 3.12.1-122.Miroslav Grepl<mgrepl@redhat.com> 3.12.1-121.Mir
- 0340: oslav Grepl<mgrepl@redhat.com> 3.12.1-120.Miroslav Grepl<mgrepl@
- 0380: redhat.com> 3.12.1-119.Miroslav Grepl <mgrepl@redhat.com> 3.12.1
- 03c0: -118.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-117.Miroslav Grep
- 0400: l <mgrepl@redhat.com> 3.12.1-116.Miroslav Grepl <mgrepl@redhat.c
- 0440: om> 3.12.1-115.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-114.Mir
- 0480: oslav Grepl <mgrepl@redhat.com> 3.12.1-113.Miroslav Grepl <mgrep
- 04c0: l@redhat.com> 3.12.1-112.Miroslav Grepl <mgrepl@redhat.com> 3.12
- 0500: .1-111.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-110.Miroslav Gr
- 0540: epl <mgrepl@redhat.com> 3.12.1-109.Miroslav Grepl <mgrepl@redhat
- 0580: .com> 3.12.1-108.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-107.D
- 05c0: an Walsh <dwalsh@redhat.com> 3.12.1-106.Miroslav Grepl <mgrepl@r
- 0600: edhat.com> 3.12.1-105.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-
- 0640: 104.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-103.Miroslav Grepl
- 0680: <mgrepl@redhat.com> 3.12.1-102.Miroslav Grepl <mgrepl@redhat.co
- 06c0: m> 3.12.1-101.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-100.Miro
- 0700: slav Grepl <mgrepl@redhat.com> 3.12.1-99.Miroslav Grepl <mgrepl@
- 0740: redhat.com> 3.12.1-98.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-
- 0780: 97.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-96.Miroslav Grepl <
- 07c0: mgrepl@redhat.com> 3.12.1-95.Miroslav Grepl <mgrepl@redhat.com>
- 0800: 3.12.1-94.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-94.Miroslav
- 0840: Grepl <mgrepl@redhat.com> 3.12.1-93.Miroslav Grepl <mgrepl@redha
- 0880: t.com> 3.12.1-92.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-91.Mi
- 08c0: roslav Grepl <mgrepl@redhat.com> 3.12.1-90.Miroslav Grepl <mgrep
- 0900: l@redhat.com> 3.12.1-89.Miroslav Grepl <mgrepl@redhat.com> 3.12.
- 0940: 1-88.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-87.Miroslav Grepl
- 0980: <mgrepl@redhat.com> 3.12.1-86.Miroslav Grepl <mgrepl@redhat.com
- 09c0: > 3.12.1-85.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-84.Mirosla
- 0a00: v Grepl <mgrepl@redhat.com> 3.12.1-83.Miroslav Grepl <mgrepl@red
- 0a40: hat.com> 3.12.1-82.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-81.
- 0a80: Miroslav Grepl <mgrepl@redhat.com> 3.12.1-80.Miroslav Grepl <mgr
- 0ac0: epl@redhat.com> 3.12.1-79.Miroslav Grepl <mgrepl@redhat.com> 3.1
- 0b00: 2.1-78.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-77.Miroslav Gre
- 0b40: pl <mgrepl@redhat.com> 3.12.1-76.Miroslav Grepl <mgrepl@redhat.c
- 0b80: om> 3.12.1-75.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-74.Miros
- 0bc0: lav Grepl <mgrepl@redhat.com> 3.12.1-73.Miroslav Grepl <mgrepl@r
- 0c00: edhat.com> 3.12.1-72.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-7
- 0c40: 1.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-70.Miroslav Grepl <m
- 0c80: grepl@redhat.com> 3.12.1-69.Miroslav Grepl <mgrepl@redhat.com> 3
- 0cc0: .12.1-68.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-67.Miroslav G
- 0d00: repl <mgrepl@redhat.com> 3.12.1-66.Miroslav Grepl <mgrepl@redhat
- 0d40: .com> 3.12.1-65.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-64.Mir
- 0d80: oslav Grepl <mgrepl@redhat.com> 3.12.1-63.Miroslav Grepl <mgrepl
- 0dc0: @redhat.com> 3.12.1-62.Miroslav Grepl <mgrepl@redhat.com> 3.12.1
- 0e00: -61.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-60.Miroslav Grepl
- 0e40: <mgrepl@redhat.com> 3.12.1-59.Miroslav Grepl <mgrepl@redhat.com>
- 0e80: 3.12.1-58.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-57.Miroslav
- 0ec0: Grepl <mgrepl@redhat.com> 3.12.1-56.Miroslav Grepl <mgrepl@redh
- 0f00: at.com> 3.12.1-55.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-54.M
- 0f40: iroslav Grepl <mgrepl@redhat.com> 3.12.1-53.Miroslav Grepl <mgre
- 0f80: pl@redhat.com> 3.12.1-52.Miroslav Grepl <mgrepl@redhat.com> 3.12
- 0fc0: .1-51.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-50.Miroslav Grep
- 1000: l <mgrepl@redhat.com> 3.12.1-49.Miroslav Grepl <mgrepl@redhat.co
- 1040: m> 3.12.1-48.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-47.Mirosl
- 1080: av Grepl <mgrepl@redhat.com> 3.12.1-46.Miroslav Grepl <mgrepl@re
- 10c0: dhat.com> 3.12.1-45.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-44
- 1100: .Miroslav Grepl <mgrepl@redhat.com> 3.12.1-43.Miroslav Grepl <mg
- 1140: repl@redhat.com> 3.12.1-42.Miroslav Grepl <mgrepl@redhat.com> 3.
- 1180: 12.1-41.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-40.Miroslav Gr
- 11c0: epl <mgrepl@redhat.com> 3.12.1-39.Miroslav Grepl <mgrepl@redhat.
- 1200: com> 3.12.1-38.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-37.Miro
- 1240: slav Grepl <mgrepl@redhat.com> 3.12.1-36.Miroslav Grepl <mgrepl@
- 1280: redhat.com> 3.12.1-35.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-
- 12c0: 34.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-33.Miroslav Grepl <
- 1300: mgrepl@redhat.com> 3.12.1-32.Miroslav Grepl <mgrepl@redhat.com>
- 1340: 3.12.1-31.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-30.Miroslav
- 1380: Grepl <mgrepl@redhat.com> 3.12.1-29.Dan Walsh <dwalsh@redhat.com
- 13c0: > 3.12.1-28.Dan Walsh <dwalsh@redhat.com> 3.12.1-27.Miroslav Gre
- 1400: pl <mgrepl@redhat.com> 3.12.1-26.Miroslav Grepl <mgrepl@redhat.c
- 1440: om> 3.12.1-25.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-24.Miros
- 1480: lav Grepl <mgrepl@redhat.com> 3.12.1-23.Miroslav Grepl <mgrepl@r
- 14c0: edhat.com> 3.12.1-22.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-2
- 1500: 1.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-20.Miroslav Grepl <m
- 1540: grepl@redhat.com> 3.12.1-19.Miroslav Grepl <mgrepl@redhat.com> 3
- 1580: .12.1-18.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-17.Miroslav G
- 15c0: repl <mgrepl@redhat.com> 3.12.1-16.Miroslav Grepl <mgrepl@redhat
- 1600: .com> 3.12.1-15.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-14.Mir
- 1640: oslav Grepl <mgrepl@redhat.com> 3.12.1-13.Miroslav Grepl <mgrepl
- 1680: @redhat.com> 3.12.1-12.Miroslav Grepl <mgrepl@redhat.com> 3.12.1
- 16c0: -11.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-10.Miroslav Grepl
- 1700: <mgrepl@redhat.com> 3.12.1-9.Miroslav Grepl <mgrepl@redhat.com>
- 1740: 3.12.1-8.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-7.Miroslav Gr
- 1780: epl <mgrepl@redhat.com> 3.12.1-6.Miroslav Grepl <mgrepl@redhat.c
- 17c0: om> 3.12.1-5.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-4.Mirosla
- 1800: v Grepl <mgrepl@redhat.com> 3.12.1-3.Miroslav Grepl <mgrepl@redh
- 1840: at.com> 3.12.1-2.Miroslav Grepl <mgrepl@redhat.com> 3.12.1-1.Dan
- 1880: Walsh <dwalsh@redhat.com> 3.11.1-69.1.Miroslav Grepl <mgrepl@re
- 18c0: dhat.com> 3.11.1-69.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-68
- 1900: .Miroslav Grepl <mgrepl@redhat.com> 3.11.1-67.Miroslav Grepl <mg
- 1940: repl@redhat.com> 3.11.1-66.Miroslav Grepl <mgrepl@redhat.com> 3.
- 1980: 11.1-65.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-64.Miroslav Gr
- 19c0: epl <mgrepl@redhat.com> 3.11.1-63.Miroslav Grepl <mgrepl@redhat.
- 1a00: com> 3.11.1-62.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-61.Miro
- 1a40: slav Grepl <mgrepl@redhat.com> 3.11.1-60.Miroslav Grepl <mgrepl@
- 1a80: redhat.com> 3.11.1-59.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-
- 1ac0: 58.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-57.Miroslav Grepl <
- 1b00: mgrepl@redhat.com> 3.11.1-56.Miroslav Grepl <mgrepl@redhat.com>
- 1b40: 3.11.1-55.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-54.Miroslav
- 1b80: Grepl <mgrepl@redhat.com> 3.11.1-53.Miroslav Grepl <mgrepl@redha
- 1bc0: t.com> 3.11.1-52.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-51.Mi
- 1c00: roslav Grepl <mgrepl@redhat.com> 3.11.1-50.Miroslav Grepl <mgrep
- 1c40: l@redhat.com> 3.11.1-49.Miroslav Grepl <mgrepl@redhat.com> 3.11.
- 1c80: 1-48.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-47.Miroslav Grepl
- 1cc0: <mgrepl@redhat.com> 3.11.1-46.Miroslav Grepl <mgrepl@redhat.com
- 1d00: > 3.11.1-45.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-44.Mirosla
- 1d40: v Grepl <mgrepl@redhat.com> 3.11.1-43.Miroslav Grepl <mgrepl@red
- 1d80: hat.com> 3.11.1-42.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-41.
- 1dc0: Miroslav Grepl <mgrepl@redhat.com> 3.11.1-40.Miroslav Grepl <mgr
- 1e00: epl@redhat.com> 3.11.1-39.Miroslav Grepl <mgrepl@redhat.com> 3.1
- 1e40: 1.1-38.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-37.Miroslav Gre
- 1e80: pl <mgrepl@redhat.com> 3.11.1-36.Miroslav Grepl <mgrepl@redhat.c
- 1ec0: om> 3.11.1-35.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-34.Miros
- 1f00: lav Grepl <mgrepl@redhat.com> 3.11.1-33.Miroslav Grepl <mgrepl@r
- 1f40: edhat.com> 3.11.1-32.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-3
- 1f80: 1.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-30.Miroslav Grepl <m
- 1fc0: grepl@redhat.com> 3.11.1-29.Miroslav Grepl <mgrepl@redhat.com> 3
- 2000: .11.1-28.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-27.Miroslav G
- 2040: repl <mgrepl@redhat.com> 3.11.1-26.Miroslav Grepl <mgrepl@redhat
- 2080: .com> 3.11.1-25.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-24.Mir
- 20c0: oslav Grepl <mgrepl@redhat.com> 3.11.1-23.Miroslav Grepl <mgrepl
- 2100: @redhat.com> 3.11.1-22.Miroslav Grepl <mgrepl@redhat.com> 3.11.1
- 2140: -21.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-20.Miroslav Grepl
- 2180: <mgrepl@redhat.com> 3.11.1-19.Miroslav Grepl <mgrepl@redhat.com>
- 21c0: 3.11.1-18.Miroslav Grepl <mgrepl@redhat.com> 3.
- 13:00:16.783099 <= Recv data, 16384 bytes (0x4000)
- 0000: 11.1-17.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-16.Dan Walsh <
- 0040: dwalsh@redhat.com> 3.11.1-15.Miroslav Grepl <mgrepl@redhat.com>
- 0080: 3.11.1-14.Dan Walsh <dwalsh@redhat.com> 3.11.1-13.Miroslav Grepl
- 00c0: <mgrepl@redhat.com> 3.11.1-12.Miroslav Grepl <mgrepl@redhat.com
- 0100: > 3.11.1-11.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-10.Dan Wal
- 0140: sh <dwalsh@redhat.com> 3.11.1-9.Dan Walsh <dwalsh@redhat.com> 3.
- 0180: 11.1-8.Dan Walsh <dwalsh@redhat.com> 3.11.1-7.Dan Walsh <dwalsh@
- 01c0: redhat.com> 3.11.1-6.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-5
- 0200: .Miroslav Grepl <mgrepl@redhat.com> 3.11.1-4.Miroslav Grepl <mgr
- 0240: epl@redhat.com> 3.11.1-3.Miroslav Grepl <mgrepl@redhat.com> 3.11
- 0280: .1-2.Miroslav Grepl <mgrepl@redhat.com> 3.11.1-1.Miroslav Grepl
- 02c0: <mgrepl@redhat.com> 3.11.1-0.Miroslav Grepl <mgrepl@redhat.com>
- 0300: 3.11.0-15.Miroslav Grepl <mgrepl@redhat.com> 3.11.0-14.Miroslav
- 0340: Grepl <mgrepl@redhat.com> 3.11.0-13.Miroslav Grepl <mgrepl@redha
- 0380: t.com> 3.11.0-12.Fedora Release Engineering <rel-eng@lists.fedor
- 03c0: aproject.org> - 3.11.0-11.Miroslav Grepl <mgrepl@redhat.com> 3.1
- 0400: 1.0-10.Miroslav Grepl <mgrepl@redhat.com> 3.11.0-9.Miroslav Grep
- 0440: l <mgrepl@redhat.com> 3.11.0-8.Miroslav Grepl <mgrepl@redhat.com
- 0480: > 3.11.0-7.Miroslav Grepl <mgrepl@redhat.com> 3.11.0-6.Miroslav
- 04c0: Grepl <mgrepl@redhat.com> 3.11.0-5.Miroslav Grepl <mgrepl@redhat
- 0500: .com> 3.11.0-4.Miroslav Grepl <mgrepl@redhat.com> 3.11.0-3.Miros
- 0540: lav Grepl <mgrepl@redhat.com> 3.11.0-2.Miroslav Grepl <mgrepl@re
- 0580: dhat.com> 3.11.0-1.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-128
- 05c0: .Miroslav Grepl <mgrepl@redhat.com> 3.10.0-127.Miroslav Grepl <m
- 0600: grepl@redhat.com> 3.10.0-126.Miroslav Grepl <mgrepl@redhat.com>
- 0640: 3.10.0-125.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-124.Mirosla
- 0680: v Grepl <mgrepl@redhat.com> 3.10.0-123.Miroslav Grepl <mgrepl@re
- 06c0: dhat.com> 3.10.0-122.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-1
- 0700: 21.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-120.Miroslav Grepl
- 0740: <mgrepl@redhat.com> 3.10.0-119.Miroslav Grepl <mgrepl@redhat.com
- 0780: > 3.10.0-118.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-117.Miros
- 07c0: lav Grepl <mgrepl@redhat.com> 3.10.0-116.Miroslav Grepl <mgrepl@
- 0800: redhat.com> 3.10.0-115.Miroslav Grepl <mgrepl@redhat.com> 3.10.0
- 0840: -114.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-113.Miroslav Grep
- 0880: l <mgrepl@redhat.com> 3.10.0-112.Miroslav Grepl <mgrepl@redhat.c
- 08c0: om> 3.10.0-111.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-110.Mir
- 0900: oslav Grepl <mgrepl@redhat.com> 3.10.0-109.Miroslav Grepl <mgrep
- 0940: l@redhat.com> 3.10.0-108.Miroslav Grepl <mgrepl@redhat.com> 3.10
- 0980: .0-107.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-106.Miroslav Gr
- 09c0: epl <mgrepl@redhat.com> 3.10.0-105.Miroslav Grepl <mgrepl@redhat
- 0a00: .com> 3.10.0-104.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-103.M
- 0a40: iroslav Grepl <mgrepl@redhat.com> 3.10.0-102.Miroslav Grepl <mgr
- 0a80: epl@redhat.com> 3.10.0-101.Miroslav Grepl <mgrepl@redhat.com> 3.
- 0ac0: 10.0-100.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-99.Miroslav G
- 0b00: repl <mgrepl@redhat.com> 3.10.0-98.Miroslav Grepl <mgrepl@redhat
- 0b40: .com> 3.10.0-97.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-96.Mir
- 0b80: oslav Grepl <mgrepl@redhat.com> 3.10.0-95.Miroslav Grepl <mgrepl
- 0bc0: @redhat.com> 3.10.0-94.Miroslav Grepl <mgrepl@redhat.com> 3.10.0
- 0c00: -93.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-92.Miroslav Grepl
- 0c40: <mgrepl@redhat.com> 3.10.0-91.Miroslav Grepl <mgrepl@redhat.com>
- 0c80: 3.10.0-90.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-89.Miroslav
- 0cc0: Grepl <mgrepl@redhat.com> 3.10.0-88.Miroslav Grepl <mgrepl@redh
- 0d00: at.com> 3.10.0-87.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-86.M
- 0d40: iroslav Grepl <mgrepl@redhat.com> 3.10.0-85.Miroslav Grepl <mgre
- 0d80: pl@redhat.com> 3.10.0-84.Miroslav Grepl <mgrepl@redhat.com> 3.10
- 0dc0: .0-83.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-82.Dan Walsh <dw
- 0e00: alsh@redhat.com> 3.10.0-81.2.Miroslav Grepl <mgrepl@redhat.com>
- 0e40: 3.10.0-81.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-80.Miroslav
- 0e80: Grepl <mgrepl@redhat.com> 3.10.0-79.Miroslav Grepl <mgrepl@redha
- 0ec0: t.com> 3.10.0-78.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-77.Mi
- 0f00: roslav Grepl <mgrepl@redhat.com> 3.10.0-76.Miroslav Grepl <mgrep
- 0f40: l@redhat.com> 3.10.0-75.Dan Walsh <dwalsh@redhat.com> 3.10.0-74.
- 0f80: 2.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-74.Miroslav Grepl <m
- 0fc0: grepl@redhat.com> 3.10.0-73.Miroslav Grepl <mgrepl@redhat.com> 3
- 1000: .10.0-72.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-71.Miroslav G
- 1040: repl <mgrepl@redhat.com> 3.10.0-70.Miroslav Grepl <mgrepl@redhat
- 1080: .com> 3.10.0-69.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-68.Mir
- 10c0: oslav Grepl <mgrepl@redhat.com> 3.10.0-67.Miroslav Grepl <mgrepl
- 1100: @redhat.com> 3.10.0-66.Miroslav Grepl <mgrepl@redhat.com> 3.10.0
- 1140: -65.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-64.Miroslav Grepl
- 1180: <mgrepl@redhat.com> 3.10.0-63.Miroslav Grepl <mgrepl@redhat.com>
- 11c0: 3.10.0-59.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-58.Dan Wals
- 1200: h <dwalsh@redhat.com> 3.10.0-57.Dan Walsh <dwalsh@redhat.com> 3.
- 1240: 10.0-56.Dan Walsh <dwalsh@redhat.com> 3.10.0-55.2.Dan Walsh <dwa
- 1280: lsh@redhat.com> 3.10.0-55.1.Miroslav Grepl <mgrepl@redhat.com> 3
- 12c0: .10.0-55.Dan Walsh <dwalsh@redhat.com> 3.10.0-54.1.Miroslav Grep
- 1300: l <mgrepl@redhat.com> 3.10.0-54.Dan Walsh <dwalsh@redhat.com> 3.
- 1340: 10.0-53.1.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-53.Miroslav
- 1380: Grepl <mgrepl@redhat.com> 3.10.0-52.Miroslav Grepl <mgrepl@redha
- 13c0: t.com> 3.10.0-51.Dan Walsh <dwalsh@redhat.com> 3.10.0-50.2.Dan W
- 1400: alsh <dwalsh@redhat.com> 3.10.0-50.1.Miroslav Grepl <mgrepl@redh
- 1440: at.com> 3.10.0-50.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-49.M
- 1480: iroslav Grepl <mgrepl@redhat.com> 3.10.0-48.Miroslav Grepl <mgre
- 14c0: pl@redhat.com> 3.10.0-47.Dan Walsh <dwalsh@redhat.com> 3.10.0-46
- 1500: .1.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-46.Dan Walsh <dwals
- 1540: h@redhat.com> 3.10.0-45.1.Miroslav Grepl <mgrepl@redhat.com> 3.1
- 1580: 0.0-45.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-43.Miroslav Gre
- 15c0: pl <mgrepl@redhat.com> 3.10.0-42.Miroslav Grepl <mgrepl@redhat.c
- 1600: om> 3.10.0-41.Dan Walsh <dwalsh@redhat.com> 3.10.0-40.2.Miroslav
- 1640: Grepl <mgrepl@redhat.com> 3.10.0-40.Dan Walsh <dwalsh@redhat.co
- 1680: m> 3.10.0-39.3.Dan Walsh <dwalsh@redhat.com> 3.10.0-39.2.Dan Wal
- 16c0: sh <dwalsh@redhat.com> 3.10.0-39.1.Miroslav Grepl <mgrepl@redhat
- 1700: .com> 3.10.0-39.Dan Walsh <dwalsh@redhat.com> 3.10.0-38.1.Mirosl
- 1740: av Grepl <mgrepl@redhat.com> 3.10.0-38.Miroslav Grepl <mgrepl@re
- 1780: dhat.com> 3.10.0-37.Dan Walsh <dwalsh@redhat.com> 3.10.0-36.1.Mi
- 17c0: roslav Grepl <mgrepl@redhat.com> 3.10.0-36.Dan Walsh <dwalsh@red
- 1800: hat.com> 3.10.0-35.Dan Walsh <dwalsh@redhat.com> 3.10.0-34.7.Dan
- 1840: Walsh <dwalsh@redhat.com> 3.10.0-34.6.Dan Walsh <dwalsh@redhat.
- 1880: com> 3.10.0-34.4.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-34.3.
- 18c0: Dan Walsh <dwalsh@redhat.com> 3.10.0-34.2.Dan Walsh <dwalsh@redh
- 1900: at.com> 3.10.0-34.1.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-34
- 1940: .Miroslav Grepl <mgrepl@redhat.com> 3.10.0-33.Dan Walsh <dwalsh@
- 1980: redhat.com> 3.10.0-31.1.Miroslav Grepl <mgrepl@redhat.com> 3.10.
- 19c0: 0-31.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-29.Miroslav Grepl
- 1a00: <mgrepl@redhat.com> 3.10.0-28.Miroslav Grepl <mgrepl@redhat.com
- 1a40: > 3.10.0-27.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-26.Mirosla
- 1a80: v Grepl <mgrepl@redhat.com> 3.10.0-25.Miroslav Grepl <mgrepl@red
- 1ac0: hat.com> 3.10.0-24.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-23.
- 1b00: Miroslav Grepl <mgrepl@redhat.com> 3.10.0-22.Miroslav Grepl <mgr
- 1b40: epl@redhat.com> 3.10.0-21.Dan Walsh <dwalsh@redhat.com> 3.10.0-2
- 1b80: 0.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-19.Miroslav Grepl <m
- 1bc0: grepl@redhat.com> 3.10.0-18.Miroslav Grepl <mgrepl@redhat.com> 3
- 1c00: .10.0-17.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-16.Miroslav G
- 1c40: repl <mgrepl@redhat.com> 3.10.0-14.Miroslav Grepl <mgrepl@redhat
- 1c80: .com> 3.10.0-13.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-12.Mir
- 1cc0: oslav Grepl <mgrepl@redhat.com> 3.10.0-11.Miroslav Grepl <mgrepl
- 1d00: @redhat.com> 3.10.0-10.Miroslav Grepl <mgrepl@redhat.com> 3.10.0
- 1d40: -9.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-8.Miroslav Grepl <m
- 1d80: grepl@redhat.com> 3.10.0-7.Miroslav Grepl <mgrepl@redhat.com> 3.
- 1dc0: 10.0-6.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-5.Miroslav Grep
- 1e00: l <mgrepl@redhat.com> 3.10.0-4.Miroslav Grepl <mgrepl@redhat.com
- 1e40: > 3.10.0-3.Miroslav Grepl <mgrepl@redhat.com> 3.10.0-2.Miroslav
- 1e80: Grepl <mgrepl@redhat.com> 3.10.0-1.Miroslav Grepl <mgrepl@redhat
- 1ec0: .com> 3.9.16-30.Dan Walsh <dwalsh@redhat.com> 3.9.16-29.1.Mirosl
- 1f00: av Grepl <mgrepl@redhat.com> 3.9.16-29.Dan Walsh <dwalsh@redhat.
- 1f40: com> 3.9.16-28.1.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-27.Mi
- 1f80: roslav Grepl <mgrepl@redhat.com> 3.9.16-26.Miroslav Grepl <mgrep
- 1fc0: l@redhat.com> 3.9.16-25.Miroslav Grepl <mgrepl@redhat.com> 3.9.1
- 2000: 6-24.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-23.Miroslav Grepl
- 2040: <mgrepl@redhat.com> 3.9.16-22.Miroslav Grepl <mgrepl@redhat.com
- 2080: > 3.9.16-21.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-20.Mirosla
- 20c0: v Grepl <mgrepl@redhat.com> 3.9.16-19.Miroslav Grepl <mgrepl@red
- 2100: hat.com> 3.9.16-18.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-17.
- 2140: Dan Walsh <dwalsh@redhat.com> 3.9.16-16.1.Miroslav Grepl <mgrepl
- 2180: @redhat.com> 3.9.16-16.Miroslav Grepl <mgrepl@redhat.com> 3.9.16
- 21c0: -15.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-14.Miroslav Grepl
- 2200: <mgrepl@redhat.com> 3.9.16-13.Miroslav Grepl <mgrepl@redhat.com>
- 2240: 3.9.16-12.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-11.Miroslav
- 2280: Grepl <mgrepl@redhat.com> 3.9.16-10.Miroslav Grepl <mgrepl@redh
- 22c0: at.com> 3.9.16-7.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-6.Mir
- 2300: oslav Grepl <mgrepl@redhat.com> 3.9.16-5.Miroslav Grepl <mgrepl@
- 2340: redhat.com> 3.9.16-4.Miroslav Grepl <mgrepl@redhat.com> 3.9.16-3
- 2380: .Miroslav Grepl <mgrepl@redhat.com> 3.9.16-2.Miroslav Grepl <mgr
- 23c0: epl@redhat.com> 3.9.16-1.Miroslav Grepl <mgrepl@redhat.com> 3.9.
- 2400: 15-5.Miroslav Grepl <mgrepl@redhat.com> 3.9.15-2.Miroslav Grepl
- 2440: <mgrepl@redhat.com> 3.9.15-1.Fedora Release Engineering <rel-eng
- 2480: @lists.fedoraproject.org> - 3.9.14-2.Dan Walsh <dwalsh@redhat.co
- 24c0: m> 3.9.14-1.Miroslav Grepl <mgrepl@redhat.com> 3.9.13-10.Mirosla
- 2500: v Grepl <mgrepl@redhat.com> 3.9.13-9.Dan Walsh <dwalsh@redhat.co
- 2540: m> 3.9.13-8.Miroslav Grepl <mgrepl@redhat.com> 3.9.13-7.Miroslav
- 2580: Grepl <mgrepl@redhat.com> 3.9.13-6.Miroslav Grepl <mgrepl@redha
- 25c0: t.com> 3.9.13-5.Miroslav Grepl <mgrepl@redhat.com> 3.9.13-4.Miro
- 2600: slav Grepl <mgrepl@redhat.com> 3.9.13-3.Miroslav Grepl <mgrepl@r
- 2640: edhat.com> 3.9.13-2.Miroslav Grepl <mgrepl@redhat.com> 3.9.13-1.
- 2680: Miroslav Grepl <mgrepl@redhat.com> 3.9.12-8.Miroslav Grepl <mgre
- 26c0: pl@redhat.com> 3.9.12-7.Miroslav Grepl <mgrepl@redhat.com> 3.9.1
- 2700: 2-6.Miroslav Grepl <mgrepl@redhat.com> 3.9.12-5.Dan Walsh <dwals
- 2740: h@redhat.com> 3.9.12-4.Dan Walsh <dwalsh@redhat.com> 3.9.12-3.Da
- 2780: n Walsh <dwalsh@redhat.com> 3.9.12-2.Miroslav Grepl <mgrepl@redh
- 27c0: at.com> 3.9.12-1.Dan Walsh <dwalsh@redhat.com> 3.9.11-2.Miroslav
- 2800: Grepl <mgrepl@redhat.com> 3.9.11-1.Miroslav Grepl <mgrepl@redha
- 2840: t.com> 3.9.10-13.Dan Walsh <dwalsh@redhat.com> 3.9.10-12.Mirosla
- 2880: v Grepl <mgrepl@redhat.com> 3.9.10-11.Miroslav Grepl <mgrepl@red
- 28c0: hat.com> 3.9.10-10.Miroslav Grepl <mgrepl@redhat.com> 3.9.10-9.M
- 2900: iroslav Grepl <mgrepl@redhat.com> 3.9.10-8.Miroslav Grepl <mgrep
- 2940: l@redhat.com> 3.9.10-7.Miroslav Grepl <mgrepl@redhat.com> 3.9.10
- 2980: -6.Miroslav Grepl <mgrepl@redhat.com> 3.9.10-5.Dan Walsh <dwalsh
- 29c0: @redhat.com> 3.9.10-4.Miroslav Grepl <mgrepl@redhat.com> 3.9.10-
- 2a00: 3.Miroslav Grepl <mgrepl@redhat.com> 3.9.10-2.Miroslav Grepl <mg
- 2a40: repl@redhat.com> 3.9.10-1.Miroslav Grepl <mgrepl@redhat.com> 3.9
- 2a80: .9-4.Dan Walsh <dwalsh@redhat.com> 3.9.9-3.Miroslav Grepl <mgrep
- 2ac0: l@redhat.com> 3.9.9-2.Miroslav Grepl <mgrepl@redhat.com> 3.9.9-1
- 2b00: .Miroslav Grepl <mgrepl@redhat.com> 3.9.8-7.Dan Walsh <dwalsh@re
- 2b40: dhat.com> 3.9.8-6.Miroslav Grepl <mgrepl@redhat.com> 3.9.8-5.Mir
- 2b80: oslav Grepl <mgrepl@redhat.com> 3.9.8-4.Dan Walsh <dwalsh@redhat
- 2bc0: .com> 3.9.8-3.Dan Walsh <dwalsh@redhat.com> 3.9.8-2.Dan Walsh <d
- 2c00: walsh@redhat.com> 3.9.8-1.Dan Walsh <dwalsh@redhat.com> 3.9.7-10
- 2c40: .Dan Walsh <dwalsh@redhat.com> 3.9.7-9.Dan Walsh <dwalsh@redhat.
- 2c80: com> 3.9.7-8.Dan Walsh <dwalsh@redhat.com> 3.9.7-7.Dan Walsh <dw
- 2cc0: alsh@redhat.com> 3.9.7-6.Dan Walsh <dwalsh@redhat.com> 3.9.7-5.D
- 2d00: an Walsh <dwalsh@redhat.com> 3.9.7-4.Dan Walsh <dwalsh@redhat.co
- 2d40: m> 3.9.7-3.Dan Walsh <dwalsh@redhat.com> 3.9.7-2.Dan Walsh <dwal
- 2d80: sh@redhat.com> 3.9.7-1.Dan Walsh <dwalsh@redhat.com> 3.9.6-3.Dan
- 2dc0: Walsh <dwalsh@redhat.com> 3.9.6-2.Dan Walsh <dwalsh@redhat.com>
- 2e00: 3.9.6-1.Dan Walsh <dwalsh@redhat.com> 3.9.5-11.Dan Walsh <dwals
- 2e40: h@redhat.com> 3.9.5-10.Dan Walsh <dwalsh@redhat.com> 3.9.5-9.Dan
- 2e80: Walsh <dwalsh@redhat.com> 3.9.5-8.Dan Walsh <dwalsh@redhat.com>
- 2ec0: 3.9.5-7.Dan Walsh <dwalsh@redhat.com> 3.9.5-6.Dan Walsh <dwalsh
- 2f00: @redhat.com> 3.9.5-5.Dan Walsh <dwalsh@redhat.com> 3.9.5-4.Dan W
- 2f40: alsh <dwalsh@redhat.com> 3.9.5-3.Dan Walsh <dwalsh@redhat.com> 3
- 2f80: .9.5-2.Dan Walsh <dwalsh@redhat.com> 3.9.5-1.Dan Walsh <dwalsh@r
- 2fc0: edhat.com> 3.9.4-3.Dan Walsh <dwalsh@redhat.com> 3.9.4-2.Dan Wal
- 3000: sh <dwalsh@redhat.com> 3.9.4-1.Dan Walsh <dwalsh@redhat.com> 3.9
- 3040: .3-4.Dan Walsh <dwalsh@redhat.com> 3.9.3-3.Dan Walsh <dwalsh@red
- 3080: hat.com> 3.9.3-2.Dan Walsh <dwalsh@redhat.com> 3.9.3-1.Dan Walsh
- 30c0: <dwalsh@redhat.com> 3.9.2-1.Dan Walsh <dwalsh@redhat.com> 3.9.1
- 3100: -3.Dan Walsh <dwalsh@redhat.com> 3.9.1-2.Dan Walsh <dwalsh@redha
- 3140: t.com> 3.9.1-1.Dan Walsh <dwalsh@redhat.com> 3.9.0-2.Dan Walsh <
- 3180: dwalsh@redhat.com> 3.9.0-1.Dan Walsh <dwalsh@redhat.com> 3.8.8-2
- 31c0: 1.Dan Walsh <dwalsh@redhat.com> 3.8.8-20.Dan Walsh <dwalsh@redha
- 3200: t.com> 3.8.8-19.Dan Walsh <dwalsh@redhat.com> 3.8.8-18.Dan Walsh
- 3240: <dwalsh@redhat.com> 3.8.8-17.Dan Walsh <dwalsh@redhat.com> 3.8.
- 3280: 8-16.Dan Walsh <dwalsh@redhat.com> 3.8.8-15.Dan Walsh <dwalsh@re
- 32c0: dhat.com> 3.8.8-14.Dan Walsh <dwalsh@redhat.com> 3.8.8-13.Dan Wa
- 3300: lsh <dwalsh@redhat.com> 3.8.8-12.Dan Walsh <dwalsh@redhat.com> 3
- 3340: .8.8-11.Dan Walsh <dwalsh@redhat.com> 3.8.8-10.Dan Walsh <dwalsh
- 3380: @redhat.com> 3.8.8-9.Dan Walsh <dwalsh@redhat.com> 3.8.8-8.Dan W
- 33c0: alsh <dwalsh@redhat.com> 3.8.8-7.Dan Walsh <dwalsh@redhat.com> 3
- 3400: .8.8-6.Dan Walsh <dwalsh@redhat.com> 3.8.8-5.Dan Walsh <dwalsh@r
- 3440: edhat.com> 3.8.8-4.Dan Walsh <dwalsh@redhat.com> 3.8.8-3.Dan Wal
- 3480: sh <dwalsh@redhat.com> 3.8.8-2.Dan Walsh <dwalsh@redhat.com> 3.8
- 34c0: .8-1.Dan Walsh <dwalsh@redhat.com> 3.8.7-3.Dan Walsh <dwalsh@red
- 3500: hat.com> 3.8.7-2.Dan Walsh <dwalsh@redhat.com> 3.8.7-1.Dan Walsh
- 3540: <dwalsh@redhat.com> 3.8.6-3.Miroslav Grepl <mgrepl@redhat.com>
- 3580: 3.8.6-2.Dan Walsh <dwalsh@redhat.com> 3.8.6-1.Dan Walsh <dwalsh@
- 35c0: redhat.com> 3.8.5-1.Dan Walsh <dwalsh@redhat.com> 3.8.4-1.Dan Wa
- 3600: lsh <dwalsh@redhat.com> 3.8.3-4.Dan Walsh <dwalsh@redhat.com> 3.
- 3640: 8.3-3.Dan Walsh <dwalsh@redhat.com> 3.8.3-2.Dan Walsh <dwalsh@re
- 3680: dhat.com> 3.8.3-1.Dan Walsh <dwalsh@redhat.com> 3.8.2-1.Dan Wals
- 36c0: h <dwalsh@redhat.com> 3.8.1-5.Dan Walsh <dwalsh@redhat.com> 3.8.
- 3700: 1-4.Dan Walsh <dwalsh@redhat.com> 3.8.1-3.Dan Walsh <dwalsh@redh
- 3740: at.com> 3.8.1-2.Dan Walsh <dwalsh@redhat.com> 3.8.1-1.Dan Walsh
- 3780: <dwalsh@redhat.com> 3.7.19-22.Dan Walsh <dwalsh@redhat.com> 3.7.
- 37c0: 19-21.Dan Walsh <dwalsh@redhat.com> 3.7.19-20.Dan Walsh <dwalsh@
- 3800: redhat.com> 3.7.19-19.Dan Walsh <dwalsh@redhat.com> 3.7.19-17.Da
- 3840: n Walsh <dwalsh@redhat.com> 3.7.19-16.Dan Walsh <dwalsh@redhat.c
- 3880: om> 3.7.19-15.Dan Walsh <dwalsh@redhat.com> 3.7.19-14.Dan Walsh
- 38c0: <dwalsh@redhat.com> 3.7.19-13.Dan Walsh <dwalsh@redhat.com> 3.7.
- 3900: 19-12.Dan Walsh <dwalsh@redhat.com> 3.7.19-11.Dan Walsh <dwalsh@
- 3940: redhat.com> 3.7.19-10.Dan Walsh <dwalsh@redhat.com> 3.7.19-9.Dan
- 3980: Walsh <dwalsh@redhat.com> 3.7.19-8.Dan Walsh <dwalsh@redhat.com
- 39c0: > 3.7.19-7.Dan Walsh <dwalsh@redhat.com> 3.7.19-6.Dan Walsh <dwa
- 3a00: lsh@redhat.com> 3.7.19-5.Dan Walsh <dwalsh@redhat.com> 3.7.19-4.
- 3a40: Dan Walsh <dwalsh@redhat.com> 3.7.19-3.Dan Walsh <dwalsh@redhat.
- 3a80: com> 3.7.19-2.Dan Walsh <dwalsh@redhat.com> 3.7.19-1.Dan Walsh <
- 3ac0: dwalsh@redhat.com> 3.7.18-3.Dan Walsh <dwalsh@redhat.com> 3.7.18
- 3b00: -2.Dan Walsh <dwalsh@redhat.com> 3.7.18-1.Dan Walsh <dwalsh@redh
- 3b40: at.com> 3.7.17-6.Dan Walsh <dwalsh@redhat.com> 3.7.17-5.Dan Wals
- 3b80: h <dwalsh@redhat.com> 3.7.17-4.Dan Walsh <dwalsh@redhat.com> 3.7
- 3bc0: .17-3.Dan Walsh <dwalsh@redhat.com> 3.7.17-2.Dan Walsh <dwalsh@r
- 3c00: edhat.com> 3.7.17-1.Dan Walsh <dwalsh@redhat.com> 3.7.16-2.Dan W
- 3c40: alsh <dwalsh@redhat.com> 3.7.16-1.Dan Walsh <dwalsh@redhat.com>
- 3c80: 3.7.15-4.Dan Walsh <dwalsh@redhat.com> 3.7.15-3.Dan Walsh <dwals
- 3cc0: h@redhat.com> 3.7.15-2.Dan Walsh <dwalsh@redhat.com> 3.7.15-1.Da
- 3d00: n Walsh <dwalsh@redhat.com> 3.7.14-5.Dan Walsh <dwalsh@redhat.co
- 3d40: m> 3.7.14-4.Dan Walsh <dwalsh@redhat.com> 3.7.14-3.Dan Walsh <dw
- 3d80: alsh@redhat.com> 3.7.14-2.Dan Walsh <dwalsh@redhat.com> 3.7.14-1
- 3dc0: .Dan Walsh <dwalsh@redhat.com> 3.7.13-4.Dan Walsh <dwalsh@redhat
- 3e00: .com> 3.7.13-3.Dan Walsh <dwalsh@redhat.com> 3.7.13-2.Dan Walsh
- 3e40: <dwalsh@redhat.com> 3.7.13-1.Dan Walsh <dwalsh@redhat.com> 3.7.1
- 3e80: 2-1.Dan Walsh <dwalsh@redhat.com> 3.7.11-1.Dan Walsh <dwalsh@red
- 3ec0: hat.com> 3.7.10-5.Dan Walsh <dwalsh@redhat.com> 3.7.10-4.Dan Wal
- 3f00: sh <dwalsh@redhat.com> 3.7.10-3.Dan Walsh <dwalsh@redhat.com> 3.
- 3f40: 7.10-2.Dan Walsh <dwalsh@redhat.com> 3.7.10-1.Dan Walsh <dwalsh@
- 3f80: redhat.com> 3.7.9-4.Dan Walsh <dwalsh@redhat.com> 3.7.9-3.Dan Wa
- 3fc0: lsh <dwalsh@redhat.com> 3.7.9-2.Dan Walsh <dwalsh@redhat.com> 3.
- 13:00:16.789809 <= Recv data, 992 bytes (0x3e0)
- 0000: 7.9-1.Dan Walsh <dwalsh@redhat.com> 3.7.8-11.Dan Walsh <dwalsh@r
- 0040: edhat.com> 3.7.8-9.Dan Walsh <dwalsh@redhat.com> 3.7.8-8.Dan Wal
- 0080: sh <dwalsh@redhat.com> 3.7.8-7.Dan Walsh <dwalsh@redhat.com> 3.7
- 00c0: .8-6.Dan Walsh <dwalsh@redhat.com> 3.7.8-5.Dan Walsh <dwalsh@red
- 0100: hat.com> 3.7.8-4.Dan Walsh <dwalsh@redhat.com> 3.7.8-3.Dan Walsh
- 0140: <dwalsh@redhat.com> 3.7.8-2.Dan Walsh <dwalsh@redhat.com> 3.7.8
- 0180: -1.Dan Walsh <dwalsh@redhat.com> 3.7.7-3.Dan Walsh <dwalsh@redha
- 01c0: t.com> 3.7.7-2.Dan Walsh <dwalsh@redhat.com> 3.7.7-1.Dan Walsh <
- 0200: dwalsh@redhat.com> 3.7.6-1.Dan Walsh <dwalsh@redhat.com> 3.7.5-8
- 0240: .Dan Walsh <dwalsh@redhat.com> 3.7.5-7.Dan Walsh <dwalsh@redhat.
- 0280: com> 3.7.5-6.Dan Walsh <dwalsh@redhat.com> 3.7.5-5.Dan Walsh <dw
- 02c0: alsh@redhat.com> 3.7.5-4.Dan Walsh <dwalsh@redhat.com> 3.7.5-3.D
- 0300: an Walsh <dwalsh@redhat.com> 3.7.5-2.Dan Walsh <dwalsh@redhat.co
- 0340: m> 3.7.5-1.Dan Walsh <dwalsh@redhat.com> 3.7.4-4.Dan Walsh <dwal
- 0380: sh@redhat.com> 3.7.4-3.Dan Walsh <dwalsh@redhat.com> 3.7.4-2.Dan
- 03c0: Walsh <dwalsh@redhat.com> 3.7.4
- 13:00:16.793305 <= Recv data, 1448 bytes (0x5a8)
- 0000: -1.Dan Walsh <dwalsh@redhat.com> 3.7.3-1.Dan Walsh <dwalsh@redha
- 0040: t.com> 3.7.1-1.Dan Walsh <dwalsh@redhat.com> 3.6.33-2.Dan Walsh
- 0080: <dwalsh@redhat.com> 3.6.33-1.Dan Walsh <dwalsh@redhat.com> 3.6.3
- 00c0: 2-17.Dan Walsh <dwalsh@redhat.com> 3.6.32-16.Dan Walsh <dwalsh@r
- 0100: edhat.com> 3.6.32-15.Dan Walsh <dwalsh@redhat.com> 3.6.32-13.Dan
- 0140: Walsh <dwalsh@redhat.com> 3.6.32-12.Dan Walsh <dwalsh@redhat.co
- 0180: m> 3.6.32-11.Dan Walsh <dwalsh@redhat.com> 3.6.32-10.Dan Walsh <
- 01c0: dwalsh@redhat.com> 3.6.32-9.Dan Walsh <dwalsh@redhat.com> 3.6.32
- 0200: -8.Dan Walsh <dwalsh@redhat.com> 3.6.32-7.Dan Walsh <dwalsh@redh
- 0240: at.com> 3.6.32-6.Dan Walsh <dwalsh@redhat.com> 3.6.32-5.Dan Wals
- 0280: h <dwalsh@redhat.com> 3.6.32-4.Dan Walsh <dwalsh@redhat.com> 3.6
- 02c0: .32-3.Dan Walsh <dwalsh@redhat.com> 3.6.32-2.Dan Walsh <dwalsh@r
- 0300: edhat.com> 3.6.32-1.Dan Walsh <dwalsh@redhat.com> 3.6.31-5.Dan W
- 0340: alsh <dwalsh@redhat.com> 3.6.31-4.Dan Walsh <dwalsh@redhat.com>
- 0380: 3.6.31-3.Dan Walsh <dwalsh@redhat.com> 3.6.31-2.Dan Walsh <dwals
- 03c0: h@redhat.com> 3.6.30-6.Dan Walsh <dwalsh@redhat.com> 3.6.30-5.Da
- 0400: n Walsh <dwalsh@redhat.com> 3.6.30-4.Dan Walsh <dwalsh@redhat.co
- 0440: m> 3.6.30-3.Dan Walsh <dwalsh@redhat.com> 3.6.30-2.Dan Walsh <dw
- 0480: alsh@redhat.com> 3.6.30-1.Dan Walsh <dwalsh@redhat.com> 3.6.29-2
- 04c0: .Dan Walsh <dwalsh@redhat.com> 3.6.29-1.Dan Walsh <dwalsh@redhat
- 0500: .com> 3.6.28-9.Dan Walsh <dwalsh@redhat.com> 3.6.28-8.Dan Walsh
- 0540: <dwalsh@redhat.com> 3.6.28-7.Dan Walsh <dwalsh@redhat.com> 3.6.2
- 0580: 8-6.Dan Walsh <dwalsh@redhat.com> 3.6.28
- 13:00:16.793733 <= Recv data, 1448 bytes (0x5a8)
- 0000: -5.Dan Walsh <dwalsh@redhat.com> 3.6.28-4.Dan Walsh <dwalsh@redh
- 0040: at.com> 3.6.28-3.Dan Walsh <dwalsh@redhat.com> 3.6.28-2.Dan Wals
- 0080: h <dwalsh@redhat.com> 3.6.28-1.Dan Walsh <dwalsh@redhat.com> 3.6
- 00c0: .27-1.Dan Walsh <dwalsh@redhat.com> 3.6.26-11.Dan Walsh <dwalsh@
- 0100: redhat.com> 3.6.26-10.Dan Walsh <dwalsh@redhat.com> 3.6.26-9.Bil
- 0140: l Nottingham <notting@redhat.com> 3.6.26-8.Dan Walsh <dwalsh@red
- 0180: hat.com> 3.6.26-7.Dan Walsh <dwalsh@redhat.com> 3.6.26-6.Dan Wal
- 01c0: sh <dwalsh@redhat.com> 3.6.26-5.Dan Walsh <dwalsh@redhat.com> 3.
- 0200: 6.26-4.Dan Walsh <dwalsh@redhat.com> 3.6.26-3.Dan Walsh <dwalsh@
- 0240: redhat.com> 3.6.26-2.Dan Walsh <dwalsh@redhat.com> 3.6.26-1.Dan
- 0280: Walsh <dwalsh@redhat.com> 3.6.25-1.Dan Walsh <dwalsh@redhat.com>
- 02c0: 3.6.24-1.Dan Walsh <dwalsh@redhat.com> 3.6.23-2.Dan Walsh <dwal
- 0300: sh@redhat.com> 3.6.23-1.Dan Walsh <dwalsh@redhat.com> 3.6.22-3.D
- 0340: an Walsh <dwalsh@redhat.com> 3.6.22-1.Dan Walsh <dwalsh@redhat.c
- 0380: om> 3.6.21-4.Dan Walsh <dwalsh@redhat.com> 3.6.21-3.Tom "spot" C
- 03c0: allaway <tcallawa@redhat.com> 3.6.21-2.Dan Walsh <dwalsh@redhat.
- 0400: com> 3.6.21-1.Dan Walsh <dwalsh@redhat.com> 3.6.20-2.Dan Walsh <
- 0440: dwalsh@redhat.com> 3.6.20-1.Dan Walsh <dwalsh@redhat.com> 3.6.19
- 0480: -5.Dan Walsh <dwalsh@redhat.com> 3.6.19-4.Dan Walsh <dwalsh@redh
- 04c0: at.com> 3.6.19-3.Dan Walsh <dwalsh@redhat.com> 3.6.19-2.Dan Wals
- 0500: h <dwalsh@redhat.com> 3.6.19-1.Dan Walsh <dwalsh@redhat.com> 3.6
- 0540: .18-1.Dan Walsh <dwalsh@redhat.com> 3.6.17-1.Dan Walsh <dwalsh@r
- 0580: edhat.com> 3.6.16-4.Dan Walsh <dwalsh@re
- 13:00:16.794296 <= Recv data, 2896 bytes (0xb50)
- 0000: dhat.com> 3.6.16-3.Dan Walsh <dwalsh@redhat.com> 3.6.16-2.Dan Wa
- 0040: lsh <dwalsh@redhat.com> 3.6.16-1.Dan Walsh <dwalsh@redhat.com> 3
- 0080: .6.14-3.Dan Walsh <dwalsh@redhat.com> 3.6.14-2.Dan Walsh <dwalsh
- 00c0: @redhat.com> 3.6.14-1.Dan Walsh <dwalsh@redhat.com> 3.6.13-3.Dan
- 0100: Walsh <dwalsh@redhat.com> 3.6.13-2.Dan Walsh <dwalsh@redhat.com
- 0140: > 3.6.13-1.Dan Walsh <dwalsh@redhat.com> 3.6.12-39.Dan Walsh <dw
- 0180: alsh@redhat.com> 3.6.12-38.Dan Walsh <dwalsh@redhat.com> 3.6.12-
- 01c0: 37.Dan Walsh <dwalsh@redhat.com> 3.6.12-36.Dan Walsh <dwalsh@red
- 0200: hat.com> 3.6.12-35.Dan Walsh <dwalsh@redhat.com> 3.6.12-34.Dan W
- 0240: alsh <dwalsh@redhat.com> 3.6.12-33.Dan Walsh <dwalsh@redhat.com>
- 0280: 3.6.12-31.Dan Walsh <dwalsh@redhat.com> 3.6.12-30.Dan Walsh <dw
- 02c0: alsh@redhat.com> 3.6.12-29.Dan Walsh <dwalsh@redhat.com> 3.6.12-
- 0300: 28.Dan Walsh <dwalsh@redhat.com> 3.6.12-27.Dan Walsh <dwalsh@red
- 0340: hat.com> 3.6.12-26.Dan Walsh <dwalsh@redhat.com> 3.6.12-25.Dan W
- 0380: alsh <dwalsh@redhat.com> 3.6.12-24.Dan Walsh <dwalsh@redhat.com>
- 03c0: 3.6.12-23.Dan Walsh <dwalsh@redhat.com> 3.6.12-22.Dan Walsh <dw
- 0400: alsh@redhat.com> 3.6.12-21.Dan Walsh <dwalsh@redhat.com> 3.6.12-
- 0440: 20.Dan Walsh <dwalsh@redhat.com> 3.6.12-19.Dan Walsh <dwalsh@red
- 0480: hat.com> 3.6.12-16.Dan Walsh <dwalsh@redhat.com> 3.6.12-15.Dan W
- 04c0: alsh <dwalsh@redhat.com> 3.6.12-14.Dan Walsh <dwalsh@redhat.com>
- 0500: 3.6.12-13.Dan Walsh <dwalsh@redhat.com> 3.6.12-12.Dan Walsh <dw
- 0540: alsh@redhat.com> 3.6.12-11.Dan Walsh <dwalsh@redhat.com> 3.6.12-
- 0580: 10.Dan Walsh <dwalsh@redhat.com> 3.6.12-9.Dan Walsh <dwalsh@redh
- 05c0: at.com> 3.6.12-8.Dan Walsh <dwalsh@redhat.com> 3.6.12-7.Dan Wals
- 0600: h <dwalsh@redhat.com> 3.6.12-6.Dan Walsh <dwalsh@redhat.com> 3.6
- 0640: .12-5.Dan Walsh <dwalsh@redhat.com> 3.6.12-4.Dan Walsh <dwalsh@r
- 0680: edhat.com> 3.6.12-3.Dan Walsh <dwalsh@redhat.com> 3.6.12-2.Dan W
- 06c0: alsh <dwalsh@redhat.com> 3.6.12-1.Dan Walsh <dwalsh@redhat.com>
- 0700: 3.6.11-1.Dan Walsh <dwalsh@redhat.com> 3.6.10-9.Dan Walsh <dwals
- 0740: h@redhat.com> 3.6.10-8.Dan Walsh <dwalsh@redhat.com> 3.6.10-7.Da
- 0780: n Walsh <dwalsh@redhat.com> 3.6.10-6.Dan Walsh <dwalsh@redhat.co
- 07c0: m> 3.6.10-5.Dan Walsh <dwalsh@redhat.com> 3.6.10-4.Dan Walsh <dw
- 0800: alsh@redhat.com> 3.6.10-3.Dan Walsh <dwalsh@redhat.com> 3.6.10-2
- 0840: .Dan Walsh <dwalsh@redhat.com> 3.6.10-1.Dan Walsh <dwalsh@redhat
- 0880: .com> 3.6.9-4.Dan Walsh <dwalsh@redhat.com> 3.6.9-3.Dan Walsh <d
- 08c0: walsh@redhat.com> 3.6.9-2.Dan Walsh <dwalsh@redhat.com> 3.6.9-1.
- 0900: Dan Walsh <dwalsh@redhat.com> 3.6.8-4.Dan Walsh <dwalsh@redhat.c
- 0940: om> 3.6.8-3.Dan Walsh <dwalsh@redhat.com> 3.6.8-2.Dan Walsh <dwa
- 0980: lsh@redhat.com> 3.6.8-1.Dan Walsh <dwalsh@redhat.com> 3.6.7-2.Da
- 09c0: n Walsh <dwalsh@redhat.com> 3.6.7-1.Dan Walsh <dwalsh@redhat.com
- 0a00: > 3.6.6-9.Dan Walsh <dwalsh@redhat.com> 3.6.6-8.Fedora Release E
- 0a40: ngineering <rel-eng@lists.fedoraproject.org> - 3.6.6-7.Dan Walsh
- 0a80: <dwalsh@redhat.com> 3.6.6-6.Dan Walsh <dwalsh@redhat.com> 3.6.6
- 0ac0: -5.Dan Walsh <dwalsh@redhat.com> 3.6.6-4.Dan Walsh <dwalsh@redha
- 0b00: t.com> 3.6.6-3.Dan Walsh <dwalsh@redhat.com> 3.6.6-2.Dan Walsh <
- 0b40: dwalsh@redhat.co
- 13:00:16.796791 <= Recv data, 1448 bytes (0x5a8)
- 0000: m> 3.6.6-1.Dan Walsh <dwalsh@redhat.com> 3.6.5-3.Dan Walsh <dwal
- 0040: sh@redhat.com> 3.6.5-1.Dan Walsh <dwalsh@redhat.com> 3.6.4-6.Dan
- 0080: Walsh <dwalsh@redhat.com> 3.6.4-5.Dan Walsh <dwalsh@redhat.com>
- 00c0: 3.6.4-4.Dan Walsh <dwalsh@redhat.com> 3.6.4-3.Dan Walsh <dwalsh
- 0100: @redhat.com> 3.6.4-2.Dan Walsh <dwalsh@redhat.com> 3.6.4-1.Dan W
- 0140: alsh <dwalsh@redhat.com> 3.6.3-13.Dan Walsh <dwalsh@redhat.com>
- 0180: 3.6.3-12.Dan Walsh <dwalsh@redhat.com> 3.6.3-11.Dan Walsh <dwals
- 01c0: h@redhat.com> 3.6.3-10.Dan Walsh <dwalsh@redhat.com> 3.6.3-9.Dan
- 0200: Walsh <dwalsh@redhat.com> 3.6.3-8.Dan Walsh <dwalsh@redhat.com>
- 0240: 3.6.3-7.Dan Walsh <dwalsh@redhat.com> 3.6.3-6.Dan Walsh <dwalsh
- 0280: @redhat.com> 3.6.3-3.Dan Walsh <dwalsh@redhat.com> 3.6.3-2.Dan W
- 02c0: alsh <dwalsh@redhat.com> 3.6.3-1.Dan Walsh <dwalsh@redhat.com> 3
- 0300: .6.2-5.Dan Walsh <dwalsh@redhat.com> 3.6.2-4.Dan Walsh <dwalsh@r
- 0340: edhat.com> 3.6.2-3.Dan Walsh <dwalsh@redhat.com> 3.6.2-2.Dan Wal
- 0380: sh <dwalsh@redhat.com> 3.6.2-1.Dan Walsh <dwalsh@redhat.com> 3.6
- 03c0: .1-15.Dan Walsh <dwalsh@redhat.com> 3.6.1-14.Dan Walsh <dwalsh@r
- 0400: edhat.com> 3.6.1-13.Dan Walsh <dwalsh@redhat.com> 3.6.1-12.Dan W
- 0440: alsh <dwalsh@redhat.com> 3.6.1-11.Dan Walsh <dwalsh@redhat.com>
- 0480: 3.6.1-10.Dan Walsh <dwalsh@redhat.com> 3.6.1-9.Dan Walsh <dwalsh
- 04c0: @redhat.com> 3.6.1-8.Dan Walsh <dwalsh@redhat.com> 3.6.1-7.Dan W
- 0500: alsh <dwalsh@redhat.com> 3.6.1-4.Ignacio Vazquez-Abrams <ivazque
- 0540: znet+rpm@gmail.com> - 3.6.1-2.Dan Walsh <dwalsh@redhat.com> 3.5.
- 0580: 13-19.Dan Walsh <dwalsh@redhat.com> 3.5.
- 13:00:16.797536 <= Recv data, 4344 bytes (0x10f8)
- 0000: 13-18.Dan Walsh <dwalsh@redhat.com> 3.5.13-17.Dan Walsh <dwalsh@
- 0040: redhat.com> 3.5.13-16.Dan Walsh <dwalsh@redhat.com> 3.5.13-15.Da
- 0080: n Walsh <dwalsh@redhat.com> 3.5.13-14.Dan Walsh <dwalsh@redhat.c
- 00c0: om> 3.5.13-13.Dan Walsh <dwalsh@redhat.com> 3.5.13-12.Dan Walsh
- 0100: <dwalsh@redhat.com> 3.5.13-11.Dan Walsh <dwalsh@redhat.com> 3.5.
- 0140: 13-9.Dan Walsh <dwalsh@redhat.com> 3.5.13-8.Dan Walsh <dwalsh@re
- 0180: dhat.com> 3.5.13-7.Dan Walsh <dwalsh@redhat.com> 3.5.13-6.Dan Wa
- 01c0: lsh <dwalsh@redhat.com> 3.5.13-5.Dan Walsh <dwalsh@redhat.com> 3
- 0200: .5.13-4.Dan Walsh <dwalsh@redhat.com> 3.5.13-3.Dan Walsh <dwalsh
- 0240: @redhat.com> 3.5.13-2.Dan Walsh <dwalsh@redhat.com> 3.5.13-1.Dan
- 0280: Walsh <dwalsh@redhat.com> 3.5.12-3.Dan Walsh <dwalsh@redhat.com
- 02c0: > 3.5.12-2.Dan Walsh <dwalsh@redhat.com> 3.5.12-1.Dan Walsh <dwa
- 0300: lsh@redhat.com> 3.5.11-1.Dan Walsh <dwalsh@redhat.com> 3.5.10-3.
- 0340: Dan Walsh <dwalsh@redhat.com> 3.5.10-2.Dan Walsh <dwalsh@redhat.
- 0380: com> 3.5.10-1.Dan Walsh <dwalsh@redhat.com> 3.5.9-4.Dan Walsh <d
- 03c0: walsh@redhat.com> 3.5.9-3.Dan Walsh <dwalsh@redhat.com> 3.5.9-2.
- 0400: Dan Walsh <dwalsh@redhat.com> 3.5.9-1.Dan Walsh <dwalsh@redhat.c
- 0440: om> 3.5.8-7.Dan Walsh <dwalsh@redhat.com> 3.5.8-6.Dan Walsh <dwa
- 0480: lsh@redhat.com> 3.5.8-5.Dan Walsh <dwalsh@redhat.com> 3.5.8-4.Da
- 04c0: n Walsh <dwalsh@redhat.com> 3.5.8-3.Dan Walsh <dwalsh@redhat.com
- 0500: > 3.5.8-1.Dan Walsh <dwalsh@redhat.com> 3.5.7-2.Dan Walsh <dwals
- 0540: h@redhat.com> 3.5.7-1.Dan Walsh <dwalsh@redhat.com> 3.5.6-2.Dan
- 0580: Walsh <dwalsh@redhat.com> 3.5.6-1.Dan Walsh <dwalsh@redhat.com>
- 05c0: 3.5.5-4.Dan Walsh <dwalsh@redhat.com> 3.5.5-3.Dan Walsh <dwalsh@
- 0600: redhat.com> 3.5.5-2.Dan Walsh <dwalsh@redhat.com> 3.5.4-2.Dan Wa
- 0640: lsh <dwalsh@redhat.com> 3.5.4-1.Dan Walsh <dwalsh@redhat.com> 3.
- 0680: 5.3-1.Dan Walsh <dwalsh@redhat.com> 3.5.2-2.Dan Walsh <dwalsh@re
- 06c0: dhat.com> 3.5.1-5.Dan Walsh <dwalsh@redhat.com> 3.5.1-4.Dan Wals
- 0700: h <dwalsh@redhat.com> 3.5.1-3.Dan Walsh <dwalsh@redhat.com> 3.5.
- 0740: 1-2.Dan Walsh <dwalsh@redhat.com> 3.5.1-1.Dan Walsh <dwalsh@redh
- 0780: at.com> 3.5.0-1.Dan Walsh <dwalsh@redhat.com> 3.4.2-14.Dan Walsh
- 07c0: <dwalsh@redhat.com> 3.4.2-13.Dan Walsh <dwalsh@redhat.com> 3.4.
- 0800: 2-12.Dan Walsh <dwalsh@redhat.com> 3.4.2-11.Dan Walsh <dwalsh@re
- 0840: dhat.com> 3.4.2-10.Dan Walsh <dwalsh@redhat.com> 3.4.2-9.Dan Wal
- 0880: sh <dwalsh@redhat.com> 3.4.2-8.Dan Walsh <dwalsh@redhat.com> 3.4
- 08c0: .2-7.Dan Walsh <dwalsh@redhat.com> 3.4.2-6.Dan Walsh <dwalsh@red
- 0900: hat.com> 3.4.2-5.Dan Walsh <dwalsh@redhat.com> 3.4.2-4.Dan Walsh
- 0940: <dwalsh@redhat.com> 3.4.2-3.Dan Walsh <dwalsh@redhat.com> 3.4.2
- 0980: -2.Dan Walsh <dwalsh@redhat.com> 3.4.2-1.Dan Walsh <dwalsh@redha
- 09c0: t.com> 3.4.1-5.Dan Walsh <dwalsh@redhat.com> 3.4.1-3.Dan Walsh <
- 0a00: dwalsh@redhat.com> 3.4.1-2.Dan Walsh <dwalsh@redhat.com> 3.4.1-1
- 0a40: .Dan Walsh <dwalsh@redhat.com> 3.3.1-48.Dan Walsh <dwalsh@redhat
- 0a80: .com> 3.3.1-47.Dan Walsh <dwalsh@redhat.com> 3.3.1-46.Dan Walsh
- 0ac0: <dwalsh@redhat.com> 3.3.1-45.Dan Walsh <dwalsh@redhat.com> 3.3.1
- 0b00: -44.Dan Walsh <dwalsh@redhat.com> 3.3.1-43.Dan Walsh <dwalsh@red
- 0b40: hat.com> 3.3.1-42.Dan Walsh <dwalsh@redhat.com> 3.3.1-41.Dan Wal
- 0b80: sh <dwalsh@redhat.com> 3.3.1-39.Dan Walsh <dwalsh@redhat.com> 3.
- 0bc0: 3.1-37.Dan Walsh <dwalsh@redhat.com> 3.3.1-36.Dan Walsh <dwalsh@
- 0c00: redhat.com> 3.3.1-33.Dan Walsh <dwalsh@redhat.com> 3.3.1-32.Dan
- 0c40: Walsh <dwalsh@redhat.com> 3.3.1-31.Dan Walsh <dwalsh@redhat.com>
- 0c80: 3.3.1-30.Dan Walsh <dwalsh@redhat.com> 3.3.1-29.Dan Walsh <dwal
- 0cc0: sh@redhat.com> 3.3.1-28.Dan Walsh <dwalsh@redhat.com> 3.3.1-27.D
- 0d00: an Walsh <dwalsh@redhat.com> 3.3.1-26.Dan Walsh <dwalsh@redhat.c
- 0d40: om> 3.3.1-25.Dan Walsh <dwalsh@redhat.com> 3.3.1-24.Dan Walsh <d
- 0d80: walsh@redhat.com> 3.3.1-23.Dan Walsh <dwalsh@redhat.com> 3.3.1-2
- 0dc0: 2.Dan Walsh <dwalsh@redhat.com> 3.3.1-21.Dan Walsh <dwalsh@redha
- 0e00: t.com> 3.3.1-20.Dan Walsh <dwalsh@redhat.com> 3.3.1-19.Dan Walsh
- 0e40: <dwalsh@redhat.com> 3.3.1-18.Dan Walsh <dwalsh@redhat.com> 3.3.
- 0e80: 1-17.Dan Walsh <dwalsh@redhat.com> 3.3.1-16.Dan Walsh <dwalsh@re
- 0ec0: dhat.com> 3.3.1-15.Bill Nottingham <notting@redhat.com> 3.3.1-14
- 0f00: .Dan Walsh <dwalsh@redhat.com> 3.3.1-13.Dan Walsh <dwalsh@redhat
- 0f40: .com> 3.3.1-12.Dan Walsh <dwalsh@redhat.com> 3.3.1-11.Dan Walsh
- 0f80: <dwalsh@redhat.com> 3.3.1-10.Dan Walsh <dwalsh@redhat.com> 3.3.1
- 0fc0: -9.Dan Walsh <dwalsh@redhat.com> 3.3.1-8.Dan Walsh <dwalsh@redha
- 1000: t.com> 3.3.1-6.Dan Walsh <dwalsh@redhat.com> 3.3.1-5.Dan Walsh <
- 1040: dwalsh@redhat.com> 3.3.1-4.Dan Walsh <dwalsh@redhat.com> 3.3.1-2
- 1080: .Dan Walsh <dwalsh@redhat.com> 3.3.1-1.Dan Walsh <dwalsh@redhat.
- 10c0: com> 3.3.0-2.Dan Walsh <dwalsh@redhat.com> 3.3.0-1.Dan W
- 13:00:16.799226 <= Recv data, 10136 bytes (0x2798)
- 0000: alsh <dwalsh@redhat.com> 3.2.9-2.Dan Walsh <dwalsh@redhat.com> 3
- 0040: .2.9-1.Dan Walsh <dwalsh@redhat.com> 3.2.8-2.Dan Walsh <dwalsh@r
- 0080: edhat.com> 3.2.8-1.Dan Walsh <dwalsh@redhat.com> 3.2.7-6.Dan Wal
- 00c0: sh <dwalsh@redhat.com> 3.2.7-5.Dan Walsh <dwalsh@redhat.com> 3.2
- 0100: .7-3.Dan Walsh <dwalsh@redhat.com> 3.2.7-2.Dan Walsh <dwalsh@red
- 0140: hat.com> 3.2.7-1.Dan Walsh <dwalsh@redhat.com> 3.2.6-7.Dan Walsh
- 0180: <dwalsh@redhat.com> 3.2.6-6.Dan Walsh <dwalsh@redhat.com> 3.2.6
- 01c0: -5.Dan Walsh <dwalsh@redhat.com> 3.2.6-4.Dan Walsh <dwalsh@redha
- 0200: t.com> 3.2.6-3.Dan Walsh <dwalsh@redhat.com> 3.2.6-2.Dan Walsh <
- 0240: dwalsh@redhat.com> 3.2.6-1.Dan Walsh <dwalsh@redhat.com> 3.2.5-2
- 0280: 5.Dan Walsh <dwalsh@redhat.com> 3.2.5-24.Dan Walsh <dwalsh@redha
- 02c0: t.com> 3.2.5-22.Dan Walsh <dwalsh@redhat.com> 3.2.5-21.Dan Walsh
- 0300: <dwalsh@redhat.com> 3.2.5-20.Dan Walsh <dwalsh@redhat.com> 3.2.
- 0340: 5-19.Dan Walsh <dwalsh@redhat.com> 3.2.5-18.Dan Walsh <dwalsh@re
- 0380: dhat.com> 3.2.5-17.Dan Walsh <dwalsh@redhat.com> 3.2.5-16.Dan Wa
- 03c0: lsh <dwalsh@redhat.com> 3.2.5-15.Dan Walsh <dwalsh@redhat.com> 3
- 0400: .2.5-14.Dan Walsh <dwalsh@redhat.com> 3.2.5-13.Dan Walsh <dwalsh
- 0440: @redhat.com> 3.2.5-12.Dan Walsh <dwalsh@redhat.com> 3.2.5-11.Dan
- 0480: Walsh <dwalsh@redhat.com> 3.2.5-10.Dan Walsh <dwalsh@redhat.com
- 04c0: > 3.2.5-9.Dan Walsh <dwalsh@redhat.com> 3.2.5-8.Dan Walsh <dwals
- 0500: h@redhat.com> 3.2.5-7.Dan Walsh <dwalsh@redhat.com> 3.2.5-6.Dan
- 0540: Walsh <dwalsh@redhat.com> 3.2.5-5.Dan Walsh <dwalsh@redhat.com>
- 0580: 3.2.5-4.Dan Walsh <dwalsh@redhat.com> 3.2.5-3.Dan Walsh <dwalsh@
- 05c0: redhat.com> 3.2.5-2.Dan Walsh <dwalsh@redhat.com> 3.2.5-1.Dan Wa
- 0600: lsh <dwalsh@redhat.com> 3.2.4-5.Dan Walsh <dwalsh@redhat.com> 3.
- 0640: 2.4-4.Dan Walsh <dwalsh@redhat.com> 3.2.4-3.Dan Walsh <dwalsh@re
- 0680: dhat.com> 3.2.4-1.Dan Walsh <dwalsh@redhat.com> 3.2.4-1.Dan Wals
- 06c0: h <dwalsh@redhat.com> 3.2.3-2.Dan Walsh <dwalsh@redhat.com> 3.2.
- 0700: 3-1.Dan Walsh <dwalsh@redhat.com> 3.2.2-1.Dan Walsh <dwalsh@redh
- 0740: at.com> 3.2.1-3.Dan Walsh <dwalsh@redhat.com> 3.2.1-1.Dan Walsh
- 0780: <dwalsh@redhat.com> 3.1.2-2.Dan Walsh <dwalhh@redhat.com> 3.1.2-
- 07c0: 1.Dan Walsh <dwalsh@redhat.com> 3.1.1-1.Dan Walsh <dwalsh@redhat
- 0800: .com> 3.1.0-1.Dan Walsh <dwalsh@redhat.com> 3.0.8-30.Dan Walsh <
- 0840: dwalsh@redhat.com> 3.0.8-28.Dan Walsh <dwalsh@redhat.com> 3.0.8-
- 0880: 27.Dan Walsh <dwalsh@redhat.com> 3.0.8-26.Dan Walsh <dwalsh@redh
- 08c0: at.com> 3.0.8-25.Dan Walsh <dwalsh@redhat.com> 3.0.8-24.Dan Wals
- 0900: h <dwalsh@redhat.com> 3.0.8-23.Dan Walsh <dwalsh@redhat.com> 3.0
- 0940: .8-22.Dan Walsh <dwalsh@redhat.com> 3.0.8-21.Dan Walsh <dwalsh@r
- 0980: edhat.com> 3.0.8-20.Dan Walsh <dwalsh@redhat.com> 3.0.8-19.Dan W
- 09c0: alsh <dwalsh@redhat.com> 3.0.8-18.Dan Walsh <dwalsh@redhat.com>
- 0a00: 3.0.8-17.Dan Walsh <dwalsh@redhat.com> 3.0.8-16.Dan Walsh <dwals
- 0a40: h@redhat.com> 3.0.8-15.Dan Walsh <dwalsh@redhat.com> 3.0.8-14.Da
- 0a80: n Walsh <dwalsh@redhat.com> 3.0.8-13.Dan Walsh <dwalsh@redhat.co
- 0ac0: m> 3.0.8-12.Dan Walsh <dwalsh@redhat.com> 3.0.8-11.Dan Walsh <dw
- 0b00: alsh@redhat.com> 3.0.8-10.Dan Walsh <dwalsh@redhat.com> 3.0.8-9.
- 0b40: Dan Walsh <dwalsh@redhat.com> 3.0.8-8.Dan Walsh <dwalsh@redhat.c
- 0b80: om> 3.0.8-7.Dan Walsh <dwalsh@redhat.com> 3.0.8-5.Dan Walsh <dwa
- 0bc0: lsh@redhat.com> 3.0.8-4.Dan Walsh <dwalsh@redhat.com> 3.0.8-3.Da
- 0c00: n Walsh <dwalsh@redhat.com> 3.0.8-2.Dan Walsh <dwalsh@redhat.com
- 0c40: > 3.0.8-1.Dan Walsh <dwalsh@redhat.com> 3.0.7-10.Dan Walsh <dwal
- 0c80: sh@redhat.com> 3.0.7-9.Dan Walsh <dwalsh@redhat.com> 3.0.7-8.Dan
- 0cc0: Walsh <dwalsh@redhat.com> 3.0.7-7.Dan Walsh <dwalsh@redhat.com>
- 0d00: 3.0.7-6.Dan Walsh <dwalsh@redhat.com> 3.0.7-5.Dan Walsh <dwalsh
- 0d40: @redhat.com> 3.0.7-4.Dan Walsh <dwalsh@redhat.com> 3.0.7-3.Dan W
- 0d80: alsh <dwalsh@redhat.com> 3.0.7-2.Dan Walsh <dwalsh@redhat.com> 3
- 0dc0: .0.7-1.Dan Walsh <dwalsh@redhat.com> 3.0.6-3.Dan Walsh <dwalsh@r
- 0e00: edhat.com> 3.0.6-2.Dan Walsh <dwalsh@redhat.com> 3.0.6-1.Dan Wal
- 0e40: sh <dwalsh@redhat.com> 3.0.5-11.Dan Walsh <dwalsh@redhat.com> 3.
- 0e80: 0.5-10.Dan Walsh <dwalsh@redhat.com> 3.0.5-9.Dan Walsh <dwalsh@r
- 0ec0: edhat.com> 3.0.5-8.Dan Walsh <dwalsh@redhat.com> 3.0.5-7.Dan Wal
- 0f00: sh <dwalsh@redhat.com> 3.0.5-6.Dan Walsh <dwalsh@redhat.com> 3.0
- 0f40: .5-5.Dan Walsh <dwalsh@redhat.com> 3.0.5-4.Dan Walsh <dwalsh@red
- 0f80: hat.com> 3.0.5-3.Dan Walsh <dwalsh@redhat.com> 3.0.5-2.Dan Walsh
- 0fc0: <dwalsh@redhat.com> 3.0.5-1.Dan Walsh <dwalsh@redhat.com> 3.0.4
- 1000: -6.Dan Walsh <dwalsh@redhat.com> 3.0.4-5.Dan Walsh <dwalsh@redha
- 1040: t.com> 3.0.4-4.Dan Walsh <dwalsh@redhat.com> 3.0.4-3.Dan Walsh <
- 1080: dwalsh@redhat.com> 3.0.4-2.Dan Walsh <dwalsh@redhat.com> 3.0.4-1
- 10c0: .Dan Walsh <dwalsh@redhat.com> 3.0.3-6.Dan Walsh <dwalsh@redhat.
- 1100: com> 3.0.3-5.Dan Walsh <dwalsh@redhat.com> 3.0.3-4.Dan Walsh <dw
- 1140: alsh@redhat.com> 3.0.3-3.Dan Walsh <dwalsh@redhat.com> 3.0.3-2.D
- 1180: an Walsh <dwalsh@redhat.com> 3.0.3-1.Dan Walsh <dwalsh@redhat.co
- 11c0: m> 3.0.2-9.Dan Walsh <dwalsh@redhat.com> 3.0.2-8.Dan Walsh <dwal
- 1200: sh@redhat.com> 3.0.2-7.Dan Walsh <dwalsh@redhat.com> 3.0.2-5.Dan
- 1240: Walsh <dwalsh@redhat.com> 3.0.2-4.Dan Walsh <dwalsh@redhat.com>
- 1280: 3.0.2-3.Dan Walsh <dwalsh@redhat.com> 3.0.2-2.Dan Walsh <dwalsh
- 12c0: @redhat.com> 3.0.1-5.Dan Walsh <dwalsh@redhat.com> 3.0.1-4.Dan W
- 1300: alsh <dwalsh@redhat.com> 3.0.1-3.Dan Walsh <dwalsh@redhat.com> 3
- 1340: .0.1-2.Dan Walsh <dwalsh@redhat.com> 3.0.1-1.Dan Walsh <dwalsh@r
- 1380: edhat.com> 2.6.5-3.Dan Walsh <dwalsh@redhat.com> 2.6.5-2.Dan Wal
- 13c0: sh <dwalsh@redhat.com> 2.6.4-7.Dan Walsh <dwalsh@redhat.com> 2.6
- 1400: .4-6.Dan Walsh <dwalsh@redhat.com> 2.6.4-5.Dan Walsh <dwalsh@red
- 1440: hat.com> 2.6.4-2.Dan Walsh <dwalsh@redhat.com> 2.6.4-1.Dan Walsh
- 1480: <dwalsh@redhat.com> 2.6.3-1.Dan Walsh <dwalsh@redhat.com> 2.6.2
- 14c0: -1.Dan Walsh <dwalsh@redhat.com> 2.6.1-4.Dan Walsh <dwalsh@redha
- 1500: t.com> 2.6.1-2.Dan Walsh <dwalsh@redhat.com> 2.6.1-1.Dan Walsh <
- 1540: dwalsh@redhat.com> 2.5.12-12.Dan Walsh <dwalsh@redhat.com> 2.5.1
- 1580: 2-11.Dan Walsh <dwalsh@redhat.com> 2.5.12-10.Dan Walsh <dwalsh@r
- 15c0: edhat.com> 2.5.12-8.Dan Walsh <dwalsh@redhat.com> 2.5.12-5.Dan W
- 1600: alsh <dwalsh@redhat.com> 2.5.12-4.Dan Walsh <dwalsh@redhat.com>
- 1640: 2.5.12-3.Dan Walsh <dwalsh@redhat.com> 2.5.12-2.Dan Walsh <dwals
- 1680: h@redhat.com> 2.5.12-1.Dan Walsh <dwalsh@redhat.com> 2.5.11-8.Da
- 16c0: n Walsh <dwalsh@redhat.com> 2.5.11-7.Dan Walsh <dwalsh@redhat.co
- 1700: m> 2.5.11-6.Dan Walsh <dwalsh@redhat.com> 2.5.11-5.Dan Walsh <dw
- 1740: alsh@redhat.com> 2.5.11-4.Dan Walsh <dwalsh@redhat.com> 2.5.11-3
- 1780: .Dan Walsh <dwalsh@redhat.com> 2.5.11-2.Dan Walsh <dwalsh@redhat
- 17c0: .com> 2.5.11-1.Dan Walsh <dwalsh@redhat.com> 2.5.10-2.Dan Walsh
- 1800: <dwalsh@redhat.com> 2.5.10-1.Dan Walsh <dwalsh@redhat.com> 2.5.9
- 1840: -6.Dan Walsh <dwalsh@redhat.com> 2.5.9-5.Dan Walsh <dwalsh@redha
- 1880: t.com> 2.5.9-4.Dan Walsh <dwalsh@redhat.com> 2.5.9-3.Dan Walsh <
- 18c0: dwalsh@redhat.com> 2.5.9-2.Dan Walsh <dwalsh@redhat.com> 2.5.8-8
- 1900: .Dan Walsh <dwalsh@redhat.com> 2.5.8-7.Dan Walsh <dwalsh@redhat.
- 1940: com> 2.5.8-6.Dan Walsh <dwalsh@redhat.com> 2.5.8-5.Dan Walsh <dw
- 1980: alsh@redhat.com> 2.5.8-4.Dan Walsh <dwalsh@redhat.com> 2.5.8-3.D
- 19c0: an Walsh <dwalsh@redhat.com> 2.5.8-2.Dan Walsh <dwalsh@redhat.co
- 1a00: m> 2.5.8-1.Dan Walsh <dwalsh@redhat.com> 2.5.7-1.Dan Walsh <dwal
- 1a40: sh@redhat.com> 2.5.6-1.Dan Walsh <dwalsh@redhat.com> 2.5.5-2.Dan
- 1a80: Walsh <dwalsh@redhat.com> 2.5.5-1.Dan Walsh <dwalsh@redhat.com>
- 1ac0: 2.5.4-2.Dan Walsh <dwalsh@redhat.com> 2.5.4-1.Dan Walsh <dwalsh
- 1b00: @redhat.com> 2.5.3-3.Dan Walsh <dwalsh@redhat.com> 2.5.3-2.Dan W
- 1b40: alsh <dwalsh@redhat.com> 2.5.3-1.Dan Walsh <dwalsh@redhat.com> 2
- 1b80: .5.2-6.Dan Walsh <dwalsh@redhat.com> 2.5.2-5.Dan Walsh <dwalsh@r
- 1bc0: edhat.com> 2.5.2-4.Dan Walsh <dwalsh@redhat.com> 2.5.2-3.Dan Wal
- 1c00: sh <dwalsh@redhat.com> 2.5.2-2.Dan Walsh <dwalsh@redhat.com> 2.5
- 1c40: .2-1.Dan Walsh <dwalsh@redhat.com> 2.5.1-5.Dan Walsh <dwalsh@red
- 1c80: hat.com> 2.5.1-4.Dan Walsh <dwalsh@redhat.com> 2.5.1-2.Dan Walsh
- 1cc0: <dwalsh@redhat.com> 2.5.1-1.Dan Walsh <dwalsh@redhat.com> 2.4.6
- 1d00: -20.Dan Walsh <dwalsh@redhat.com> 2.4.6-19.Dan Walsh <dwalsh@red
- 1d40: hat.com> 2.4.6-18.Dan Walsh <dwalsh@redhat.com> 2.4.6-17.Dan Wal
- 1d80: sh <dwalsh@redhat.com> 2.4.6-16.Dan Walsh <dwalsh@redhat.com> 2.
- 1dc0: 4.6-15.Dan Walsh <dwalsh@redhat.com> 2.4.6-14.Dan Walsh <dwalsh@
- 1e00: redhat.com> 2.4.6-13.Dan Walsh <dwalsh@redhat.com> 2.4.6-12.Dan
- 1e40: Walsh <dwalsh@redhat.com> 2.4.6-11.Dan Walsh <dwalsh@redhat.com>
- 1e80: 2.4.6-10.Dan Walsh <dwalsh@redhat.com> 2.4.6-9.Dan Walsh <dwals
- 1ec0: h@redhat.com> 2.4.6-8.Dan Walsh <dwalsh@redhat.com> 2.4.6-7.Dan
- 1f00: Walsh <dwalsh@redhat.com> 2.4.6-6.Dan Walsh <dwalsh@redhat.com>
- 1f40: 2.4.6-5.Dan Walsh <dwalsh@redhat.com> 2.4.6-4.Dan Walsh <dwalsh@
- 1f80: redhat.com> 2.4.6-3.Dan Walsh <dwalsh@redhat.com> 2.4.6-1.Dan Wa
- 1fc0: lsh <dwalsh@redhat.com> 2.4.5-4.Dan Walsh <dwalsh@redhat.com> 2.
- 2000: 4.5-3.Dan Walsh <dwalsh@redhat.com> 2.4.5-2.Dan Walsh <dwalsh@re
- 2040: dhat.com> 2.4.5-1.Dan Walsh <dwalsh@redhat.com> 2.4.4-2.Dan Wals
- 2080: h <dwalsh@redhat.com> 2.4.4-2.Dan Walsh <dwalsh@redhat.com> 2.4.
- 20c0: 4-1.Dan Walsh <dwalsh@redhat.com> 2.4.3-13.Dan Walsh <dwalsh@red
- 2100: hat.com> 2.4.3-12.Dan Walsh <dwalsh@redhat.com> 2.4.3-11.Dan Wal
- 2140: sh <dwalsh@redhat.com> 2.4.3-10.Dan Walsh <dwalsh@redhat.com> 2.
- 2180: 4.3-9.Dan Walsh <dwalsh@redhat.com> 2.4.3-8.Dan Walsh <dwalsh@re
- 21c0: dhat.com> 2.4.3-7.Dan Walsh <dwalsh@redhat.com> 2.4.3-6.Dan Wals
- 2200: h <dwalsh@redhat.com> 2.4.3-5.Dan Walsh <dwalsh@redhat.com> 2.4.
- 2240: 3-4.Dan Walsh <dwalsh@redhat.com> 2.4.3-3.Dan Walsh <dwalsh@redh
- 2280: at.com> 2.4.3-2.Dan Walsh <dwalsh@redhat.com> 2.4.3-1.Dan Walsh
- 22c0: <dwalsh@redhat.com> 2.4.2-8.Dan Walsh <dwalsh@redhat.com> 2.4.2-
- 2300: 7.James Antill <james.antill@redhat.com> 2.4.2-6.Dan Walsh <dwal
- 2340: sh@redhat.com> 2.4.2-5.Dan Walsh <dwalsh@redhat.com> 2.4.2-4.Dan
- 2380: Walsh <dwalsh@redhat.com> 2.4.2-3.Dan Walsh <dwalsh@redhat.com>
- 23c0: 2.4.2-2.Dan Walsh <dwalsh@redhat.com> 2.4.2-1.Dan Walsh <dwalsh
- 2400: @redhat.com> 2.4.1-5.Dan Walsh <dwalsh@redhat.com> 2.4.1-4.Dan W
- 2440: alsh <dwalsh@redhat.com> 2.4.1-3.Dan Walsh <dwalsh@redhat.com> 2
- 2480: .4.1-2.Dan Walsh <dwalsh@redhat.com> 2.4-4.Dan Walsh <dwalsh@red
- 24c0: hat.com> 2.4-3.Dan Walsh <dwalsh@redhat.com> 2.4-2.Dan Walsh <dw
- 2500: alsh@redhat.com> 2.4-1.Dan Walsh <dwalsh@redhat.com> 2.3.19-4.Da
- 2540: n Walsh <dwalsh@redhat.com> 2.3.19-3.Dan Walsh <dwalsh@redhat.co
- 2580: m> 2.3.19-2.Dan Walsh <dwalsh@redhat.com> 2.3.19-1.James Antill
- 25c0: <jantill@redhat.com> 2.3.18-10.James Antill <jantill@redhat.com>
- 2600: 2.3.18-9.Dan Walsh <dwalsh@redhat.com> 2.3.18-8.Dan Walsh <dwal
- 2640: sh@redhat.com> 2.3.18-7.Dan Walsh <dwalsh@redhat.com> 2.3.18-6.D
- 2680: an Walsh <dwalsh@redhat.com> 2.3.18-5.Dan Walsh <dwalsh@redhat.c
- 26c0: om> 2.3.18-4.Dan Walsh <dwalsh@redhat.com> 2.3.18-3.Dan Walsh <d
- 2700: walsh@redhat.com> 2.3.18-2.Dan Walsh <dwalsh@redhat.com> 2.3.18-
- 2740: 1.Dan Walsh <dwalsh@redhat.com> 2.3.17-2.Dan Walsh <dwalsh@redha
- 2780: t.com> 2.3.17-1.Dan Wals
- 13:00:16.803990 <= Recv data, 16384 bytes (0x4000)
- 0000: h <dwalsh@redhat.com> 2.3.16-9.Dan Walsh <dwalsh@redhat.com> 2.3
- 0040: .16-8.Dan Walsh <dwalsh@redhat.com> 2.3.16-7.Dan Walsh <dwalsh@r
- 0080: edhat.com> 2.3.16-6.Dan Walsh <dwalsh@redhat.com> 2.3.16-5.Dan W
- 00c0: alsh <dwalsh@redhat.com> 2.3.16-4.Dan Walsh <dwalsh@redhat.com>
- 0100: 2.3.16-2.Dan Walsh <dwalsh@redhat.com> 2.3.16-1.Dan Walsh <dwals
- 0140: h@redhat.com> 2.3.15-2.Dan Walsh <dwalsh@redhat.com> 2.3.15-1.Da
- 0180: n Walsh <dwalsh@redhat.com> 2.3.14-8.Dan Walsh <dwalsh@redhat.co
- 01c0: m> 2.3.14-7.Dan Walsh <dwalsh@redhat.com> 2.3.14-6.Dan Walsh <dw
- 0200: alsh@redhat.com> 2.3.14-4.Dan Walsh <dwalsh@redhat.com> 2.3.14-3
- 0240: .Dan Walsh <dwalsh@redhat.com> 2.3.14-2.Dan Walsh <dwalsh@redhat
- 0280: .com> 2.3.14-1.Dan Walsh <dwalsh@redhat.com> 2.3.13-6.Dan Walsh
- 02c0: <dwalsh@redhat.com> 2.3.13-5.Dan Walsh <dwalsh@redhat.com> 2.3.1
- 0300: 3-4.Dan Walsh <dwalsh@redhat.com> 2.3.13-3.Dan Walsh <dwalsh@red
- 0340: hat.com> 2.3.13-2.Dan Walsh <dwalsh@redhat.com> 2.3.13-1.Dan Wal
- 0380: sh <dwalsh@redhat.com> 2.3.12-2.Dan Walsh <dwalsh@redhat.com> 2.
- 03c0: 3.12-1.Dan Walsh <dwalsh@redhat.com> 2.3.11-1.Dan Walsh <dwalsh@
- 0400: redhat.com> 2.3.10-7.Dan Walsh <dwalsh@redhat.com> 2.3.10-6.Dan
- 0440: Walsh <dwalsh@redhat.com> 2.3.10-3.Dan Walsh <dwalsh@redhat.com>
- 0480: 2.3.10-1.Dan Walsh <dwalsh@redhat.com> 2.3.9-6.Dan Walsh <dwals
- 04c0: h@redhat.com> 2.3.9-5.Dan Walsh <dwalsh@redhat.com> 2.3.9-4.Dan
- 0500: Walsh <dwalsh@redhat.com> 2.3.9-3.Dan Walsh <dwalsh@redhat.com>
- 0540: 2.3.9-2.Dan Walsh <dwalsh@redhat.com> 2.3.9-1.Dan Walsh <dwalsh@
- 0580: redhat.com> 2.3.8-2.Dan Walsh <dwalsh@redhat.com> 2.3.7-1.Dan Wa
- 05c0: lsh <dwalsh@redhat.com> 2.3.6-4.Dan Walsh <dwalsh@redhat.com> 2.
- 0600: 3.6-3.Dan Walsh <dwalsh@redhat.com> 2.3.6-2.Dan Walsh <dwalsh@re
- 0640: dhat.com> 2.3.6-1.Dan Walsh <dwalsh@redhat.com> 2.3.5-1.Dan Wals
- 0680: h <dwalsh@redhat.com> 2.3.4-1.Dan Walsh <dwalsh@redhat.com> 2.3.
- 06c0: 3-20.Dan Walsh <dwalsh@redhat.com> 2.3.3-19.Dan Walsh <dwalsh@re
- 0700: dhat.com> 2.3.3-18.Dan Walsh <dwalsh@redhat.com> 2.3.3-17.Dan Wa
- 0740: lsh <dwalsh@redhat.com> 2.3.3-16.Dan Walsh <dwalsh@redhat.com> 2
- 0780: .3.3-15.Dan Walsh <dwalsh@redhat.com> 2.3.3-14.Dan Walsh <dwalsh
- 07c0: @redhat.com> 2.3.3-13.Dan Walsh <dwalsh@redhat.com> 2.3.3-12.Dan
- 0800: Walsh <dwalsh@redhat.com> 2.3.3-11.Dan Walsh <dwalsh@redhat.com
- 0840: > 2.3.3-10.Dan Walsh <dwalsh@redhat.com> 2.3.3-9.Dan Walsh <dwal
- 0880: sh@redhat.com> 2.3.3-8.Dan Walsh <dwalsh@redhat.com> 2.3.3-7.Dan
- 08c0: Walsh <dwalsh@redhat.com> 2.3.3-6.Dan Walsh <dwalsh@redhat.com>
- 0900: 2.3.3-5.Dan Walsh <dwalsh@redhat.com> 2.3.3-4.Dan Walsh <dwalsh
- 0940: @redhat.com> 2.3.3-3.Dan Walsh <dwalsh@redhat.com> 2.3.3-2.Dan W
- 0980: alsh <dwalsh@redhat.com> 2.3.3-1.Dan Walsh <dwalsh@redhat.com> 2
- 09c0: .3.2-4.Dan Walsh <dwalsh@redhat.com> 2.3.2-3.Dan Walsh <dwalsh@r
- 0a00: edhat.com> 2.3.2-2.Dan Walsh <dwalsh@redhat.com> 2.3.2-1.Dan Wal
- 0a40: sh <dwalsh@redhat.com> 2.3.1-1.Dan Walsh <dwalsh@redhat.com> 2.2
- 0a80: .49-1.Dan Walsh <dwalsh@redhat.com> 2.2.48-1.Dan Walsh <dwalsh@r
- 0ac0: edhat.com> 2.2.47-5.Dan Walsh <dwalsh@redhat.com> 2.2.47-4.Dan W
- 0b00: alsh <dwalsh@redhat.com> 2.2.47-3.Dan Walsh <dwalsh@redhat.com>
- 0b40: 2.2.47-1.Dan Walsh <dwalsh@redhat.com> 2.2.46-2.Dan Walsh <dwals
- 0b80: h@redhat.com> 2.2.46-1.Dan Walsh <dwalsh@redhat.com> 2.2.45-3.Da
- 0bc0: n Walsh <dwalsh@redhat.com> 2.2.45-2.Dan Walsh <dwalsh@redhat.co
- 0c00: m> 2.2.45-1.Dan Walsh <dwalsh@redhat.com> 2.2.44-1.Dan Walsh <dw
- 0c40: alsh@redhat.com> 2.2.43-4.Dan Walsh <dwalsh@redhat.com> 2.2.43-3
- 0c80: .Dan Walsh <dwalsh@redhat.com> 2.2.43-2.Dan Walsh <dwalsh@redhat
- 0cc0: .com> 2.2.43-1.Dan Walsh <dwalsh@redhat.com> 2.2.42-4.Dan Walsh
- 0d00: <dwalsh@redhat.com> 2.2.42-3.Dan Walsh <dwalsh@redhat.com> 2.2.4
- 0d40: 2-2.Dan Walsh <dwalsh@redhat.com> 2.2.42-1.Dan Walsh <dwalsh@red
- 0d80: hat.com> 2.2.41-1.Dan Walsh <dwalsh@redhat.com> 2.2.40-2.Dan Wal
- 0dc0: sh <dwalsh@redhat.com> 2.2.40-1.Dan Walsh <dwalsh@redhat.com> 2.
- 0e00: 2.39-2.Dan Walsh <dwalsh@redhat.com> 2.2.39-1.Dan Walsh <dwalsh@
- 0e40: redhat.com> 2.2.38-6.Dan Walsh <dwalsh@redhat.com> 2.2.38-5.Dan
- 0e80: Walsh <dwalsh@redhat.com> 2.2.38-4.Dan Walsh <dwalsh@redhat.com>
- 0ec0: 2.2.38-3.Dan Walsh <dwalsh@redhat.com> 2.2.38-2.Dan Walsh <dwal
- 0f00: sh@redhat.com> 2.2.38-1.Dan Walsh <dwalsh@redhat.com> 2.2.37-1.D
- 0f40: an Walsh <dwalsh@redhat.com> 2.2.36-2.Dan Walsh <dwalsh@redhat.c
- 0f80: om> 2.2.36-1.James Antill <jantill@redhat.com> 2.2.35-2.Dan Wals
- 0fc0: h <dwalsh@redhat.com> 2.2.35-1.Dan Walsh <dwalsh@redhat.com> 2.2
- 1000: .34-3.Dan Walsh <dwalsh@redhat.com> 2.2.34-2.Dan Walsh <dwalsh@r
- 1040: edhat.com> 2.2.34-1.Dan Walsh <dwalsh@redhat.com> 2.2.33-1.Dan W
- 1080: alsh <dwalsh@redhat.com> 2.2.32-2.Dan Walsh <dwalsh@redhat.com>
- 10c0: 2.2.32-1.Dan Walsh <dwalsh@redhat.com> 2.2.31-1.Dan Walsh <dwals
- 1100: h@redhat.com> 2.2.30-2.Dan Walsh <dwalsh@redhat.com> 2.2.30-1.Da
- 1140: n Walsh <dwalsh@redhat.com> 2.2.29-6.Russell Coker <rcoker@redha
- 1180: t.com> 2.2.29-5.Dan Walsh <dwalsh@redhat.com> 2.2.29-4.Dan Walsh
- 11c0: <dwalsh@redhat.com> 2.2.29-3.Dan Walsh <dwalsh@redhat.com> 2.2.
- 1200: 29-2.Dan Walsh <dwalsh@redhat.com> 2.2.29-1.Dan Walsh <dwalsh@re
- 1240: dhat.com> 2.2.28-3.Dan Walsh <dwalsh@redhat.com> 2.2.28-2.Dan Wa
- 1280: lsh <dwalsh@redhat.com> 2.2.28-1.Dan Walsh <dwalsh@redhat.com> 2
- 12c0: .2.27-1.Dan Walsh <dwalsh@redhat.com> 2.2.25-3.Dan Walsh <dwalsh
- 1300: @redhat.com> 2.2.25-2.Dan Walsh <dwalsh@redhat.com> 2.2.24-1.Dan
- 1340: Walsh <dwalsh@redhat.com> 2.2.23-19.Dan Walsh <dwalsh@redhat.co
- 1380: m> 2.2.23-18.Dan Walsh <dwalsh@redhat.com> 2.2.23-17.Karsten Hop
- 13c0: p <karsten@redhat.de> 2.2.23-16.Dan Walsh <dwalsh@redhat.com> 2.
- 1400: 2.23-15.Dan Walsh <dwalsh@redhat.com> 2.2.23-14.Dan Walsh <dwals
- 1440: h@redhat.com> 2.2.23-13.Dan Walsh <dwalsh@redhat.com> 2.2.23-12.
- 1480: Jeremy Katz <katzj@redhat.com> - 2.2.23-11.Jeremy Katz <katzj@re
- 14c0: dhat.com> - 2.2.23-10.Dan Walsh <dwalsh@redhat.com> 2.2.23-9.Dan
- 1500: Walsh <dwalsh@redhat.com> 2.2.23-8.Dan Walsh <dwalsh@redhat.com
- 1540: > 2.2.23-7.Dan Walsh <dwalsh@redhat.com> 2.2.23-5.Dan Walsh <dwa
- 1580: lsh@redhat.com> 2.2.23-4.Dan Walsh <dwalsh@redhat.com> 2.2.23-3.
- 15c0: Dan Walsh <dwalsh@redhat.com> 2.2.23-2.Dan Walsh <dwalsh@redhat.
- 1600: com> 2.2.23-1.Dan Walsh <dwalsh@redhat.com> 2.2.22-2.Dan Walsh <
- 1640: dwalsh@redhat.com> 2.2.22-1.Dan Walsh <dwalsh@redhat.com> 2.2.21
- 1680: -9.Dan Walsh <dwalsh@redhat.com> 2.2.21-8.Dan Walsh <dwalsh@redh
- 16c0: at.com> 2.2.21-7.Dan Walsh <dwalsh@redhat.com> 2.2.21-6.Dan Wals
- 1700: h <dwalsh@redhat.com> 2.2.21-5.Dan Walsh <dwalsh@redhat.com> 2.2
- 1740: .21-4.Dan Walsh <dwalsh@redhat.com> 2.2.21-3.Dan Walsh <dwalsh@r
- 1780: edhat.com> 2.2.21-2.Dan Walsh <dwalsh@redhat.com> 2.2.21-1.Dan W
- 17c0: alsh <dwalsh@redhat.com> 2.2.20-1.Dan Walsh <dwalsh@redhat.com>
- 1800: 2.2.19-2.Dan Walsh <dwalsh@redhat.com> 2.2.19-1.Dan Walsh <dwals
- 1840: h@redhat.com> 2.2.18-2.Dan Walsh <dwalsh@redhat.com> 2.2.18-1.Da
- 1880: n Walsh <dwalsh@redhat.com> 2.2.17-2.Dan Walsh <dwalsh@redhat.co
- 18c0: m> 2.2.16-1.Dan Walsh <dwalsh@redhat.com> 2.2.15-4.Dan Walsh <dw
- 1900: alsh@redhat.com> 2.2.15-3.Dan Walsh <dwalsh@redhat.com> 2.2.15-1
- 1940: .Dan Walsh <dwalsh@redhat.com> 2.2.14-2.Dan Walsh <dwalsh@redhat
- 1980: .com> 2.2.14-1.Dan Walsh <dwalsh@redhat.com> 2.2.13-1.Dan Walsh
- 19c0: <dwalsh@redhat.com> 2.2.12-1.Dan Walsh <dwalsh@redhat.com> 2.2.1
- 1a00: 1-2.Dan Walsh <dwalsh@redhat.com> 2.2.11-1.Dan Walsh <dwalsh@red
- 1a40: hat.com> 2.2.10-1.Dan Walsh <dwalsh@redhat.com> 2.2.9-2.Dan Wals
- 1a80: h <dwalsh@redhat.com> 2.2.9-1.Dan Walsh <dwalsh@redhat.com> 2.2.
- 1ac0: 8-2.Dan Walsh <dwalsh@redhat.com> 2.2.7-1.Dan Walsh <dwalsh@redh
- 1b00: at.com> 2.2.6-3.Dan Walsh <dwalsh@redhat.com> 2.2.6-2.Dan Walsh
- 1b40: <dwalsh@redhat.com> 2.2.6-1.Dan Walsh <dwalsh@redhat.com> 2.2.5-
- 1b80: 1.Dan Walsh <dwalsh@redhat.com> 2.2.4-1.Dan Walsh <dwalsh@redhat
- 1bc0: .com> 2.2.3-1.Dan Walsh <dwalsh@redhat.com> 2.2.2-1.Dan Walsh <d
- 1c00: walsh@redhat.com> 2.2.1-1.Dan Walsh <dwalsh@redhat.com> 2.1.13-1
- 1c40: .Dan Walsh <dwalsh@redhat.com> 2.1.12-3.Dan Walsh <dwalsh@redhat
- 1c80: .com> 2.1.11-1.Dan Walsh <dwalsh@redhat.com> 2.1.10-1.Jeremy Kat
- 1cc0: z <katzj@redhat.com> - 2.1.9-2.Dan Walsh <dwalsh@redhat.com> 2.1
- 1d00: .9-1.Dan Walsh <dwalsh@redhat.com> 2.1.8-3.Dan Walsh <dwalsh@red
- 1d40: hat.com> 2.1.8-2.Dan Walsh <dwalsh@redhat.com> 2.1.8-1.Dan Walsh
- 1d80: <dwalsh@redhat.com> 2.1.7-4.Dan Walsh <dwalsh@redhat.com> 2.1.7
- 1dc0: -3.Dan Walsh <dwalsh@redhat.com> 2.1.7-2.Dan Walsh <dwalsh@redha
- 1e00: t.com> 2.1.7-1.Dan Walsh <dwalsh@redhat.com> 2.1.6-24.Dan Walsh
- 1e40: <dwalsh@redhat.com> 2.1.6-23.Dan Walsh <dwalsh@redhat.com> 2.1.6
- 1e80: -22.Dan Walsh <dwalsh@redhat.com> 2.1.6-21.Dan Walsh <dwalsh@red
- 1ec0: hat.com> 2.1.6-20.Dan Walsh <dwalsh@redhat.com> 2.1.6-18.Dan Wal
- 1f00: sh <dwalsh@redhat.com> 2.1.6-17.Dan Walsh <dwalsh@redhat.com> 2.
- 1f40: 1.6-16.Dan Walsh <dwalsh@redhat.com> 2.1.6-15.Dan Walsh <dwalsh@
- 1f80: redhat.com> 2.1.6-14.Dan Walsh <dwalsh@redhat.com> 2.1.6-13.Dan
- 1fc0: Walsh <dwalsh@redhat.com> 2.1.6-11.Dan Walsh <dwalsh@redhat.com>
- 2000: 2.1.6-10.Dan Walsh <dwalsh@redhat.com> 2.1.6-9.Dan Walsh <dwals
- 2040: h@redhat.com> 2.1.6-8.Dan Walsh <dwalsh@redhat.com> 2.1.6-5.Dan
- 2080: Walsh <dwalsh@redhat.com> 2.1.6-4.Dan Walsh <dwalsh@redhat.com>
- 20c0: 2.1.6-3.Dan Walsh <dwalsh@redhat.com> 2.1.6-2.Dan Walsh <dwalsh@
- 2100: redhat.com> 2.1.6-1.Dan Walsh <dwalsh@redhat.com> 2.1.4-2.Dan Wa
- 2140: lsh <dwalsh@redhat.com> 2.1.4-1.Dan Walsh <dwalsh@redhat.com> 2.
- 2180: 1.3-1.Jeremy Katz <katzj@redhat.com> - 2.1.2-3.Dan Walsh <dwalsh
- 21c0: @redhat.com> 2.1.2-2.Dan Walsh <dwalsh@redhat.com> 2.1.2-1.Dan W
- 2200: alsh <dwalsh@redhat.com> 2.1.1-3.Dan Walsh <dwalsh@redhat.com> 2
- 2240: .1.1-2.Dan Walsh <dwalsh@redhat.com> 2.1.1-1.Dan Walsh <dwalsh@r
- 2280: edhat.com> 2.1.0-3.Dan Walsh <dwalsh@redhat.com> 2.1.0-2..Dan Wa
- 22c0: lsh <dwalsh@redhat.com> 2.1.0-1..Dan Walsh <dwalsh@redhat.com> 2
- 2300: .0.11-2..Dan Walsh <dwalsh@redhat.com> 2.0.11-1..Dan Walsh <dwal
- 2340: sh@redhat.com> 2.0.9-1..Dan Walsh <dwalsh@redhat.com> 2.0.8-1..D
- 2380: an Walsh <dwalsh@redhat.com> 2.0.7-3.Dan Walsh <dwalsh@redhat.co
- 23c0: m> 2.0.7-2.Dan Walsh <dwalsh@redhat.com> 2.0.6-2.Dan Walsh <dwal
- 2400: sh@redhat.com> 2.0.5-4.Dan Walsh <dwalsh@redhat.com> 2.0.5-1.Dan
- 2440: Walsh <dwalsh@redhat.com> 2.0.4-1.Dan Walsh <dwalsh@redhat.com>
- 2480: 2.0.2-2.Dan Walsh <dwalsh@redhat.com> 2.0.2-1.Dan Walsh <dwalsh
- 24c0: @redhat.com> 2.0.1-2.Dan Walsh <dwalsh@redhat.com> 2.0.1-1.- All
- 2500: ow systemd container to read/write usermodehelperstate.Resolves:
- 2540: rhbz#1408126.- Allow glusterd_t to bind on glusterd_port_t udp
- 2580: ports..Resolves: rhbz#1408128.- Allow glusterd_t to bind on glus
- 25c0: terd_port_t udp ports..Resolves: rhbz#1408128.- Allow glusterd_t
- 2600: send signals to userdomain. Label new glusterd binaries as glus
- 2640: terd_exec_t.Resolves: rhbz#1408128.- Fixes for containers.- Allo
- 2680: w containers to attempt to write to unix_sysctls..- Allow cotain
- 26c0: ers to use the FD's leaked to them from parent processes..Resolv
- 2700: es: rhbz#1408126.- Allow systemd to stop glusterd_t domains..Res
- 2740: olves: rhbz#1408125.- Update ctdbd_t policy to reflect all chang
- 2780: es..Resolves: rhbz#1403266.- Allow ctdbd_t domain transition to
- 27c0: rpcd_t.Resolves:rhbz#1403266.- Make working CTDB:NFS: CTDB failo
- 2800: ver from selinux-policy POV.Resolves: rhbz#1403266.- Allow puppe
- 2840: tagent_t to access timedated dbus. Use the systemd_dbus_chat_tim
- 2880: edated interface to allow puppetagent_t the access..Resolves: rh
- 28c0: bz#1400505.- Update systemd on RHEL-7.2 box to version from RHEL
- 2900: -7.3 and then as a separate yum command update the selinux polic
- 2940: y systemd will start generating USER_AVC denials and will start
- 2980: returning "Access Denied" errors to DBus clients..Resolves: rhbz
- 29c0: #1394715.- Allow cluster_t communicate to fprintd_t via dbus.Res
- 2a00: olves: rhbz#1349798.- Fix error message during update from RHEL-
- 2a40: 7.2 to RHEL-7.3, when /usr/sbin/semanage command is not installe
- 2a80: d and selinux-policy-migrate-local-changes.sh script is executed
- 2ac0: in %post install phase of selinux-policy package.Resolves: rhbz
- 2b00: #1393045.- Allow GlusterFS with RDMA transport to be started cor
- 2b40: rectly. It requires ipc_lock capability together with rw permiss
- 2b80: ion on rdma_cm device..Resolves:#1386620.- Allow glusterd to get
- 2bc0: attributes on /sys/kernel/config directory..Resolves:#1386621.-
- 2c00: Use selinux-policy-migrate-local-changes.sh instead of migrateS
- 2c40: tore* macros.Resolves: rhbz#1383450.- Add selinux-policy-migrate
- 2c80: -local-changes service.Resolves: rhbz#1383450.- Allow sssd_selin
- 2cc0: ux_manager_t to manage also dir class..Resolves: rhbz#1380687.-
- 2d00: Add interface seutil_manage_default_contexts_dirs().Resolves: rh
- 2d40: bz#1380687.- Add virt_sandbox_use_nfs -> virt_use_nfs boolean su
- 2d80: bstitution..Resolves: rhbz#1355783.- Allow pcp_pmcd_t domain tra
- 2dc0: nsition to lvm_t Add capability kill and sys_ptrace to pcp_pmlog
- 2e00: ger_t.Resolves: rhbz#1309883.- Allow ftp daemon to manage apache
- 2e40: _user_content.Resolves: rhbz#1097775.- Label /etc/sysconfig/orac
- 2e80: leasm as oracleasm_conf_t.Resolves: rhbz#1331383.- Allow oraclea
- 2ec0: sm to rw inherited fixed disk device.Resolves: rhbz#1331383.- Al
- 2f00: low collectd to connect on unix_stream_socket.Resolves: rhbz#137
- 2f40: 7259.- Allow iscsid create netlink iscsid sockets..Resolves: rhb
- 2f80: z#1358266.- Improve regexp for power_unit_file_t files. To catch
- 2fc0: just systemd power unit files..Resolves: rhbz#1375462.- Update
- 3000: oracleasm SELinux module that can manage oracleasmfs_t blk files
- 3040: . Add dac_override cap to oracleasm_t domain..Resolves: rhbz#133
- 3080: 1383.- Add few rules to pcp SELinux module to make ti able to st
- 30c0: art pcp_pmlogger service.Resolves: rhbz#1206525.- Add oracleasm_
- 3100: conf_t type and allow oracleasm_t to create /dev/oracleasm.Resol
- 3140: ves: rhbz#1331383.- Label /usr/share/pcp/lib/pmie as pmie_exec_t
- 3180: and /usr/share/pcp/lib/pmlogger as pmlogger_exec_t.Resolves: rh
- 31c0: bz#1206525.- Allow mdadm_t to getattr all device nodes.Resolves:
- 3200: rhbz#1365171.- Add interface dbus_dontaudit_stream_connect_syst
- 3240: em_dbusd().Resolves:rhbz#1052880.- Add virt_stub_* interfaces fo
- 3280: r docker policy which is no longer a part of our base policy..Re
- 32c0: solves: rhbz#1372705.- Allow guest-set-user-passwd to set users
- 3300: password..Resolves: rhbz#1369693.- Allow samdbox domains to use
- 3340: msg class.Resolves: rhbz#1372677.- Allow domains using kerberos
- 3380: to read also kerberos config dirs.Resolves: rhbz#1368492.- Allow
- 33c0: svirt_sandbox_domains to r/w onload sockets.Resolves: rhbz#1342
- 3400: 930.- Add interface fs_manage_oracleasm().Resolves: rhbz#1331383
- 3440: .- Label /dev/kfd as hsa_device_t.Resolves: rhbz#1373488.- Updat
- 3480: e seutil_manage_file_contexts() interface that caller domain can
- 34c0: also manage file_context_t dirs.Resolves: rhbz#1368097.- Add in
- 3500: terface to write to nsfs inodes.Resolves: rhbz#1372705.- Allow s
- 3540: ystemd services to use PrivateNetwork feature.Resolves: rhbz#137
- 3580: 2705.- Add a type and genfscon for nsfs..Resolves: rhbz#1372705.
- 35c0: - Allow run sulogin_t in range mls_systemlow-mls_systemhigh..Res
- 3600: olves: rhbz#1290400.- Allow arpwatch to create netlink netfilter
- 3640: sockets. Resolves: rhbz#1358261.- Fix file context for /etc/pki
- 3680: /pki-tomcat/ca/.- new interface oddjob_mkhomedir_entrypoint().-
- 36c0: Move label for /var/lib/docker/vfs/ to proper SELinux module.- A
- 3700: llow mdadm to get attributes from all devices..- Label /etc/pupp
- 3740: etlabs as puppet_etc_t..- Allow systemd-machined to communicate
- 3780: to lxc container using dbus.- Allow systemd_resolved to send dbu
- 37c0: s msgs to userdomains Resolves: rhbz#1236579.- Allow systemd-res
- 3800: olved to read network sysctls Resolves: rhbz#1236579.- Allow sys
- 3840: temd_resolved to connect on system bus. Resolves: rhbz#1236579.-
- 3880: Make entrypoint oddjob_mkhomedir_exec_t for unconfined_t.- Labe
- 38c0: l all files in /dev/oracleasmfs/ as oracleasmfs_t Resolves: rhbz
- 3900: #1331383.- Label /etc/pki/pki-tomcat/ca/ as pki_tomcat_cert_t.Re
- 3940: solves:rhbz#1366915.- Allow certmonger to manage all systemd uni
- 3980: t files.Resolves:rhbz#1366915.- Grant certmonger "chown" capabil
- 39c0: ity.Resolves:rhbz#1366915.- Allow ipa_helper_t stream connect to
- 3a00: dirsrv_t domain.Resolves: rhbz#1368418.- Update oracleasm SELin
- 3a40: ux module.Resolves: rhbz#1331383.- label /var/lib/kubelet as svi
- 3a80: rt_sandbox_file_t.Resolves: rhbz#1369159.- Add few interfaces to
- 3ac0: cloudform.if file.Resolves: rhbz#1367834.- Label /var/run/coros
- 3b00: ync-qnetd and /var/run/corosync-qdevice as cluster_var_run_t. No
- 3b40: te: corosync policy is now par of rhcs module.Resolves: rhbz#134
- 3b80: 7514.- Allow krb5kdc_t to read krb4kdc_conf_t dirs..Resolves: rh
- 3bc0: bz#1368492.- Update networkmanager_filetrans_named_content() int
- 3c00: erface to allow source domain to create also temad dir in /var/r
- 3c40: un..Resolves: rhbz#1365653.- Allow teamd running as NetworkManag
- 3c80: er_t to access netlink_generic_socket to allow multiple network
- 3cc0: interfaces to be teamed together..Resolves: rhbz#1365653.- Label
- 3d00: /dev/oracleasmfs as oracleasmfs_t. Add few interfaces related t
- 3d40: o oracleasmfs_t type.Resolves: rhbz#1331383.- A new version of c
- 3d80: loud-init that supports the effort to provision RHEL Atomic on M
- 3dc0: icrosoft Azure requires some a new rules that allows dhclient/dh
- 3e00: client hooks to call cloud-init..Resolves: rhbz#1367834.- Allow
- 3e40: iptables to creating netlink generic sockets..Resolves: rhbz#136
- 3e80: 4359.- Allow ipmievd domain to create lock files in /var/lock/su
- 3ec0: bsys/.Resolves:rhbz#1349058.- Update policy for ipmievd daemon..
- 3f00: Resolves:rhbz#1349058.- Dontaudit hyperkvp to getattr on non sec
- 3f40: urity files..Resolves: rhbz#1349356.- Label /run/corosync-qdevic
- 3f80: e and /run/corosync-qnetd as corosync_var_run_t.Resolves: rhbz#1
- 3fc0: 347514.- Fixed lsm SELinux module.- Add sys_admin capability to
- 13:00:16.811351 <= Recv data, 16384 bytes (0x4000)
- 0000: sbd domain.Resolves: rhbz#1322725.- Allow vdagent to comunnicate
- 0040: with systemd-logind via dbus.Resolves: rhbz#1366731.- Allow lsm
- 0080: d_plugin_t domain to create fixed_disk device..Resolves: rhbz#12
- 00c0: 38066.- Allow opendnssec domain to create and manage own tmp dir
- 0100: s/files.Resolves: rhbz#1366649.- Allow opendnssec domain to read
- 0140: system state.Resolves: rhbz#1366649.- Update opendnssec_manage_
- 0180: config() interface to allow caller domain also manage opendnssec
- 01c0: _conf_t dirs.Resolves: rhbz#1366649.- Allow rasdaemon to mount/u
- 0200: nmount tracefs filesystem..Resolves: rhbz#1364380.- Label /usr/l
- 0240: ibexec/iptables/iptables.init as iptables_exec_t Allow iptables
- 0280: creating lock file in /var/lock/subsys/.Resolves: rhbz#1367520.-
- 02c0: Modify interface den_read_nvme() to allow also read nvme_device
- 0300: _t block files..Resolves: rhbz#1362564.- Label /var/run/storaged
- 0340: as lvm_var_run_t..Resolves: rhbz#1264390.- Allow unconfineduser
- 0380: to run ipa_helper_t..Resolves: rhbz#1361636.- Dontaudit mock to
- 03c0: write to generic certs..Resolves: rhbz#1271209.- Add labeling f
- 0400: or corosync-qdevice and corosync-qnetd daemons, to run as cluste
- 0440: r_t.Resolves: rhbz#1347514.- Revert "Label corosync-qnetd and co
- 0480: rosync-qdevice as corosync_t domain".- Allow modemmanager to wri
- 04c0: te to systemd inhibit pipes.Resolves: rhbz#1365214.- Label coros
- 0500: ync-qnetd and corosync-qdevice as corosync_t domain.Resolves: rh
- 0540: bz#1347514.- Allow ipa_helper to read network state.Resolves: rh
- 0580: bz#1361636.- Label oddjob_reqiest as oddjob_exec_t.Resolves: rhb
- 05c0: z#1361636.- Add interface oddjob_run().Resolves: rhbz#1361636.-
- 0600: Allow modemmanager chat with systemd_logind via dbus.Resolves: r
- 0640: hbz#1362273.- Allow NetworkManager chat with puppetagent via dbu
- 0680: s.Resolves: rhbz#1363989.- Allow NetworkManager chat with kdumpc
- 06c0: tl via dbus.Resolves: rhbz#1363977.- Allow sbd send msgs to sysl
- 0700: og Allow sbd create dgram sockets. Allow sbd to communicate with
- 0740: kernel via dgram socket Allow sbd r/w kernel sysctls..Resolves:
- 0780: rhbz#1322725.- Allow ipmievd_t domain to re-create ipmi devices
- 07c0: Label /usr/libexec/openipmi-helper as ipmievd_exec_t.Resolves:
- 0800: rhbz#1349058.- Allow rasdaemon to use tracefs filesystem..Resolv
- 0840: es: rhbz#1364380.- Fix typo bug in dirsrv policy.- Some logrotat
- 0880: e scripts run su and then su runs unix_chkpwd. Allow logrotate_t
- 08c0: domain to check passwd..Resolves: rhbz#1283134.- Add ipc_lock c
- 0900: apability to sssd domain. Allow sssd connect to http_cache_t.Res
- 0940: olves: rhbz#1362688.- Allow dirsrv to read dirsrv_share_t conten
- 0980: t.Resolves: rhbz#1363662.- Allow virtlogd_t to append svirt_imag
- 09c0: e_t files..Resolves: rhbz#1358140.- Allow hypervkvp domain to re
- 0a00: ad hugetlbfs dir/files..Resolves: rhbz#1349356.- Allow mdadm dae
- 0a40: mon to read nvme_device_t blk files.Resolves: rhbz#1362564.- All
- 0a80: ow selinuxusers and unconfineduser to run oddjob_request.Resolve
- 0ac0: s: rhbz#1361636.- Allow sshd server to acces to Crypto Express 4
- 0b00: (CEX4) devices..Resolves: rhbz#1362539.- Fix labeling issue in
- 0b40: init.fc file. Path /usr/lib/systemd/fedora-* changed to /usr/lib
- 0b80: /systemd/rhel-*..Resolves: rhbz#1363769.- Fix typo in device int
- 0bc0: erfaces.Resolves: rhbz#1349058.- Add interfaces for managing ipm
- 0c00: i devices.Resolves: rhbz#1349058.- Add interfaces to allow mount
- 0c40: ing/umounting tracefs filesystem.Resolves: rhbz#1364380.- Add in
- 0c80: terfaces to allow rw tracefs filesystem.Resolves: rhbz#1364380.-
- 0cc0: Add interface dev_read_nvme() to allow reading Non-Volatile Mem
- 0d00: ory Host Controller devices..Resolves: rhbz#1362564.- Label /sys
- 0d40: /kernel/debug/tracing filesystem.Resolves: rhbz#1364380.- Allow
- 0d80: sshd setcap capability. This is needed due to latest changes in
- 0dc0: sshd.Resolves: rhbz#1357857.- Dontaudit mock_build_t can list al
- 0e00: l ptys..Resolves: rhbz#1271209.- Allow ftpd_t to mamange userhom
- 0e40: e data without any boolean..Resolves: rhbz#1097775.- Add logrota
- 0e80: te permissions for creating netlink selinux sockets..Resolves: r
- 0ec0: hbz#1283134.- Allow lsmd_plugin_t to exec ldconfig..Resolves: rh
- 0f00: bz#1238066.- Allow vnstatd domain to read /sys/class/net/ files.
- 0f40: Resolves: rhbz#1358243.- Remove duplicate allow rules in spamass
- 0f80: assin SELinux module.Resolves:rhbz#1358175.- Allow spamc_t and s
- 0fc0: pamd_t domains create .spamassassin file in user homedirs.Resolv
- 1000: es:rhbz#1358175.- Allow sshd setcap capability. This is needed d
- 1040: ue to latest changes in sshd.Resolves: rhbz#1357857.- Add new ML
- 1080: S attribute to allow relabeling objects higher than system low.
- 10c0: This exception is needed for package managers when processing se
- 1100: nsitive data..Resolves: rhbz#1330464.- Allow gnome-keyring also
- 1140: manage user_tmp_t sockets..Resolves: rhbz#1257057.- corecmd: Rem
- 1180: ove fcontext for /etc/sysconfig/libvirtd.Resolves:rhbz#1351382.-
- 11c0: Allow ipa_dnskey domain to search cache dirs.Resolves: rhbz#135
- 1200: 0957.- Allow ipa-dnskey read system state..Reasolves: rhbz#13509
- 1240: 57.- Allow dogtag-ipa-ca-renew-agent-submit labeled as certmonge
- 1280: r_t to create /var/log/ipa/renew.log file.Resolves: rhbz#1350957
- 12c0: .- Allow firewalld to manage net_conf_t files..Resolves:rhbz#130
- 1300: 4723.- Allow logrotate read logs inside containers..Resolves: rh
- 1340: bz#1303514.- Allow sssd to getattr on fs_t.Resolves: rhbz#135608
- 1380: 2.- Allow opendnssec domain to manage bind chace files.Resolves:
- 13c0: rhbz#1350957.- Fix typo in rhsmcertd policy module.Resolves: r
- 1400: hbz#1329475.- Allow systemd to get status of systemd-logind daem
- 1440: on.Resolves: rhbz#1356141.- Label more ndctl devices not just nd
- 1480: ctl0.Resolves: rhbz#1355809.- Allow rhsmcertd to copy certs into
- 14c0: /etc/docker/cert.d.- Add interface docker_rw_config().Resolves:
- 1500: rhbz#1344500.- Fix logrotate fc file to label also /var/lib/log
- 1540: rotate/ dir as logrotate_var_lib_t.Resolves: rhbz#1355632.- Allo
- 1580: w rhsmcertd to read network sysctls.Resolves: rhbz#1329475.- Lab
- 15c0: el /var/log/graphite-web dir as httpd_log_t.Resolves: rhbz#13108
- 1600: 98.- Allow mock to use generic ptys.Resolves: rhbz#1271209.- All
- 1640: ow adcli running as sssd_t to write krb5.keytab file..Resolves:
- 1680: rhbz#1356082.- Allow openvswitch connect to openvswitch_port_t t
- 16c0: ype..Resolves: rhbz#1335024.- Add SELinux policy for opendnssec
- 1700: service..Resolves: rhbz#1350957.- Create new SELinux type for /u
- 1740: sr/libexec/ipa/ipa-dnskeysyncd.Resolves: rhbz#1350957.- label /d
- 1780: ev/ndctl0 device as nvram_device_t.Resolves: rhbz#1355809.- Allo
- 17c0: w lttng tools to block suspending.Resolves: rhbz#1256374.- Allow
- 1800: creation of vpnaas in openstack.Resolves: rhbz#1352710.- virt:
- 1840: add strict policy for virtlogd daemon.Resolves:rhbz#1311606.- Up
- 1880: date makefile to support snapperd_contexts file.Resolves: rhbz#1
- 18c0: 352681.- Allow udev to manage systemd-hwdb files.- Add interface
- 1900: systemd_hwdb_manage_config().Resolves: rhbz#1350756.- Fix paths
- 1940: to infiniband devices. This allows use more then two infiniband
- 1980: interfaces..Resolves: rhbz#1210263.- Allow virtual machines to
- 19c0: rw infiniband devices..Resolves: rhbz#1210263.- Allow opensm dae
- 1a00: mon to rw infiniband_mgmt_device_t.Resolves: rhbz#1210263.- Allo
- 1a40: w systemd_hwdb_t to relabel /etc/udev/hwdb.bin file..Resolves: r
- 1a80: hbz#1350756.- Make label for new infiniband_mgmt deivices.Resolv
- 1ac0: es: rhbz#1210263.- Fix typo in brltty SELinux module.- Add new S
- 1b00: ELinux module sbd.Resolves: rhbz#1322725.- Allow pcp dmcache met
- 1b40: rics collection.Resolves: rhbz#1309883.- Allow pkcs_slotd_t to c
- 1b80: reate dir in /var/lock Add label pkcs_slotd_log_t.Resolves: rhbz
- 1bc0: #1350782.- Allow openvpn to create sock files labeled as openvpn
- 1c00: _var_run_t.Resolves: rhbz#1328246.- Allow hypervkvp daemon to ge
- 1c40: tattr on all filesystem types..Resolves: rhbz#1349356.- Allow f
- 1c80: irewalld to create net_conf_t files.Resolves: rhbz#1304723.- All
- 1cc0: ow mock to use lvm.Resolves: rhbz#1271209.- Allow keepalived to
- 1d00: create netlink generic sockets..Resolves: rhbz#1349809.- Allow m
- 1d40: irromanager creating log files in /tmp.Resolves:rhbz#1328818.- R
- 1d80: ename few modules to make it consistent with source files.Resolv
- 1dc0: es: rhbz#1351445.- Allow vmtools_t to transition to rpm_script d
- 1e00: omain.Resolves: rhbz#1342119.- Allow nsd daemon to manage nsd_co
- 1e40: nf_t dirs and files.Resolves: rhbz#1349791.- Allow cluster to cr
- 1e80: eate dirs in /var/run labeled as cluster_var_run_t.Resolves: rhb
- 1ec0: z#1346900.- Allow sssd read also sssd_conf_t dirs.Resolves: rhbz
- 1f00: #1350535.- Dontaudit su_role_template interface to getattr /proc
- 1f40: /kcore Dontaudit su_role_template interface to getattr /dev/init
- 1f80: ctl.Resolves: rhbz#1086240.- Add interface lvm_getattr_exec_file
- 1fc0: s().Resolves: rhbz#1271209.- Fix typo Compliling vs. Compiling.R
- 2000: esolves: rhbz#1351445.- Allow krb5kdc_t to communicate with sssd
- 2040: .Resolves: rhbz#1319933.- Allow prosody to bind on prosody ports
- 2080: .Resolves: rhbz#1304664.- Add dac_override caps for fail2ban-cli
- 20c0: ent.Resolves: rhbz#1316678.- dontaudit read access for svirt_t o
- 2100: n the file /var/db/nscd/group.Resolves: rhbz#1301637.- Allow ine
- 2140: td child process to communicate via dbus with systemd-logind.Res
- 2180: olves: rhbz#1333726.- Add label for brltty log file.Resolves: rh
- 21c0: bz#1328818.- Allow dspam to read the passwd file.Resolves: rhbz#
- 2200: 1286020.- Allow snort_t to communicate with sssd.Resolves: rhbz#
- 2240: 1284908.- svirt_sandbox_domains need to be able to execmod for b
- 2280: adly built libraries..Resolves: rhbz#1206339.- Add policy for lt
- 22c0: tng-tools package..Resolves: rhbz#1256374.- Make mirrormanager a
- 2300: s application domain..Resolves: rhbz#1328234.- Add support for t
- 2340: he default lttng-sessiond port - tcp/5345. This port is used by
- 2380: LTTng 2.x central tracing registry session daemon..- Add prosod
- 23c0: y ports.Resolves: rhbz#1304664.- Allow sssd read also sssd_conf_
- 2400: t dirs.Resolves: rhbz#1350535.- Label /var/lib/softhsm as named_
- 2440: cache_t. Allow named_t to manage named_cache_t dirs..Resolves:rh
- 2480: bz#1331315.- Label named-pkcs11 binary as named_exec_t..Resolves
- 24c0: : rhbz#1331315.- Allow glusterd daemon to get systemd status.Res
- 2500: olves: rhbz#1321785.- Allow logrotate dbus-chat with system_logi
- 2540: nd daemon.Resolves: rhbz#1283134.- Allow pcp_pmlogger to read ke
- 2580: rnel network state Allow pcp_pmcd to read cron pid files.Resolve
- 25c0: s: rhbz#1336211.- Add interface cron_read_pid_files().Resolves:
- 2600: rhbz#1336211.- Allow pcp_pmlogger to create unix dgram sockets.R
- 2640: esolves: rhbz#1336211.- Add hwloc-dump-hwdata SELinux policy.Res
- 2680: olves: rhbz#1344054.- Remove non-existing jabberd_spool_t() inte
- 26c0: rface and add new jabbertd_var_spool_t..Resolves: rhbz#1121171.-
- 2700: Remove non-existing interface salk_resetd_systemctl() and repla
- 2740: ce it with sanlock_systemctl_sanlk_resetd().Resolves: rhbz#12597
- 2780: 64.- Create label for openhpid log files. .esolves: rhbz#1259764
- 27c0: .- Label /var/lib/ganglia as httpd_var_lib_t.Resolves: rhbz#1260
- 2800: 536.- Allow firewalld_t to create entries in net_conf_t dirs..Re
- 2840: solves: rhbz#1304723.- Allow journalctl to read syslogd_var_run_
- 2880: t files. This allows to staff_t and sysadm_t to read journals.Re
- 28c0: solves: rhbz#1288255.- Include patch from distgit repo: policy-R
- 2900: HEL-7.1-flask.patch..Resolves: rhbz#1329560.- Update refpolicy t
- 2940: o handle hwloc.Resolves: rhbz#1344054.- Label /etc/dhcp/scripts
- 2980: dir as bin_t.- Allow sysadm_role to run journalctl_t domain. Thi
- 29c0: s allows sysadm user to read journals..Resolves: rhbz#1288255.-
- 2a00: Allow firewalld_t to create entries in net_conf_t dirs..Resolves
- 2a40: : rhbz#1304723.- Allow journalctl to read syslogd_var_run_t file
- 2a80: s. This allows to staff_t and sysadm_t to read journals.Resolves
- 2ac0: : rhbz#1288255.- Allow mongod log to syslog..Resolves: rhbz#1306
- 2b00: 995.- Allow rhsmcertd connect to port tcp 9090.Resolves: rhbz#13
- 2b40: 37319.- Label for /bin/mail(x) was removed but /usr/bin/mail(x)
- 2b80: not. This path is also needed to remove. .Resolves: rhbz#1262483
- 2bc0: .Resolves: rhbz#1277506.- Label /usr/libexec/mimedefang-wrapper
- 2c00: as spamd_exec_t..Resolves: rhbz#1301516.- Add new boolean spamd_
- 2c40: update_can_network..Resolves: rhbz#1305469.- Allow rhsmcertd con
- 2c80: nect to tcp netport_port_t.Resolves: rhbz#1329475.- Fix SELinux
- 2cc0: context for /usr/share/mirrormanager/server/mirrormanager to Lab
- 2d00: el all binaries under dir as mirrormanager_exec_t..Resolves: rhb
- 2d40: z#1328234.- Allow prosody to bind to fac_restore tcp port..Resol
- 2d80: ves: rhbz#1321787.- Allow ninfod to read raw packets.Resolves: r
- 2dc0: hbz#1317964.- Allow pegasus get attributes from qemu binary file
- 2e00: s..Resolves: rhbz#1260835.- Allow pegasus get attributes from qe
- 2e40: mu binary files..Resolves: rhbz#1271159.- Allow tuned to use pol
- 2e80: icykit. This change is required by cockpit..Resolves: rhbz#13464
- 2ec0: 64.- Allow conman_t to read dir with conman_unconfined_script_t
- 2f00: binary files..Resolves: rhbz#1297323.- Allow pegasus to read /pr
- 2f40: oc/sysinfo..Resolves: rhbz#1265883.- Allow sysadm_role to run jo
- 2f80: urnalctl_t domain. This allows sysadm user to read journals..Res
- 2fc0: olves: rhbz#1288255.- Label tcp ports:16379, 26379 as redis_port
- 3000: _t.Resolves: rhbz#1348471.- Allow systemd to relabel /var and /v
- 3040: ar/lib directories during boot..- Add files_relabel_var_dirs() a
- 3080: nd files_relabel_var_dirs() interfaces..- Add files_relabelto_va
- 30c0: r_lib_dirs() interface..- Label tcp port 2004 as mailbox_port_t.
- 3100: .Resolves: rhbz#1332843.- Label tcp and udp port 5582 as fac_res
- 3140: tore_port_t.Resolves: rhbz#1321787.- Allow sysadm_t user to run
- 3180: postgresql-setup..Resolves: rhbz#1282543.- Allow sysadm_t user t
- 31c0: o dbus chat with oddjob_t. This allows confined admin run oddjob
- 3200: mkhomedirfor script..Resolves: rhbz#1297480.- Update netlink so
- 3240: cket classes..- Allow conman to kill conman_unconfined_script..R
- 3280: esolves: rhbz#1297323.- Make conman_unconfined_script_t as init_
- 32c0: system_domain..Resolves:rhbz#1297323.- Allow init dbus chat with
- 3300: apmd..Resolves:rhbz#995898.- Patch /var/lib/rpm is symlink to /
- 3340: usr/share/rpm on Atomic, due to this change we need to label als
- 3380: o /usr/share/rpm as rpm_var_lib_t..Resolves: rhbz#1233252.- Dont
- 33c0: audit xguest_gkeyringd_t stream connect to system_dbusd_t.Resolv
- 3400: es: rhbz#1052880.- Add mediawiki rules to proper scope.Resolves:
- 3440: rhbz#1301186.- Dontaudit xguest_gkeyringd_t stream connect to s
- 3480: ystem_dbusd_t.Resolves: rhbz#1052880.- Allow mysqld_safe to inhe
- 34c0: rit rlimit information from mysqld.Resolves: rhbz#1323673.- Allo
- 3500: w collectd_t to stream connect to postgresql..Resolves: rhbz#134
- 3540: 4056.- Allow mediawiki-script to read /etc/passwd file..Resolves
- 3580: : rhbz#1301186.- Add filetrans rule that NetworkManager_t can cr
- 35c0: eate net_conf_t files in /etc..Resolves: rhbz#1344505.- Add labe
- 3600: ls for mediawiki123.Resolves: rhbz#1293872.- Fix label for all f
- 3640: ence_scsi_check scripts.- Allow ip netns to mounton root fs and
- 3680: unmount proc_t fs..Resolves: rhbz#1343776.Resolves: rhbz#1286851
- 36c0: .- Allow sysadm_t to run newaliases command..Resolves: rhbz#1344
- 3700: 828.- Add interface sysnet_filetrans_named_net_conf().Resolves:
- 3740: rhbz#1344505.- Fix several issues related to the SELinux Userspa
- 3780: ce changes.- Allow glusterd domain read krb5_keytab_t files..Res
- 37c0: olves: rhbz#1343929.- Fix typo in files_setattr_non_security_dir
- 3800: s..Resolves: rhbz#1115987.- Allow tmpreaper_t to read/setattr al
- 3840: l non_security_file_type dirs.Resolves: rhbz#1115987.- Allow fir
- 3880: ewalld to create firewalld_var_run_t directory..Resolves: rhbz#1
- 38c0: 304723.- Add interface firewalld_read_pid_files().Resolves: rhbz
- 3900: #1304723.- Label /usr/libexec/rpm-ostreed as rpm_exec_t..Resolve
- 3940: s: rhbz#1340542.- Allow sanlock service to read/write cephfs_t f
- 3980: iles..Resolves: rhbz#1315332.- Fixed to make SELinux work with d
- 39c0: ocker and prctl(NO_NEW_PRIVS).- Added missing docker interfaces:
- 3a00: - docker_typebounds - docker_entrypoint.Resolves: rhbz#123658
- 3a40: 0.- Add interface files_setattr_non_security_dirs().Resolves: rh
- 3a80: bz#1115987.- Add support for onloadfs.- Allow iptables to read f
- 3ac0: irewalld pid files..Resolves: rhbz#1304723.- Add SELinux support
- 3b00: for ceph filesystem..Resolves: rhbz#1315332.- Fixed to make SEL
- 3b40: inux work with docker and prctl(NO_NEW_PRIVS).Resolves: rhbz#123
- 3b80: 6580.- Fixed to make SELinux work with docker and prctl(NO_NEW_P
- 3bc0: RIVS).- Added missing docker interfaces: - docker_typebounds -
- 3c00: docker_entrypoint.Resolves: rhbz#1236580.- New interfaces neede
- 3c40: d for systemd-machinectl.Resolves: rhbz#1236580.- New interfaces
- 3c80: needed by systemd-machine.Resolves: rhbz#1236580.- Add interfac
- 3cc0: e allowing sending and receiving messages from virt over dbus..R
- 3d00: esolves: rhbz#1236580.- Backport docker policy from Fedora..Rela
- 3d40: ted: #1303123.Resolves: #1341257.- Allow NetworkManager_t and po
- 3d80: licykit_t read access to systemd-machined pid files..Resolves: r
- 3dc0: hbz#1236580.- Fixed to make SELinux work with docker and prctl(N
- 3e00: O_NEW_PRIVS).- Added interfaces needed by new docker policy..Rel
- 3e40: ated: rhbz#1303123.- Add support for systemd-machined daemon.Res
- 3e80: olves: rhbz#1236580.- Allow rpm-ostree domain transition to inst
- 3ec0: all_t domain from init_t..Resolves: rhbz#1340542.- dnsmasq: allo
- 3f00: w NetworkManager to control dnsmasq via D-Bus.Resolves: rhbz#133
- 3f40: 6722.- Directory Server (389-ds-base) has been updated to use sy
- 3f80: stemd-ask-password. In order to function correctly we need the f
- 3fc0: ollowing added to dirsrv.te.Resolves: rhbz#1333198.- sftpd_* boo
- 13:00:16.817996 <= Recv data, 16384 bytes (0x4000)
- 0000: leans are functionless these days..Resolves: rhbz#1335656.- Labe
- 0040: l /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain
- 0080: to create glusterd_log_t files. Label /var/run/ganesha.pid as gl
- 00c0: uster_var_run_t..Resolves: rhbz#1335828.- Allow ganesha-ha.sh sc
- 0100: ript running under unconfined_t domain communicate with glusterd
- 0140: _t domains via dbus..Resolves: rhbz#1336760.- Allow ganesha daem
- 0180: on labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled
- 01c0: as var_lib_nfs_t..Resolves: rhbz#1336737.- Label /usr/libexec/s
- 0200: toraged/storaged as lvm_exec_t to run storaged daemon in lvm_t S
- 0240: ELinux domain..Resolves: rhbz#1264390.- Allow systemd_hostanmed_
- 0280: t to read /proc/sysinfo labeled as sysctl_t..Resolves: rhbz#1337
- 02c0: 061.- Revert "Allow all domains some process flags.".Resolves: r
- 0300: hbz#1303644.- Revert "Remove setrlimit to all domains.".Resolves
- 0340: : rhbz#1303644.- Label /usr/sbin/xrdp* files as bin_t.Resolves:
- 0380: rhbz#1276777.- Add mls support for some db classes.Resolves: rhb
- 03c0: z#1303651.- Allow systemd_resolved_t to check if ipv6 is disable
- 0400: d..Resolves: rhbz#1236579.- Allow systemd_resolved to read syste
- 0440: md_networkd run files..Resolves: rhbz#1236579.- Allow ganesha-ha
- 0480: .sh script running under unconfined_t domain communicate with gl
- 04c0: usterd_t domains via dbus..Resolves: rhbz#1336760.- Allow ganesh
- 0500: a daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir l
- 0540: abeled as var_lib_nfs_t..Resolves: rhbz#1336737.- Allow logwatch
- 0580: to domtrans to postqueue.Resolves: rhbz#1331542.- Label /var/lo
- 05c0: g/ganesha.log as gluster_log_t.- Allow glusterd_t domain to crea
- 0600: te glusterd_log_t files..- Label /var/run/ganesha.pid as gluster
- 0640: _var_run_t..Resolves: rhbz#1335828.- Allow zabbix to connect to
- 0680: postgresql port.Resolves: rhbz#1330479.- Add userdom_destroy_unp
- 06c0: riv_user_shared_mem() interface..Related: rhbz#1306403.- systemd
- 0700: -logind remove all IPC objects owned by a user on a logout. This
- 0740: covers also SysV memory. This change allows to destroy unprivil
- 0780: edged user SysV shared memory segments..Resolves: rhbz#1306403.-
- 07c0: We need to restore contexts on /etc/passwd*,/etc/group*,/etc/*s
- 0800: hadow* during install phase to get proper labeling for these fil
- 0840: es until selinux-policy pkgs are installed..Resolves: rhbz#13339
- 0880: 52.- Add interface glusterd_dontaudit_read_lib_dirs().Resolves:
- 08c0: rhbz#1295680.- Dontaudit Occasionally observing AVC's while runn
- 0900: ing geo-rep automation.Resolves: rhbz#1295680.- Allow glusterd t
- 0940: o manage socket files labeled as glusterd_brick_t..Resolves: rhb
- 0980: z#1331561.- Create new apache content template for files stored
- 09c0: in user homedir. This change is needed to make working booleans:
- 0a00: - httpd_enable_homedirs - httpd_read_user_content .Resolves: rh
- 0a40: bz#1246522.- Allow stunnel create log files. .Resolves: rhbz#129
- 0a80: 6851.- Label tcp port 8181 as intermapper_port_t..Resolves: rhbz
- 0ac0: #1334783.- Label tcp/udp port 2024 as xinuexpansion4_port_t.Reso
- 0b00: lves: rhbz#1334783.- Label tcp port 7002 as afs_pt_port_t Label
- 0b40: tcp/udp port 2023 as xinuexpansion3_port_t.Resolves: rhbz#133478
- 0b80: 3.- Dontaudit ldconfig read gluster lib files..Resolves: rhbz#12
- 0bc0: 95680.- Add interface auth_use_nsswitch() to systemd_domain_temp
- 0c00: late..Resolves: rhbz#1236579.- Label /usr/bin/ganesha.nfsd as gl
- 0c40: usterd_exec_t to run ganesha as glusterd_t. Allow glusterd_t str
- 0c80: eam connect to rpbind_t. Allow cluster_t to create symlink /var/
- 0cc0: lib/nfs labeled as var_lib_nfs_t. Add interface rpc_filetrans_va
- 0d00: r_lib_nfs_content() Add new boolean: rpcd_use_fusefs to allow rp
- 0d40: cd daemon use fusefs.. Resolves: rhbz#1312809. Resolves: rhbz#13
- 0d80: 23947.- Allow dbus chat between httpd_t and oddjob_t. Resolves:
- 0dc0: rhbz#1324144.- Label /usr/libexec/ipa/oddjob/org.freeipa.server.
- 0e00: conncheck as ipa_helper_exec_t..Resolves: rhbz#1324144.- Label /
- 0e40: var/log/ipareplica-conncheck.log file as ipa_log_t Allow ipa_hel
- 0e80: per_t domain to manage logs labeledas ipa_log_t Allow ipa_helper
- 0ec0: _t to connect on http and kerberos_passwd ports..Resolves: rhbz#
- 0f00: 1324144.- Allow prosody to listen on port 5000 for mod_proxy65..
- 0f40: Resolves: rhbz#1316918.- Allow pcp_pmcd_t domain to manage docke
- 0f80: r lib files. This rule is needed to allow pcp to collect contain
- 0fc0: er information when SELinux is enabled..Resolves: rhbz#1309454.-
- 1000: Allow runnig php7 in fpm mode. From selinux-policy side, we nee
- 1040: d to allow httpd to read/write hugetlbfs..Resolves: rhbz#1319442
- 1080: .- Allow openvswitch daemons to run under openvswitch Linux user
- 10c0: instead of root. This change needs allow set capabilities: chwo
- 1100: n, setgid, setuid, setpcap..Resolves: rhbz#1296640.- Remove ftpd
- 1140: _home_dir() boolean from distro policy. Reason is that we cannot
- 1180: make this working due to m4 macro language limits..Resolves: rh
- 11c0: bz#1097775.- /bin/mailx is labeled sendmail_exec_t, and enters t
- 1200: he sendmail_t domain on execution. If /usr/sbin/sendmail does n
- 1240: ot have its own domain to transition to, and is not one of sever
- 1280: al products whose behavior is allowed by the sendmail_t policy,
- 12c0: execution will fail. In this case we need to label /bin/mailx as
- 1300: bin_t..Resolves: rhbz#1262483.- Allow nsd daemon to create log
- 1340: file in /var/log as nsd_log_t.Resolves: rhbz#1293140.- Sanlock p
- 1380: olicy update. - New sub-domain for sanlk-reset daemon.Resolves
- 13c0: : rhbz#1212324.- Label all run tgtd files, not just socket files
- 1400: .Resolves: rhbz#1280280.- Label all run tgtd files, not just soc
- 1440: ket files..Resolves: rhbz#1280280.- Allow prosody to stream conn
- 1480: ect to sasl. This will allow using cyrus authentication in proso
- 14c0: dy..Resolves: rhbz#1321049.- unbound wants to use ephemeral port
- 1500: s as a default configuration. Allow to use also udp sockets..Res
- 1540: olves: rhbz#1318224.- Allow prosody to listen on port 5000 for m
- 1580: od_proxy65..Resolves: rhbz#1316918.- Allow targetd to read/write
- 15c0: to /dev/mapper/control device..Resolves: rhbz#1063714.- Allow K
- 1600: DM to get status about power services. This change allow kdm to
- 1640: be able do shutdown..Resolves: rhbz#1316724.- Allow systemd-reso
- 1680: lved daemon creating netlink_route sockets..Resolves:rhbz#123657
- 16c0: 9.- Allow systemd_resolved_t to read /etc/passwd file. Allow sys
- 1700: temd_resolved_t to write to kmsg_device_t when 'systemd.log_targ
- 1740: et=kmsg' option is used.Resolves: rhbz#1065362.- Label /etc/seli
- 1780: nux/(minimum|mls|targeted)/active/ as semanage_store_t.Resolves:
- 17c0: rhbz#1321943.- Label all nvidia binaries as xserver_exec_t.Reso
- 1800: lves: rhbz#1322283.- Create new permissivedomains CIL module and
- 1840: make it active..Resolves: rhbz#1320451.- Add support for new mo
- 1880: ck location - /usr/libexec/mock/mock..Resolves: rhbz#1271209.- A
- 18c0: llow bitlee to create bitlee_var_t dirs..Resolves: rhbz#1268651.
- 1900: - Allow CIM provider to read sssd public files..Resolves: rhbz#1
- 1940: 263339.- Fix some broken interfaces in distro policy..Resolves:
- 1980: rhbz#1121171.- Allow power button to shutdown the laptop..Resolv
- 19c0: es: rhbz#995898.- Allow lsm plugins to create named fixed disks.
- 1a00: .Resolves: rhbz#1238066.- Add default labeling for /etc/Pegasus/
- 1a40: cimserver_current.conf. It is a correct patch instead of the cur
- 1a80: rent /etc/Pegasus/pegasus_current.confResolves: rhbz#1278777.- A
- 1ac0: llow hyperv domains to rw hyperv devices..Resolves: rhbz#1309361
- 1b00: .- Label /var/www/html(/.*)?/wp_backups(/.*)? as httpd_sys_rw_co
- 1b40: ntent_t.Resolves: rhbz#1246780.- Create conman_unconfined_script
- 1b80: _t type for conman script stored in /use/share/conman/exec/.Reso
- 1bc0: lves: rhbz#1297323.- Fix rule definitions for httpd_can_sendmail
- 1c00: boolean. We need to distinguish between base and contrib..- Add
- 1c40: support for /dev/mptctl device used to check RAID status.. Reso
- 1c80: lves: rhbz#1258029.- Create hyperv* devices and create rw interf
- 1cc0: aces for this devices..Resolves: rhbz#1309361.- Add fixes for se
- 1d00: linux userspace moving the policy store to /var/lib/selinux..- R
- 1d40: emove optional else block for dhcp ping.- Allow rsync_export_all
- 1d80: _ro boolean to read also non_auth_dirs/files/symlinks..Resolves:
- 1dc0: rhbz#1263770.- Fix context of "/usr/share/nginx/html"..Resolves
- 1e00: : rhbz#1261857.- Allow pmdaapache labeled as pcp_pmcd_t access t
- 1e40: o port 80 for apache diagnostics.Resolves: rhbz#1270344.- Allow
- 1e80: pmlogger to create pmlogger.primary.socket link file.. Resolves:
- 1ec0: rhbz#1270344.- Label nagios scripts as httpd_sys_script_exec_t.
- 1f00: .Resolves: rhbz#1260306.- Add dontaudit interface for kdumpctl_t
- 1f40: mp_t.Resolves: rhbz#1156442.- Allow mdadm read files in EFI part
- 1f80: ition..Resolves: rhbz#1291801.- Allow nsd_t to bind on nsf_contr
- 1fc0: ol tcp port. Allow nsd_crond_t to read nsd pid..Resolves: rhbz#1
- 2000: 293140.- Label some new nsd binaries as nsd_exec_t Allow nsd dom
- 2040: ain net_admin cap. Create label nsd_tmp_t for nsd tmp files/dirs
- 2080: .Resolves: rhbz#1293140.- Add filename transition that /etc/prin
- 20c0: cap will be created with cupsd_rw_etc_t label in cups_filetrans_
- 2100: named_content() interface..Resolves: rhbz#1265102.- Add missing
- 2140: labeling for /usr/libexec/abrt-hook-ccpp..Resolves: rhbz#1213409
- 2180: .- Allow pcp_pmie and pcp_pmlogger to read all domains state..Re
- 21c0: solves: rhbz#1206525.- Label /etc/redis-sentinel.conf as redis_c
- 2200: onf_t. Allow redis_t write to redis_conf_t. Allow redis_t to con
- 2240: nect on redis tcp port..Resolves: rhbz#1275246.- cockpit has gro
- 2280: wn content in /var/run directory.Resolves: rhbz#1279429.- Allow
- 22c0: collectd setgid capability.Resolves:#1310898.- Remove declaratio
- 2300: n of empty booleans in virt policy..Resolves: rhbz#1103153.- Fix
- 2340: typo in drbd policy.- Add new drbd file type: drbd_var_run_t. A
- 2380: llow drbd_t to manage drbd_var_run_t files/dirs. Allow drbd_t cr
- 23c0: eate drbd_tmp_t files in /tmp..Resolves: rhbz#1134883.- Label /e
- 2400: tc/ctdb/events.d/* as ctdb_exec_t. Allow ctdbd_t to setattr on c
- 2440: tdbd_exec_t files..Resolves: rhbz#1293788.- Allow abrt-hook-ccpp
- 2480: to get attributes of all processes because of core_pattern..Res
- 24c0: olves: rhbz#1254188.- Allow abrt_t to read sysctl_net_t files..R
- 2500: esolves: rhbz#1254188.- The ABRT coredump handler has code to em
- 2540: ulate default core file creation The handler runs in a separate
- 2580: process with abrt_dump_oops_t SELinux process type. abrt-hook-cc
- 25c0: pp also saves the core dump file in the very same way as kernel
- 2600: does and a user can specify CWD location for a coredump. abrt-ho
- 2640: ok-ccpp has been made as a SELinux aware apps to create this cor
- 2680: edumps with correct labeling and with this commit the policy rul
- 26c0: es have been updated to allow access all non security files on a
- 2700: system..- Allow abrt-hook-ccpp to getattr on all executables..-
- 2740: Allow setuid/setgid capabilities for abrt-hook-ccpp.. Resolves:
- 2780: rhbz#1254188.- abrt-hook-ccpp needs to have setfscreate access
- 27c0: because it is SELinux aware and compute a target labeling.. Reso
- 2800: lves: rhbz#1254188.- Allow abrt-hook-ccpp to change SELinux user
- 2840: identity for created objects.. Resolves: rhbz#1254188.- Dontaud
- 2880: it write access to inherited kdumpctl tmp files.. Resolves: rbhz
- 28c0: #1156442.- Add interface to allow reading files in efivarfs - co
- 2900: ntains Linux Kernel configuration options for UEFI systems (UEFI
- 2940: Runtime Variables). Resolves: rhbz#1291801.- Label 8952 tcp por
- 2980: t as nsd_control.. Resolves: rhbz#1293140.- Allow ipsec to use p
- 29c0: am.. Resolves: rhbz#1315700.- Allow to log out to gdm after scre
- 2a00: en was resized in session via vdagent..Resolves: rhbz#1249020.-
- 2a40: Allow setrans daemon to read /proc/meminfo.. Resolves: rhbz#1316
- 2a80: 804.- Allow systemd_networkd_t to write kmsg, when kernel was st
- 2ac0: arted with following params: systemd.debug systemd.log_level=deb
- 2b00: ug systemd.log_target=kmsg.Resolves: rhbz#1298151.- Label tcp po
- 2b40: rt 5355 as llmnr-> Link-Local Multicast Name Resolution.Resolves
- 2b80: : rhbz#1236579.- Add new selinux policy for systemd-resolved daw
- 2bc0: mon..Resolves: rhbz#1236579.- Add interface ssh_getattr_server_k
- 2c00: eys() interface..Resolves: rhbz#1306197.- Allow run sshd-keygen
- 2c40: on second boot if first boot fails after some reason and content
- 2c80: is not syncedon the disk. These changes are reflecting this com
- 2cc0: mit in sshd. http://pkgs.fedoraproject.org/cgit/rpms/openssh.git
- 2d00: /commit/?id=af94f46861844cbd6ba4162115039bebcc8f78ba rhbz#129910
- 2d40: 6.Resolves: rhbz#1306197.- Allow systemd_notify_t to write to km
- 2d80: sg_device_t when 'systemd.log_target=kmsg' option is used..Resol
- 2dc0: ves: rhbz#1309417.- Remove bin_t label for /etc/ctdb/events.d/.
- 2e00: We need to label this scripts as ctdb_exec_t..Resolves: rhbz#129
- 2e40: 3788.- Prepare selinux-policy package for userspace release 2016
- 2e80: -02-23. Resolves: rhbz#1305982.- Allow sending dbus msgs between
- 2ec0: firewalld and system_cronjob domains. Resolves: rhbz#1284902.-
- 2f00: Allow zabbix-agentd to connect to following tcp sockets. One of
- 2f40: zabbix-agentd functions is get service status of ftp,http,innd,p
- 2f80: op,smtp protocols..Resolves: rhbz#1242506.- Add new boolean tmp
- 2fc0: reaper_use_cifs() to allow tmpreaper to run on local directories
- 3000: being shared with Samba..Resolves: rhbz#1284972.- Add support f
- 3040: or systemd-hwdb daemon.. Resolves: rhbz#1257940.- Add interface
- 3080: fs_setattr_cifs_dirs().. Resolves: rhbz#1284972.- Add new SELinu
- 30c0: x policy fo targetd daemon..Resolves: rhbz#1063714.- Add new SEL
- 3100: inux policy fo ipmievd daemon..Resolves: rhbz#1083031.- Add new
- 3140: SELinux policy fo hsqldb daemon..Resolves: rhbz#1083171.- Add ne
- 3180: w SELinux policy for blkmapd daemon..Resolves: rhbz#1072997.- Al
- 31c0: low p11-child to connect to apache ports..- Label /usr/sbin/lvml
- 3200: ockd binary file as lvm_exec_t..Resolves: rhbz#1278028.- Add int
- 3240: erface "lvm_manage_lock" to lvm policy..Resolves: rhbz#1063714.-
- 3280: Allow openvswitch domain capability sys_rawio..Resolves: rhbz#1
- 32c0: 278495.- Allow openvswitch to manage hugetlfs files and dirs..Re
- 3300: solves: rhbz#1278495.- Add fs_manage_hugetlbfs_files() interface
- 3340: ..Resolves: rhbz#1278495.- Allow smbcontrol domain to send sigch
- 3380: ld to ctdbd domain..Resolves: #1293784.- Allow openvswitch read/
- 33c0: write hugetlb filesystem..Resolves: #1278495.Allow hypervvssd to
- 3400: list all mountpoints to have VSS live backup working correctly.
- 3440: .Resolves:#1247880.- Revert Add missing labeling for /usr/libexe
- 3480: c/abrt-hook-ccpp patch.Resolves: #1254188.- Allow search dirs in
- 34c0: sysfs types in kernel_read_security_state..Resolves: #1254188.-
- 3500: Fix kernel_read_security_state interface that source domain of
- 3540: this interface can search sysctl_fs_t dirs..Resolves: #1254188.-
- 3580: Add missing labeling for /usr/libexec/abrt-hook-ccpp as a part
- 35c0: of #1245477 and #1242467 bugs.Resolves: #1254188.- We need allow
- 3600: connect to xserver for all sandbox_x domain because we have one
- 3640: type for all sandbox processes..Resolves:#1261938.- Remove labe
- 3680: ling for modules_dep_t file contexts to have labeled them as mod
- 36c0: ules_object_t..- Update files_read_kernel_modules() to contain m
- 3700: odutils_read_module_deps_files() calling because module deps lab
- 3740: eling could remain and it allows to avoid regressions..Resolves:
- 3780: #1266928.- We need to require sandbox_web_type attribute in sand
- 37c0: box_x_domain_template(). .Resolves: #1261938.- ipsec: The NM hel
- 3800: per needs to read the SAs.Resolves: #1259786.- ipsec: Allow ipse
- 3840: c management to create ptys.Resolves: #1259786.- Add temporary f
- 3880: ixes for sandbox related to #1103622. It allows to run everythin
- 38c0: g under one sandbox type..Resolves:#1261938.- Allow abrt_t domai
- 3900: n to write to kernel msg device..Resolves: #1257828.- Allow rpcb
- 3940: ind_t domain to change file owner and group.Resolves: #1265266.-
- 3980: Allow smbcontrol to create a socket in /var/samba which uses fo
- 39c0: r a communication with smbd, nmbd and winbind. .Resolves: #12564
- 3a00: 59.- Allow dirsrv-admin script to read passwd file. Allow dirsrv
- 3a40: -admin script to read httpd pid files. Label dirsrv-admin unit f
- 3a80: ile and allow dirsrv-admin domains to use it..Resolves: #1230300
- 3ac0: .- Allow qpid daemon to connect on amqp tcp port..Resolves: #126
- 3b00: 1805.- Label /etc/ipa/nssdb dir as cert_t.Resolves:#1262718.- Do
- 3b40: not provide docker policy files which is shipped by docker-seli
- 3b80: nux.rpm.Resolves:#1262812.- Add labels for afs binaries: dafiles
- 3bc0: erver, davolserver, salvageserver, dasalvager .Resolves: #119233
- 3c00: 8.- Add lsmd_plugin_t sys_admin capability, Allow lsmd_plugin_t
- 3c40: getattr from sysfs filesystem.. Resolves: #1238079.- Allow rhsmc
- 3c80: ertd_t send signull to unconfined_service_t domains. .Resolves:
- 3cc0: #1176078.- Remove file transition from snmp_manage_var_lib_dirs(
- 3d00: ) interface which created snmp_var_lib_t dirs in var_lib_t..- Al
- 3d40: low openhpid_t daemon to manage snmp files and dirs. .Resolves:
- 3d80: #1243902.- Allow mdadm_t domain read/write to general ptys and u
- 3dc0: nallocated ttys. .Resolves: #1073314.- Add interface unconfined_
- 3e00: server_signull() to allow domains send signull to unconfined_ser
- 3e40: vice_t. Resolves: #1176078.- Allow systemd-udevd to access netli
- 3e80: nk_route_socket to change names for network interfaces without u
- 3ec0: nconfined.pp module. It affects also MLS. .Resolves:#1250456.- F
- 3f00: ix labeling for fence_scsi_check script.Resolves: #1255020.- All
- 3f40: ow openhpid to read system state Allow openhpid to connect to tc
- 3f80: p http port.. Resolves: #1244248.- Allow openhpid to read snmp v
- 3fc0: ar lib files.. Resolves: #1243902.- Allow openvswitch_t domains
- 13:00:16.825259 <= Recv data, 16384 bytes (0x4000)
- 0000: read kernel dependencies due to openvswitch run modprobe.- Allow
- 0040: unconfined_t domains to create /var/run/xtables.lock with iptab
- 0080: les_var_run_t.Resolves: #1243403.- Remove bin_t label for /usr/s
- 00c0: hare/cluster/fence_scsi_check\.pl .Resolves: #1255020.- Fix rege
- 0100: xp in chronyd.fc file.Resolves: #1243764.- Allow passenger to ge
- 0140: tattr filesystem xattr.Resolves: #1196555.- Label mdadm.conf.ana
- 0180: ckbak as mdadm_conf_t file..Resolves: #1088904.- Revert "Allow p
- 01c0: egasus_openlmi_storage_t create mdadm.conf.anacbak file in /etc.
- 0200: ".- Allow watchdog execute fenced python script..Resolves: #1255
- 0240: 020.- Added inferface watchdog_unconfined_exec_read_lnk_files().
- 0280: - Remove labeling for /var/db/.*\.db as etc_t to label db files
- 02c0: as system_db_t..Resolves: #1230877.- Allow watchdog execute fenc
- 0300: ed python script. Resolves: #1255020.- Added inferface watchdog_
- 0340: unconfined_exec_read_lnk_files().- Label /var/run/chrony-helper
- 0380: dir as chronyd_var_run_t. Resolves: #1243764.- Allow dhcpc_t dom
- 03c0: ain transition to chronyd_t Resolves: #1243764.- Fix postfix_spo
- 0400: ol_maildrop_t,postfix_spool_flush_t contexts in postfix.fc file.
- 0440: .Resolves: #1252442.- Allow exec pidof under hypervkvp domain..R
- 0480: esolves: #1254870.- Allow hypervkvp daemon create connection to
- 04c0: the system DBUS.Resolves: #1254870.- Allow openhpid_t to read sy
- 0500: stem state..Resolves: #1244248.- Added labels for files provided
- 0540: by rh-nginx18 collection.Resolves: #1249945.- Dontaudit block_s
- 0580: uspend capability for ipa_helper_t, this is kernel bug. Allow ip
- 05c0: a_helper_t capability net_admin. Allow ipa_helper_t to list /tmp
- 0600: . Allow ipa_helper_t to read rpm db..Resolves: #1252968.- Allow
- 0640: rhsmcertd exec rhsmcertd_var_run_t files and rhsmcerd_tmp_t file
- 0680: s. This rules are in hide_broken_sympthons until we find better
- 06c0: solution..Resolves: #1243431.- Allow abrt_dump_oops_t to read pr
- 0700: oc_security_t files..- Allow abrt_dump_oops to signull all domai
- 0740: ns Allow abrt_dump_oops to read all domains state Allow abrt_dum
- 0780: p_oops to ptrace all domains.- Add interface abrt_dump_oops_domt
- 07c0: rans().- Add mountpoint dontaudit access check in rhsmcertd poli
- 0800: cy..Resolves: #1243431.- Allow samba_net_t to manage samba_var_t
- 0840: sock files..Resolves: #1252937.- Allow chrome setcap to itself.
- 0880: .Resolves: #1251996.- Allow httpd daemon to manage httpd_var_lib
- 08c0: _t lnk_files..Resolves: #1253706.- Allow chronyd exec systemctl.
- 0900: Resolves: #1243764.- Add inteface chronyd_signal Allow timemaste
- 0940: r_t send generic signals to chronyd_t..Resolves: #1243764.- Adde
- 0980: d interface fs_dontaudit_write_configfs_dirs.- Add label for ker
- 09c0: nel module dep files in /usr/lib/modules.Resolves:#916635.- Allo
- 0a00: w kernel_t domtrans to abrt_dump_oops_t.- Added to files_dontaud
- 0a40: it_write_all_mountpoints intefface new dontaudit rule, that doma
- 0a80: in included this interface dontaudit capability dac_override..-
- 0ac0: Allow systemd-networkd to send logs to systemd-journald..Resolve
- 0b00: s: #1236616.- Fix label on /var/tmp/kiprop_0.Resolves:#1220763.-
- 0b40: Allow lldpad_t to getattr tmpfs_t..Resolves: #1246220.- Label /
- 0b80: dev/shm/lldpad.* as lldapd_tmpfs_t.Resolves: #1246220.- Allow au
- 0bc0: disp client to read system state..- Allow pcp_domain to manage p
- 0c00: cp_var_lib_t lnk_files..Resolves: #1252341.- Label /var/run/xtab
- 0c40: les.* as iptables_var_run_t.Resolves: #1243403.- Add interface t
- 0c80: o read/write watchdog device.- Add labels for /dev/memory_bandwi
- 0cc0: th and /dev/vhci. Thanks ssekidde.Resolves:#1210237.- Allow apcu
- 0d00: psd_t to read /sys/devices .Resolves:#1189185.- Allow logrotate
- 0d40: to reload services..Resolves: #1242453.- Allow openhpid use libw
- 0d80: atchdog plugin. (Allow openhpid_t rw watchdog device).Resolves:
- 0dc0: #1244260.- Allow openhpid liboa_soap plugin to read generic cert
- 0e00: s..Resolves: #1244248.- Allow openhpid liboa_soap plugin to read
- 0e40: resolv.conf file..Resolves: #1244248.- Label /usr/libexec/chron
- 0e80: y-helper as chronyd_exec_t.- Allow chronyd_t to read dhcpc state
- 0ec0: ..- Allow chronyd to execute mkdir command..- Allow mdadm to acc
- 0f00: ess /dev/random and add support to create own files/dirs as mdad
- 0f40: m_tmpfs_t..Resolves:#1073314.- Allow udev, lvm and fsadm to acce
- 0f80: ss systemd-cat in /var/tmp/dracut if 'dracut -fv' is executed in
- 0fc0: MLS..- Allow admin SELinu users to communicate with kernel_t. I
- 1000: t is needed to access /run/systemd/journal/stdout if 'dracut -vf
- 1040: ' is executed. We allow it for other SELinux users..- Allow sysa
- 1080: dm to execute systemd-sysctl in the sysadm_t domain. It is neede
- 10c0: d for ifup command in MLS mode..- Add fstools_filetrans_named_co
- 1100: ntent_fsadm() and call it for named_filetrans_domain domains. We
- 1140: need to be sure that /run/blkid is created with correct labelin
- 1180: g..Resolves:#1183503.- Add support for /etc/sanlock which is wri
- 11c0: table by sanlock daemon..Resolves:#1231377.- Allow useradd add h
- 1200: omedir located in /var/lib/kdcproxy in ipa-server RPM scriplet..
- 1240: Resolves:#1243775 .- Allow snapperd to pass data (one way only)
- 1280: via pipe negotiated over dbus.Resolves:#1250550.- Allow lsmd als
- 12c0: o setuid capability. Some commands need to executed under root p
- 1300: rivs. Other commands are executed under unprivileged user..- All
- 1340: ow openhpid to use libsnmp_bc plugin (allow read snmp lib files)
- 1380: .. Resolves: #1243902.- Allow lsm_plugin_t to read sysfs, read
- 13c0: hwdata, rw to scsi_generic_device. Resolves: #1238079.- Allow l
- 1400: sm_plugin_t to rw raw_fixed_disk.. Resolves:#1238079.- Allow rh
- 1440: smcertd to send signull to unconfined_service..- Allow httpd_sue
- 1480: xec_t to read and write Apache stream sockets .Resolves: #124356
- 14c0: 9.- Allow qpid to create lnk_files in qpid_var_lib_t.Resolves: #
- 1500: 1247279.- Allow drbd to get attributes from filesystems..- Allow
- 1540: redis to read kernel parameters..Resolves: #1209518.- Allow vir
- 1580: t_qemu_ga_t domtrans to passwd_t.- Allow audisp_remote_t to star
- 15c0: t power unit files domain to allow halt system..Resolves: #11867
- 1600: 80.- Allow audisp_remote_t to read/write user domain pty..Resolv
- 1640: es: #1186780.- Label /usr/sbin/chpasswd as passwd_exec_t..- Allo
- 1680: w sysadm to administrate ldap environment and allow to bind ldap
- 16c0: port to allow to setup an LDAP server (389ds)..Resolves:#122112
- 1700: 1.- gnome_dontaudit_search_config() needs to be a part of optina
- 1740: l_policy in pegasus.te.- Allow pcp_pmcd daemon to read postfix c
- 1780: onfig files..- Allow pcp_pmcd daemon to search postfix spool dir
- 17c0: s..Resolves: #1213740.- Added Booleans: pcp_read_generic_logs..R
- 1800: esolves: #1213740.- Allow drbd to read configuration options use
- 1840: d when loading modules..Resolves: #1134883.- Allow glusterd to m
- 1880: anage nfsd and rpcd services..- Allow glusterd to communicate wi
- 18c0: th cluster domains over stream socket..- glusterd call pcs utili
- 1900: ty which calls find for cib.* files and runs pstree under gluste
- 1940: rd. Dontaudit access to security files and update gluster boolea
- 1980: n to reflect these changes..- Allow glusterd to manage nfsd and
- 19c0: rpcd services..- Allow networkmanager to communicate via dbus w
- 1a00: ith systemd_hostanmed. .Resolves: #1234954.- Allow stream connec
- 1a40: t logrotate to prosody..- Add prosody_stream_connect() interface
- 1a80: ..- httpd should be able to send signal/signull to httpd_suexec
- 1ac0: _t, instead of httpd_suexec_exec_t..- Allow prosody to create ow
- 1b00: n tmp files/dirs..Resolves:#1212498.- Allow networkmanager read
- 1b40: rfcomm port..Resolves:#1212498.- Remove non exists label..- Fix
- 1b80: *_admin intefaces where body is not consistent with header..- La
- 1bc0: bel /usr/afs/ as afs_files_t, Allow afs_bosserver_t create afs_c
- 1c00: onfig_t and afs_dbdir_t dirs under afs_files_t, Allow afs_bosser
- 1c40: ver_t read kerberos config.- Remove non exits nfsd_ro_t label..-
- 1c80: Make all interfaces related to openshift_cache_t as deprecated.
- 1cc0: .- Add rpm_var_run_t label to rpm_admin header.- Add jabberd_loc
- 1d00: k_t label to jabberd_admin header..- Add samba_unconfined_script
- 1d40: _exec_t to samba_admin header..- inn daemon should create innd_l
- 1d80: og_t objects in var_log_t instead of innd_var_run_t.- Fix ctdb p
- 1dc0: olicy.- Add samba_signull_winbind().- Add samba_signull_unconfin
- 1e00: ed_net().- Allow ctdbd_t send signull to samba_unconfined_net_t.
- 1e40: .- Allow openshift_initrc_t to communicate with firewalld over d
- 1e80: bus .Resolves:#1221326.- Allow gluster to connect to all ports.
- 1ec0: It is required by random services executed by gluster..- Add int
- 1f00: erfaces winbind_signull(), samba_unconfined_net_signull()..- Don
- 1f40: taudit smbd_t block_suspend capability. This is kernel bug..- Al
- 1f80: low ctdbd sending signull to process winbind, samba_unconfined_n
- 1fc0: et, to. checking if processes exists..- Add tmpreaper boolean
- 2000: s to use nfs_t and samba_share_t..- Fix path from /usr/sbin/redi
- 2040: s-server to /usr/bin/redis-server.- Allow connect ypserv to port
- 2080: map_port_t.- Fix paths in inn policy, Allow innd read innd_log_t
- 20c0: dirs, Allow innd execute innd_etc_t files.- Add support for ope
- 2100: nstack-nova-* packages.- Allow NetworkManager_t send signull to
- 2140: dnssec_trigger_t..- Allow glusterd to execute showmount in the s
- 2180: howmount domain..- Label swift-container-reconciler binary as sw
- 21c0: ift_t..- Allow dnssec_trigger_t relabelfrom dnssec_trigger_var_r
- 2200: un_t files..- Add cobbler_var_lib_t to "/var/lib/tftpboot/boot(/
- 2240: .*)?".Resolves:#1213540.- Merge all nova_* labels under one nova
- 2280: _t..- Add logging_syslogd_run_nagios_plugins boolean for rsyslog
- 22c0: to allow transition to nagios unconfined plugins.Resolves:#1233
- 2300: 550.- Allow dnssec_trigger_t create dnssec_trigger_tmp_t files i
- 2340: n /var/tmp/.- Add support for oddjob based helper in FreeIPA..-
- 2380: Add new boolean - httpd_run_ipa to allow httpd process to run IP
- 23c0: A helper and dbus chat with oddjob..- Add nagios_domtrans_unconf
- 2400: ined_plugins() interface..- Update mta_filetrans_named_content()
- 2440: interface to cover more db files. .Resolves:#1167468.- Add back
- 2480: ftpd_use_passive_mode boolean with fixed description..- Allow p
- 24c0: mcd daemon stream connect to mysqld..- Allow pcp domains to conn
- 2500: ect to own process using unix_stream_socket. .Resolves:#1213709.
- 2540: - Allow abrt-upload-watch service to dbus chat with ABRT daemon
- 2580: and fsetid capability to allow run reporter-upload correctly..-
- 25c0: Add new boolean - httpd_run_ipa to allow httpd process to run I
- 2600: PA helper and dbus chat with oddjob..- Add support for oddjob ba
- 2640: sed helper in FreeIPA..- Allow dnssec_trigger_t create dnssec_tr
- 2680: igger_tmp_t files in /var/tmp/.- Allow iptables to read ctdbd li
- 26c0: b files..Resolves:#1224879.- Add systemd_networkd_t to nsswitch
- 2700: domains..- Allow drbd_t write to fixed_disk_device. Reason: drbd
- 2740: meta needs write to fixed_disk_device during initialization. .Re
- 2780: solves:#1130675.- Allow NetworkManager write to sysfs. .- Fix cr
- 27c0: on_system_cronjob_use_shares boolean to call fs interfaces which
- 2800: contain only entrypoint permission..- Add cron_system_cronjob_u
- 2840: se_shares boolean to allow system cronjob to be executed from sh
- 2880: ares - NFS, CIFS, FUSE. It requires "entrypoint" permissios on n
- 28c0: fs_t, cifs_t and fusefs_t SELinux types..- Allow NetworkManager
- 2900: write to sysfs. .- Allow ctdb_t sending signull to smbd_t, for c
- 2940: hecking if smbd process exists. .- Dontaudit apache to manage sn
- 2980: mpd_var_lib_t files/dirs. .- Add interface snmp_dontaudit_manage
- 29c0: _snmp_var_lib_files()..- Dontaudit mozilla_plugin_t cap. sys_ptr
- 2a00: ace. .- Rename xodbc-connect port to xodbc_connect.- Allow ovsdb
- 2a40: -server to connect on xodbc-connect and ovsdb tcp ports. .- Allo
- 2a80: w iscsid write to fifo file kdumpctl_tmp_t. Appears when kdump g
- 2ac0: enerates the initramfs during the kernel boot. .- Dontaudit chro
- 2b00: me to read passwd file. .- nrpe needs kill capability to make gl
- 2b40: uster moniterd nodes working. .Resolves:#1235587.- We allow can_
- 2b80: exec() on ssh_keygen on gluster. But there is a transition defin
- 2bc0: ed by init_initrc_domain() because we need to allow execute unco
- 2c00: nfined services by glusterd. So ssh-keygen ends up with ssh_keyg
- 2c40: en_t and we need to allow to manage /var/lib/glusterd/geo-replic
- 2c80: ation/secret.pem..- Allow sshd to execute gnome-keyring if there
- 2cc0: is configured pam_gnome_keyring.so..- Allow gnome-keyring execu
- 2d00: ted by passwd to access /run/user/UID/keyring to change a passwo
- 2d40: rd. .- Label gluster python hooks also as bin_t..- Allow gluster
- 2d80: d to interact with gluster tools running in a user domain.- Add
- 2dc0: glusterd_manage_lib_files() interface..- ntop reads /var/lib/nto
- 2e00: p/macPrefix.db and it needs dac_override. It has setuid/setgid.
- 2e40: .- Allow samba_t net_admin capability to make CIFS mount working
- 2e80: ..- S30samba-start gluster hooks wants to search audit logs. Don
- 2ec0: taudit it..Resolves:#1224879.- Allow glusterd to send generic si
- 2f00: gnals to systemd_passwd_agent processes..- Allow glusterd to acc
- 2f40: ess init scripts/units without defined policy.- Allow glusterd t
- 2f80: o run init scripts..- Allow glusterd to execute /usr/sbin/xfs_db
- 2fc0: in glusterd_t domain..Resolves:#1224879.- Calling cron_system_en
- 3000: try() in pcp_domain_template needs to be a part of optional_poli
- 3040: cy block..- Allow samba-net to access /var/lib/ctdbd dirs/files.
- 3080: .- Allow glusterd to send a signal to smbd..- Make ctdbd as home
- 30c0: manager to access also FUSE..- Allow glusterd to use geo-replic
- 3100: ation gluster tool..- Allow glusterd to execute ssh-keygen..- Al
- 3140: low glusterd to interact with cluster services..- Allow glusterd
- 3180: to connect to the system DBUS for service (acquire_svc)..- Labe
- 31c0: l /dev/log correctly..Resolves:#1230932.- Back port the latest F
- 3200: 22 changes to RHEL7. It should fix most of RHEL7.2 bugs.- Add cg
- 3240: dcbxd policy .Resolves:#1072493.- Fix ftp_homedir boolean.Resolv
- 3280: e:#1097775.- Dontaudit ifconfig writing inhertited /var/log/plut
- 32c0: o.log..- Allow cluster domain to dbus chat with systemd-logind..
- 3300: Resolves:#1145215.- Dontaudit write access to inherited kdumpctl
- 3340: tmp files.Resolves:#1156442.- Allow isnsd_t to communicate with
- 3380: sssd.Resolves:#1167702.- Allow rwho_t to communicate with sssd.
- 33c0: Resolves:#1167718.- Allow sblim_gatherd_t to communicate with ss
- 3400: sd.Resolves:#1167732.- Allow pkcs_slotd_t to communicate with ss
- 3440: sd.Resolves:#1167737.- Allow openvswitch_t to communicate with s
- 3480: ssd.Resolves:#1167816.- Allow mysqld_safe_t to communicate with
- 34c0: sssd.Resolves:#1167832.- Allow sshd_keygen_t to communicate with
- 3500: sssd.Resolves:#1167840.- Add support for iprdbg logging files i
- 3540: n /var/log..Resolves:#1174363.- Allow tmpreaper_t to manage ntp
- 3580: log content.Resolves:#1176965.- Allow gssd_t to manage ssh keyri
- 35c0: ng.Resolves:#1184791.- Allow httpd_sys_script_t to send system l
- 3600: og messages.Resolves:#1185231.- Allow apcupsd_t to read /sys/dev
- 3640: ices.Resolves:#1189185.- Allow dovecot_t sys_resource capability
- 3680: .Resolves:#1191143.- Add support for mongod/mongos systemd unit
- 36c0: files..Resolves:#1197038.- Add bacula fixes.- Added label mysqld
- 3700: _etc_t for /etc/my.cnf.d/ dir..Resolves:#1203991.- Label /usr/li
- 3740: bexec/postgresql-ctl as postgresql_exec_t. .- Add more restricti
- 3780: on on entrypoint for unconfined domains..- Only allow semanage_t
- 37c0: to be able to setenforce 0, no all domains that use selinux_sem
- 3800: anage interface.- Allow all domains to read /dev/urandom. It is
- 3840: needed by all apps/services linked to libgcrypt. There is no har
- 3880: m to allow it by default..- Update policy/mls for sockets relate
- 38c0: d to access perm. Rules were contradictory..- Add nagios_run_pnp
- 3900: 4nagios and nagios_run_sudo booleans to allow r.un sudo from NRP
- 3940: E utils scripts and allow run nagios in conjunction w.ith PNP4Na
- 3980: gios..Resolves:#1201054.- Don't use deprecated userdom_manage_tm
- 39c0: pfs_role() interface calliing and use userdom_manage_tmp_role()
- 3a00: instead..- Update virt_read_pid_files() interface to allow read
- 3a40: also symlinks with virt_var_run_t type.- Label /var/lib/tftpboot
- 3a80: /aarch64(/.*)? and /var/lib/tftpboot/images2(/.*)?.- Add support
- 3ac0: for iprdbg logging files in /var/log..- Add fixes to rhsmcertd_
- 3b00: t.- Allow puppetagent_t to transfer firewalld messages over dbus
- 3b40: .- Add support for /usr/libexec/mongodb-scl-helper RHSCL helper
- 3b80: script..- Added label mysqld_etc_t for /etc/my.cnf.d/ dir..- Add
- 3bc0: support for mongod/mongos systemd unit files..- cloudinit and r
- 3c00: hsmcertd need to communicate with dbus.- Allow dovecot_t sys_res
- 3c40: ource capability.- ALlow mongod execmem by default..- Update pol
- 3c80: icy/mls for sockets. Rules were contradictory..Resolves:#1207133
- 3cc0: .- Allow a user to login with different security level via ssh..
- 3d00: - Update seutil_manage_config() interface..Resolves:#1185962.- A
- 3d40: llow pki-tomcat relabel pki_tomcat_etc_rw_t..- Turn on docker_tr
- 3d80: ansition_unconfined by default.- Allow virtd to list all mountpo
- 3dc0: ints..Resolves:#1180713.- pkcsslotd_lock_t should be an alias fo
- 3e00: r pkcs_slotd_lock_t..- Allow fowner capability for sssd because
- 3e40: of selinux_child handling..- ALlow bind to read/write inherited
- 3e80: ipsec pipes.- Allow hypervkvp to read /dev/urandom and read add
- 3ec0: ition states/config files..- Allow gluster rpm scripletto create
- 3f00: glusterd socket with correct labeling. This is a workaround unt
- 3f40: il we get fix in glusterd..- Add glusterd_filetrans_named_pid()
- 3f80: interface.- Allow radiusd to connect to radsec ports..- Allow se
- 3fc0: tuid/setgid for selinux_child.- Allow lsmd plugin to connect to
- 13:00:16.832536 <= Recv data, 16384 bytes (0x4000)
- 0000: tcp/5988 by default..- Allow lsmd plugin to connect to tcp/5989
- 0040: by default..- Update ipsec_manage_pid() interface..Resolves:#118
- 0080: 4978.- Update ipsec_manage_pid() interface..Resolves:#1184978.-
- 00c0: Allow ntlm_auth running in winbind_helper_t to access /dev/urand
- 0100: om..- Add auditing support for ipsec..Resolves:#1182524.- Label
- 0140: /ostree/deploy/rhel-atomic-host/deploy directory as system_conf_
- 0180: t.- Allow netutils chown capability to make tcpdump working with
- 01c0: -w.- Allow ipsec to execute _updown.netkey script to run unboun
- 0200: d-control..- Allow neutron to read rpm DB..- Add additional fixe
- 0240: s for hyperkvp. * creates new ifcfg-{name} file. * Runs hv_set_i
- 0280: fconfig.sh, which does the following. * Copies ifcfg-{name} to /
- 02c0: etc/sysconfig/network-scripts.- Allow svirt to read symbolic lin
- 0300: ks in /sys/fs/cgroups labeled as tmpfs_t.- Add labeling for pace
- 0340: maker.log..- Allow radius to connect/bind radsec ports..- Allow
- 0380: pm-suspend running as virt_qemu_ga to read /var/log/pm-suspend.l
- 03c0: og.- Allow virt_qemu_ga to dbus chat with rpm..- Update virt_re
- 0400: ad_content() interface to allow read also char devices..- Allow
- 0440: glance-registry to connect to keystone port..Resolves:#1181818.-
- 0480: Allow sssd to send dbus all user domains..Resolves:#1172291.- A
- 04c0: llow lsm plugin to read certificates..- Fix labeling for keyston
- 0500: e CGI scripts..- Make snapperd back as unconfined domain..- Fix
- 0540: bugs in interfaces discovered by sepolicy..- Allow slapd to read
- 0580: /usr/share/cracklib/pw_dict.hwm..- Allow lsm plugins to connect
- 05c0: to tcp/18700 by default..- Allow brltty mknod capability to all
- 0600: ow create /var/run/brltty/vcsa..- Fix pcp_domain_template() inte
- 0640: rface..- Fix conman.te..- Allow mon_fsstatd to read /proc/sys/fs
- 0680: /binfmt_misc.- Allow glance-scrubber to connect tcp/9191..- Add
- 06c0: missing setuid capability for sblim-sfcbd..- Allow pegasus ioctl
- 0700: () on providers..- Add conman_can_network..- Allow chronyd to re
- 0740: ad chrony conf files located in /run/timemaster/..- Allow radius
- 0780: to bind on tcp/1813 port..- dontaudit block suspend access for
- 07c0: openvpn_t .- Allow conman to create files/dirs in /tmp..- Update
- 0800: xserver_rw_xdm_keys() interface to have 'setattr'..Resolves:#11
- 0840: 72291 .- Allow sulogin to read /dev/urandom and /dev/random..- U
- 0880: pdate radius port definition to have also tcp/18121.- Label pran
- 08c0: dom as random_device_t..- Allow charon to manage files in /etc/s
- 0900: trongimcv labeled as ipsec_conf_t..- Allow virt_qemu_ga_t to exe
- 0940: cute kmod..- Add missing files_dontaudit_list_security_dirs() fo
- 0980: r smbd_t in samba_export_all_ro boolean..- Add additionnal MLS a
- 09c0: ttribute for oddjob_mkhomedir to create homedirs..Resolves:#1113
- 0a00: 725.- Enable OpenStack cinder policy.- Add support for /usr/shar
- 0a40: e/vdsm/daemonAdapter.- Add support for /var/run/gluster.- Remove
- 0a80: old pkcsslotd.pp from minimum package.- Allow rlogind to use al
- 0ac0: so rlogin ports..- Add support for /usr/libexec/ntpdate-wrapper.
- 0b00: Label it as ntpdate_exec_t..- Allow bacula to connect also to p
- 0b40: ostgresql..- Label /usr/libexec/tomcat/server as tomcat_exec_t.-
- 0b80: Add support for /usr/sbin/ctdbd_wrapper.- Add support for /usr/
- 0bc0: libexec/ppc64-diag/rtas_errd.- Allow rpm_script_roles to access
- 0c00: system_mail_t.- Allow brltty to create /var/run/brltty.- Allow l
- 0c40: smd plugin to access netlink_route_socket.- Allow smbcontrol to
- 0c80: read passwd.- Add support for /usr/libexec/sssd/selinux_child an
- 0cc0: d create sssd_selinux_manager_t domain for it.Resolves:#1140106.
- 0d00: - Allow osad to execute rhn_check.- Allow load_policy to rw inhe
- 0d40: rited sssd pipes because of selinux_child.- Allow admin SELinux
- 0d80: users mounting / as private within a new mount namespace as root
- 0dc0: in MLS.- Add additional fixes for su_restricted_domain_template
- 0e00: to make moving to sysadm_r and trying to su working correctly.-
- 0e40: Add additional booleans substitions.- Add seutil_dontaudit_acce
- 0e80: ss_check_semanage_module_store() interface.Resolves:#1140106.- U
- 0ec0: pdate to have all _systemctl() interface also init_reload_servic
- 0f00: es()..- Dontaudit access check on SELinux module store for sssd.
- 0f40: .- Add labeling for /sbin/iw..- Allow named_filetrans_domain to
- 0f80: create ibus directory with correct labeling..- Allow radius to b
- 0fc0: ind tcp/1812 radius port..- Dontaudit list user_tmp files for sy
- 1000: stem_mail_t..- Label virt-who as virtd_exec_t..- Allow rhsmcertd
- 1040: to send a null signal to virt-who running as virtd_t..- Add mis
- 1080: sing alias for _content_rw_t..Resolves:#1089177.- Allow spamd to
- 10c0: access razor-agent.log..- Add fixes for sfcb from libvirt-cim T
- 1100: estOnly bug..- Allow NetworkManager stream connect on openvpn..-
- 1140: Make /usr/bin/vncserver running as unconfined_service_t..- gett
- 1180: y_t should be ranged in MLS. Then also local_login_t runs as ran
- 11c0: ged domain..- Label /etc/docker/certs.d as cert_t..- Label /etc/
- 1200: strongimcv as ipsec_conf_file_t..- Add support for /usr/bin/star
- 1240: t-puppet-ca helper script.Resolves:#1160727.- Allow rpm scripts
- 1280: to enable/disable transient systemd units..Resolves:#1154613 .-
- 12c0: Make kpropdas nsswitch domain.Resolves:#1153561.- Make all glanc
- 1300: e domain as nsswitch domains.Resolves:#1113281.- Allow selinux_c
- 1340: hild running as sssd access check on /etc/selinux/targeted/modul
- 1380: es/active.- Allow access checks on setfiles/load_policy/semanage
- 13c0: _lock for selinux_child running as sssd_t.Resolves:#1140106.- Do
- 1400: ntaudit access check on setfiles/load_policy for sssd_t..Resolve
- 1440: s:#1140106.- Add kdump_rw_inherited_kdumpctl_tmp_pipes().Resolve
- 1480: s:#1156442.- Make linuxptp services as unconfined..- Added new p
- 14c0: olicy linuxptp..Resolves:#1149693.- Label keystone cgi files as
- 1500: keystone_cgi_script_exec_t..Resolves:#1138424.- Make tuned as un
- 1540: confined domain.- Allow guest to connect to libvirt using unix_s
- 1580: tream_socket..- Allow all bus client domains to dbus chat with u
- 15c0: nconfined_service_t..- Allow inetd service without own policy to
- 1600: run in inetd_child_t which is unconfined domain..- Make opensm
- 1640: as nsswitch domain to make it working with sssd..- Allow brctl t
- 1680: o read meminfo..- Allow winbind-helper to execute ntlm_auth in t
- 16c0: he caller domain..Resolves:#1160339.- Make plymouthd as nsswitch
- 1700: domain to make it working with sssd..Resolves:#1160196.- Make d
- 1740: rbd as nsswitch domain to make it working with sssd..- Make conm
- 1780: an as nsswitch domain to make ipmitool.exp runing as conman_t wo
- 17c0: rking..- Add support for /var/lib/sntp directory..- Add fixes to
- 1800: allow docker to create more content in tmpfs ,and donaudit read
- 1840: ing /proc.- Allow winbind to read usermodehelper.- Allow telepat
- 1880: hy domains to execute shells and bin_t.- Allow gpgdomains to cre
- 18c0: ate netlink_kobject_uevent_sockets.- Allow mongodb to bind to th
- 1900: e mongo port and mongos to run as mongod_t.- Allow abrt to read
- 1940: software raid state..- Allow nslcd to execute netstat..- Allow d
- 1980: ovecot to create user's home directory when they log into IMAP..
- 19c0: - Allow login domains to create kernel keyring with different le
- 1a00: vel..- Allow modemmanger to connectto itself.Resolves:#1120152 .
- 1a40: - Allow pki_tomcat to create link files in /var/lib/pki-ca..Reso
- 1a80: lves:#1121744 .- varnishd needs to have fsetid capability.Resolv
- 1ac0: es:#1125165.- Allow snapperd to dbus chat with system cron jobs.
- 1b00: .Resolves:#1152447.- Allow dovecot to create user's home directo
- 1b40: ry when they log into IMAP .Resolves:#1152773 .- Add labeling
- 1b80: for /usr/sbin/haproxy-systemd-wrapper wrapper to make haproxy ru
- 1bc0: nning haproxy_t..- ALlow listen and accept on tcp socket for ini
- 1c00: t_t in MLS. Previously it was for xinetd_t. .- Allow nslcd to ex
- 1c40: ecute netstat..- Add suppor for keepalived unconfined scripts an
- 1c80: d allow keepalived to read all domain state and kill capability.
- 1cc0: .- Allow nslcd to read /dev/urandom..- Add back kill permisiion
- 1d00: for system class.Resolves:#1150011.- Add back kill permisiion fo
- 1d40: r service class.Resolves:#1150011.- Make rhsmcertd_t also as dbu
- 1d80: s domain..- Allow named to create DNS_25 with correct labeling..
- 1dc0: - Add cloudform_dontaudit_write_cloud_log().- Call auth_use_nssw
- 1e00: itch to apache to read/write cloud-init keys..- Allow cloud-init
- 1e40: to dbus chat with certmonger..- Fix path to mon_statd_initrc_t
- 1e80: script..- Allow all RHCS services to read system state..- Allow
- 1ec0: dnssec_trigger_t to execute unbound-control in own domain..- ker
- 1f00: nel_read_system_state needs to be called with type. Moved it to
- 1f40: antivirus.if..- Added policy for mon_statd and mon_procd service
- 1f80: s. BZ (1077821).- Allow opensm_t to read/write /dev/infiniband/u
- 1fc0: mad1..- Allow mongodb to manage own log files..- Allow neutron c
- 2000: onnections to system dbus..- Add support for /var/lib/swiftdirec
- 2040: tory..- Allow nova-scheduler to read certs..- Allow openvpn to a
- 2080: ccess /sys/fs/cgroup dir..- Allow openvpn to execute systemd-pa
- 20c0: sswd-agent in systemd_passwd_agent_t to make openvpn working wi
- 2100: th systemd..- Fix samba_export_all_ro/samba_export_all_rw boolea
- 2140: ns to dontaudit search/read security files..- Add auth_use_nsswi
- 2180: tch for portreserve to make it working with sssd..- automount po
- 21c0: licy is non-base module so it needs to be called in optional blo
- 2200: ck..- ALlow sensord to getattr on sysfs..- Label /usr/share/coro
- 2240: sync/corosync as cluster_exec_t..- Allow lmsd_plugin to read pas
- 2280: swd file. BZ(1093733).- Allow read antivirus domain all kernel s
- 22c0: ysctls..- Allow mandb to getattr on file systems.- Allow nova-co
- 2300: nsole to connect to mem_cache port..- Make sosreport as unconfin
- 2340: ed domain..- Allow mondogdb to 'accept' accesses on the tcp_soc
- 2380: ket port..- ALlow sanlock to send a signal to virtd_t..- Build a
- 23c0: lso MLS policy.Resolves:#1138424.- Add back kill permisiion for
- 2400: system class.- Allow iptables read fail2ban logs..- Fix radius l
- 2440: abeled ports.- Add userdom_manage_user_tmpfs_files interface.- A
- 2480: llow libreswan to connect to VPN via NM-libreswan..- Label 4101
- 24c0: tcp port as brlp port.- fix dev_getattr_generic_usb_dev interfac
- 2500: e.- Allow all domains to read fonts.- Make sure /run/systemd/gen
- 2540: erator and system is labeled correctly on creation..- Dontaudit
- 2580: aicuu to search home config dir. .- Make keystone_cgi_script_t d
- 25c0: omain. .Resolves:#1138424.- Fix bug in drbd policy, .- Added sup
- 2600: port for cpuplug. .- ALlow sanlock_t to read sysfs_t..- Added se
- 2640: ndmail_domtrans_unconfined interface.- Fix broken interfaces.- r
- 2680: adiusd wants to write own log files..- Label /usr/libexec/rhsmd
- 26c0: as rhsmcertd_exec_t.- Allow rhsmcertd send signull to setroubles
- 2700: hoot. .- Allow rhsmcertd manage rpm db. .- Added policy for blrt
- 2740: ty. .- Fix keepalived policy.- Allow rhev-agentd dbus chat with
- 2780: systemd-logind..- Allow keepalived manage snmp var lib sock file
- 27c0: s..- Add support for /var/lib/graphite-web.- Allow NetworkManage
- 2800: r to create Bluetooth SDP sockets.- It's going to do the the dis
- 2840: covery for DUN service for modems with Bluez 5..- Allow swift to
- 2880: connect to all ephemeral ports by default..- Allow sssd to read
- 28c0: selinux config to add SELinux user mapping..- Allow lsmd to sea
- 2900: rch own plguins..- Allow abrt to read /dev/memto generate an uni
- 2940: que machine_id and uses sosuploader's algorithm based off dmide
- 2980: code[1] fields..- ALlow zebra for user/group look-ups..- Allow n
- 29c0: ova domains to getattr on all filesystems..- Allow collectd sys_
- 2a00: ptrace and dac_override caps because of reading of /proc/%i/io f
- 2a40: or several processes..- Allow pppd to connect to /run/sstpc/sstp
- 2a80: c-nm-sstp-service-28025 over unix stream socket..- Allow rhnsd_t
- 2ac0: to manage also rhnsd config symlinks..- ALlow user mail domains
- 2b00: to create dead.letter..- Allow rabbitmq_t read rabbitmq_var_lib
- 2b40: _t lnk files. .- Allow pki-tomcat to change SELinux object ident
- 2b80: ity..- Allow radious to connect to apache ports to do OCSP check
- 2bc0: .- Allow git cgi scripts to create content in /tmp.- Allow cockp
- 2c00: it-session to do GSSAPI logins..- Allow sensord read in /proc .-
- 2c40: Additional access required by usbmuxd.- Allow locate to look at
- 2c80: files/directories without labels, and chr_file and blk_file on
- 2cc0: non dev file systems.- Label /usr/lib/erlang/erts.*/bin files as
- 2d00: bin_t.- Add files_dontaudit_access_check_home_dir() inteface..-
- 2d40: Allow udev_t mounton udev_var_run_t dirs #(1128618).- Add syste
- 2d80: md_networkd_var_run_t labeling for /var/run/systemd/netif and al
- 2dc0: low systemd-networkd to manage it..- Add init_dontaudit_read_sta
- 2e00: te() interface..- Add label for ~/.local/share/fonts.- Allow unc
- 2e40: onfined_r to access unconfined_service_t..- Allow init to read a
- 2e80: ll config files.- Add new interface to allow creation of file wi
- 2ec0: th lib_t type.- Assign rabbitmq port..- Allow unconfined_service
- 2f00: _t to dbus chat with all dbus domains.- Add new interfaces to ac
- 2f40: cess users keys..- Allow domains to are allowed to mounton proc
- 2f80: to mount on files as well as dirs.- Fix labeling for HOME_DIR/tm
- 2fc0: p and HOME_DIR/.tmp directories..- Add a port definition for she
- 3000: llinaboxd.- Label ~/tmp and ~/.tmp directories in user tmp dirs
- 3040: as user_tmp_t.- Allow userdomains to stream connect to pcscd for
- 3080: smart cards.- Allow programs to use pam to search through user_
- 30c0: tmp_t dires (/tmp/.X11-unix).- Update to rawhide-contrib changes
- 3100: .Resolves:#1123844.- Rebase to 3.13.1 which we have in Fedora21.
- 3140: Resolves:#1128284.- Back port fixes from Fedora. Mainly OpenStac
- 3180: k and Docker fixes.- Add policy-rhel-7.1-{base,contrib} patches.
- 31c0: - Add support for us_cli ports.- Fix labeling for /var/run/user/
- 3200: <UID>/gvfs.- add support for tcp/9697.- Additional rules require
- 3240: d by openstack, needs backport to F20 and RHEL7.- Additional ac
- 3280: cess required by docker.- ALlow motion to use tcp/8082 port.- Al
- 32c0: low init_t to setattr/relabelfrom dhcp state files.- Dontaudit a
- 3300: ntivirus domains read access on all security files by default.-
- 3340: Add missing alias for old amavis_etc_t type.- Allow block_suspen
- 3380: d cap for haproxy.- Additional fixes for instack overcloud.- Al
- 33c0: low OpenStack to read mysqld_db links and connect to MySQL.- Rem
- 3400: ove dup filename rules in gnome.te.- Allow sys_chroot cap for ht
- 3440: tpd_t and setattr on httpd_log_t.- Allow iscsid to handle own un
- 3480: it files.- Add iscsi_systemctl().- Allow mongod to create also s
- 34c0: ock_files in /run with correct labeling.- Allow httpd to send si
- 3500: gnull to apache script domains and don't audit leaks.- Allow rab
- 3540: bitmq_beam to connect to httpd port.- Allow aiccu stream connect
- 3580: to pcscd.- Allow dmesg to read hwdata and memory dev.- Allow al
- 35c0: l freeipmi domains to read/write ipmi devices.- Allow sblim_sfcb
- 3600: d to use also pegasus-https port.- Allow rabbitmq_epmd to manage
- 3640: rabbit_var_log_t files.- Allow chronyd to read /sys/class/hwmon
- 3680: /hwmon1/device/temp2_input.- Allow docker to status any unit fil
- 36c0: e and allow it to start generic unit files.- Change hsperfdata_r
- 3700: oot to have as user_tmp_t.Resolves:#1076523.- Fix Multiple same
- 3740: specifications for /var/named/chroot/dev/zero.- Add labels for /
- 3780: var/named/chroot_sdb/dev devices.- Add support for strongimcv.-
- 37c0: Use kerberos_keytab_domains in auth_use_nsswitch.- Update auth_u
- 3800: se_nsswitch to make all these types as kerberos_keytab_domain to
- 3840: .- Allow net_raw cap for neutron_t and send sigkill to dnsmasq.-
- 3880: Fix ntp_filetrans_named_content for sntp-kod file.- Add httpd_d
- 38c0: bus_sssd boolean.- Dontaudit exec insmod in boinc policy.- Renam
- 3900: e kerberos_keytab_domain to kerberos_keytab_domains.- Add kerber
- 3940: os_keytab_domain().- Fix kerberos_keytab_template().- Make all d
- 3980: omains which use kerberos as kerberos_keytab_domain.Resolves:#10
- 39c0: 83670.- Allow kill capability to winbind_t.- varnishd wants chow
- 3a00: n capability.- update ntp_filetrans_named_content() interface.-
- 3a40: Add additional fixes for neutron_t. #1083335.- Dontaudit getattr
- 3a80: on proc_kcore_t.- Allow pki_tomcat_t to read ipa lib files.- Al
- 3ac0: low named_filetrans_domain to create /var/cache/ibus with correc
- 3b00: t labelign.- Allow init_t run /sbin/augenrules.- Add dev_unmount
- 3b40: _sysfs_fs and sysnet_manage_ifconfig_run interfaces.- Allow unpr
- 3b80: iv SELinux user to use sandbox.- Add default label for /tmp/hspe
- 3bc0: rfdata_root.- Add file subs also for /var/home.- Allow xauth_t t
- 3c00: o read user_home_dir_t lnk_file.- Add labeling for lightdm-data.
- 3c40: - Allow certmonger to manage ipa lib files.- Add support for /va
- 3c80: r/lib/ipa.- Allow pegasus to getattr virt_content.- Added some n
- 3cc0: ew rules to pcp policy.- Allow chrome_sandbox to execute config_
- 3d00: home_t.- Add support for ABRT FAF.- Allow kdm to send signull to
- 3d40: remote_login_t process.- Add gear policy.- Turn on gear_port_t.
- 3d80: - Allow cgit to read gitosis lib files by default.- Allow vdagen
- 3dc0: t to read xdm state.- Allow NM and fcoeadm to talk together over
- 3e00: unix_dgram_socket.- Back port fixes for pegasus_openlmi_admin_t
- 3e40: from rawhide.Resolves:#1080973.- Add labels for ostree.- Add SE
- 3e80: Linux awareness for NM.- Label /usr/sbin/pwhistory_helper as upd
- 3ec0: pwd_exec_t.- add gnome_append_home_config().- Allow thumb to app
- 3f00: end GNOME config home files.- Allow rasdaemon to rw /dev/cpu//ms
- 3f40: r.- fix /var/log/pki file spec.- make bacula_t as auth_nsswitch
- 3f80: domain.- Identify pki_tomcat_cert_t as a cert_type.- Define spee
- 3fc0: ch-dispater_exec_t as an application executable.- Add a new file
- 13:00:16.839477 <= Recv data, 16384 bytes (0x4000)
- 0000: context for /var/named/chroot/run directory.- update storage_fi
- 0040: letrans_all_named_dev for sg* devices.- Allow auditctl_t to get
- 0080: attr on all removeable devices.- Allow nsswitch_domains to strea
- 00c0: m connect to nmbd.- Allow unprivusers to connect to memcached.-
- 0100: label /var/lib/dirsrv/scripts-INSTANCE as bin_t.- Allow also unp
- 0140: riv user to run vmtools.- Allow secadm to read /dev/urandom and
- 0180: meminfo.Resolves:#1079250.- Add booleans to allow docker process
- 01c0: es to use nfs and samba.- Add mdadm_tmpfs support.- Dontaudit ne
- 0200: t_amdin for /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.51-2.4.5.1.el7
- 0240: .x86_64/jre-abrt/bin/java running as pki_tomcat_t.- Allow vmware
- 0280: -user-sui to use user ttys.- Allow talk 2 users logged via conso
- 02c0: le too.- Allow ftp services to manage xferlog_t.- Make all pcp d
- 0300: omanis as unconfined for RHEL7.0 beucause of new policies.- allo
- 0340: w anaconda to dbus chat with systemd-localed.- allow anaconda to
- 0380: dbus chat with systemd-localed.- Add fixes for haproxy based on
- 03c0: bperkins@redhat.com.- Allow cmirrord to make dmsetup working.-
- 0400: Allow NM to execute arping.- Allow users to send messages throug
- 0440: h talk.- Add userdom_tmp_role for secadm_t.- Add additional fixe
- 0480: s for rtas_errd.- Fix transitions for tmp/tmpfs in rtas.te.- All
- 04c0: ow rtas_errd to readl all sysctls.- Add support for /var/spool/r
- 0500: hsm/debug.- Make virt_sandbox_use_audit as True by default.- All
- 0540: ow svirt_sandbox_domains to ptrace themselves.- Allow docker con
- 0580: tainers to manage /var/lib/docker content.- Allow docker to read
- 05c0: tmpfs_t symlinks.- Allow sandbox svirt_lxc_net_t to talk to sys
- 0600: log and to sssd over stream sockets.- Allow collectd to talk to
- 0640: libvirt.- Allow chrome_sandbox to use leaked unix_stream_sockets
- 0680: .- Dontaudit leaks of sockets into chrome_sandbox_t.- If you cre
- 06c0: ate a cups directory in /var/cache then it should be labeled cup
- 0700: s_rw_etc_t.- Run vmtools as unconfined domains.- Allow snort to
- 0740: manage its log files.- Allow systemd_cronjob_t to be entered via
- 0780: bin_t.- Allow procman to list doveconf_etc_t.- allow keyring da
- 07c0: emon to create content in tmpfs directories.- Add proper labelli
- 0800: ng for icedtea-web.- vpnc is creating content in networkmanager
- 0840: var run directory.- Label sddm as xdm_exec_t to make KDE working
- 0880: again.- Allow postgresql to read network state.- Allow java run
- 08c0: ning as pki_tomcat to read network sysctls.- Fix cgroup.te to al
- 0900: low cgred to read cgconfig_etc_t.- Allow beam.smp to use ephemer
- 0940: al ports.- Allow winbind to use the nis to authenticate password
- 0980: s.- Make rtas_errd_t as unconfined domain for F20.It needs addit
- 09c0: ional fixes. It runs rpm at least..- Allow net_admin cap for fen
- 0a00: ce_virtd running as fenced_t.- Make abrt-java-connector working
- 0a40: .- Make cimtest script 03_defineVS.py of ComputerSystem group wo
- 0a80: rking.- Fix git_system_enable_homedirs boolean.- Allow munin mai
- 0ac0: l plugins to read network systcl.- Allow vmtools_helper_t to exe
- 0b00: cute bin_t.- Add support for /usr/share/joomla.- /var/lib/contai
- 0b40: ners should be labeled as openshift content for now.- Allow dock
- 0b80: er domains to talk to the login programs, to allow a process to
- 0bc0: login into the container.- Allow install_t do dbus chat with NM.
- 0c00: - Fix interface names in anaconda.if.- Add install_t for anacond
- 0c40: a. A new type is a part of anaconda policy.- sshd to read networ
- 0c80: k sysctls.- Allow zabbix to send system log msgs.- Allow init_t
- 0cc0: to stream connect to ipsec.Resolves:#1060775.- Add docker_connec
- 0d00: t_any boolean.- Allow unpriv SELinux users to dbus chat with fir
- 0d40: ewalld.- Add lvm_write_metadata().- Label /etc/yum.reposd dir as
- 0d80: system_conf_t. Should be safe because system_conf_t is base_ro_
- 0dc0: file_type.- Allow pegasus_openlmi_storage_t to write lvm metadat
- 0e00: a.- Add hide_broken_symptoms for kdumpgui because of systemd bug
- 0e40: .- Make kdumpgui_t as unconfined domain.Resolves:#1044299.- Allo
- 0e80: w docker to connect to tcp/5000.- Allow numad to write scan_slee
- 0ec0: p_millisecs.- Turn on entropyd_use_audio boolean by default.- Al
- 0f00: low cgred to read /etc/cgconfig.conf because it contains templat
- 0f40: es used together with rules from /etc/cgrules.conf..- Allow lscp
- 0f80: u running as rhsmcertd_t to read /proc/sysinfo.- Fix label on ir
- 0fc0: clogs in the homedir.- Allow kerberos_keytab_domain domains to m
- 1000: anage keys until we get sssd fix.- Allow postgresql to use ldap.
- 1040: - Add missing syslog-conn port.- Add support for /dev/vmcp and /
- 1080: dev/sclp.Resolves:#1069310.- Modify xdm_write_home to allow crea
- 10c0: te files/links in /root with xdm_home_.- Allow virt domains to r
- 1100: ead network state.Resolves:#1072019.- Added pcp rules.- dontaudi
- 1140: t openshift_cron_t searching random directories, should be back
- 1180: ported to RHEL6.- clean up ctdb.te.- Allow ctdbd to connect own
- 11c0: ports.- Fix samba_export_all_rw booleanto cover also non securit
- 1200: y dirs.- Allow swift to exec rpm in swift_t and allow to create
- 1240: tmp files/dirs.- Allow neutron to create /run/netns with correct
- 1280: labeling.- Allow certmonger to list home dirs.- Change userdom_
- 12c0: use_user_inherited_ttys to userdom_use_user_ttys for systemd-tty
- 1300: -ask.- Add sysnet_filetrans_named_content_ifconfig() interface.-
- 1340: Allow ctdbd to connect own ports.- Fix samba_export_all_rw bool
- 1380: eanto cover also non security dirs.- Allow swift to exec rpm in
- 13c0: swift_t and allow to create tmp files/dirs.- Allow neutron to cr
- 1400: eate /run/netns with correct labeling.- Allow kerberos keytab do
- 1440: mains to manage sssd/userdomain keys".- Allow to run ip cmd in n
- 1480: eutron_t domain.- Allow block_suspend cap2 for systemd-logind an
- 14c0: d rw dri device.- Add labeling for /usr/libexec/nm-libreswan-ser
- 1500: vice.- Allow locallogin to rw xdm key to make Virtual Terminal l
- 1540: ogin providing smartcard pin working.- Add xserver_rw_xdm_keys()
- 1580: .- Allow rpm_script_t to dbus chat also with systemd-located.- F
- 15c0: ix ipa_stream_connect_otpd().- update lpd_manage_spool() interfa
- 1600: ce.- Allow krb5kdc to stream connect to ipa-otpd.- Add ipa_strea
- 1640: m_connect_otpd() interface.- Allow vpnc to unlink NM pids.- Add
- 1680: networkmanager_delete_pid_files().- Allow munin plugins to acces
- 16c0: s unconfined plugins.- update abrt_filetrans_named_content to co
- 1700: ver /var/spool/debug.- Label /var/spool/debug as abrt_var_cache_
- 1740: t.- Allow rhsmcertd to connect to squid port.- Make docker_trans
- 1780: ition_unconfined as optional boolean.- Allow certmonger to list
- 17c0: home dirs.- Make snapperd as unconfined domain and add additiona
- 1800: l fixes for it.- Remove nsplugin.pp module on upgrade.- Add snap
- 1840: perd_home_t for HOME_DIR/.snapshots directory.- Make sosreport a
- 1880: s unconfined domain.- Allow sosreport to execute grub2-probe.- A
- 18c0: llow NM to manage hostname config file.- Allow systemd_timedated
- 1900: _t to dbus chat with rpm_script_t.- Allow lsmd plugins to connec
- 1940: t to http/ssh/http_cache ports by default.- Add lsmd_plugin_conn
- 1980: ect_any boolean.- Allow mozilla_plugin to attempt to set capabil
- 19c0: ities.- Allow lsdm_plugins to use tcp_socket.- Dontaudit mozilla
- 1a00: plugin from getattr on /proc or /sys.- Dontaudit use of the key
- 1a40: ring by the services in a sandbox.- Dontaudit attempts to sys_pt
- 1a80: race caused by running ps for mysqld_safe_t.- Allow rabbitmq_bea
- 1ac0: m to connect to jabber_interserver_port.- Allow logwatch_mail_t
- 1b00: to transition to qmail_inject and queueu.- Added new rules to pc
- 1b40: p policy.- Allow vmtools_helper_t to change role to system_r.- A
- 1b80: llow NM to dbus chat with vmtools.- Fix couchdb_manage_files() t
- 1bc0: o allow manage couchdb conf files.- Add support for /var/run/red
- 1c00: is.sock.- dontaudit gpg trying to use audit.- Allow consolekit t
- 1c40: o create log directories and files.- Fix vmtools policy to allow
- 1c80: user roles to access vmtools_helper_t.- Allow block_suspend cap
- 1cc0: 2 for ipa-otpd.- Allow pkcsslotd to read users state.- Add ioctl
- 1d00: to init_dontaudit_rw_stream_socket.- Add systemd_hostnamed_mana
- 1d40: ge_config() interface.- Remove transition for temp dirs created
- 1d80: by init_t.- gdm-simple-slave uses use setsockopt.- sddm-greater
- 1dc0: is a xdm type program.- Add lvm_read_metadata().- Allow auditadm
- 1e00: to search /var/log/audit dir.- Add lvm_read_metadata() interfac
- 1e40: e.- Allow confined users to run vmtools helpers.- Fix userdom_co
- 1e80: mmon_user_template().- Generic systemd unit scripts do write che
- 1ec0: ck on /.- Allow init_t to create init_tmp_t in /tmp.This is for
- 1f00: temporary content created by generic unit files.- Add additional
- 1f40: fixes needed for init_t and setup script running in generic uni
- 1f80: t files.- Allow general users to create packet_sockets.- added c
- 1fc0: onnlcli port.- Add init_manage_transient_unit() interface.- Allo
- 2000: w init_t (generic unit files) to manage rpc state date as we had
- 2040: it for initrc_t.- Fix userdomain.te to require passwd class.- d
- 2080: evicekit_power sends out a signal to all processes on the messag
- 20c0: e bus when power is going down.- Dontaudit rendom domains listin
- 2100: g /proc and hittping system_map_t.- Dontauit leaks of var_t into
- 2140: ifconfig_t.- Allow domains that transition to ssh_t to manipula
- 2180: te its keyring.- Define oracleasm_t as a device node.- Change to
- 21c0: handle /root as a symbolic link for os-tree.- Allow sysadm_t to
- 2200: create packet_socket, also move some rules to attributes.- Add
- 2240: label for openvswitch port.- Remove general transition for files
- 2280: /dirs created in /etc/mail which got etc_aliases_t label..- Allo
- 22c0: w postfix_local to read .forward in pcp lib files.- Allow pegasu
- 2300: s_openlmi_storage_t to read lvm metadata.- Add additional fixes
- 2340: for pegasus_openlmi_storage_t.- Allow bumblebee to manage debugf
- 2380: s.- Make bumblebee as unconfined domain.- Allow snmp to read etc
- 23c0: _aliases_t.- Allow lscpu running in pegasus_openlmi_storage_t to
- 2400: read /dev/mem.- Allow pegasus_openlmi_storage_t to read /proc/1
- 2440: /environ.- Dontaudit read gconf files for cupsd_config_t.- make
- 2480: vmtools as unconfined domain.- Add vmtools_helper_t for helper s
- 24c0: cripts. Allow vmtools shutdonw a host and run ifconfig..- Allow
- 2500: collectd_t to use a mysql database.- Allow ipa-otpd to perform D
- 2540: NS name resolution.- Added new policy for keepalived.- Allow ope
- 2580: nlmi-service provider to manage transitient units and allow stre
- 25c0: am connect to sssd.- Add additional fixes new pscs-lite+polkit s
- 2600: upport.- Add labeling for /run/krb5kdc.- Change w3c_validator_tm
- 2640: p_t to httpd_w3c_validator_tmp_t in F20.- Allow pcscd to read us
- 2680: ers proc info.- Dontaudit smbd_t sending out random signuls.- Ad
- 26c0: d boolean to allow openshift domains to use nfs.- Allow w3c_vali
- 2700: dator to create content in /tmp.- zabbix_agent uses nsswitch.- A
- 2740: llow procmail and dovecot to work together to deliver mail.- All
- 2780: ow spamd to execute files in homedir if boolean turned on.- Allo
- 27c0: w openvswitch to listen on port 6634.- Add net_admin capability
- 2800: in collectd policy.- Fixed snapperd policy.- Fixed bugsfor pcp p
- 2840: olicy.- Allow dbus_system_domains to be started by init.- Fixed
- 2880: some interfaces.- Add kerberos_keytab_domain attribute.- Fix sna
- 28c0: pperd_conf_t def.- Addopt corenet rules for unbound-anchor to rp
- 2900: m_script_t.- Allow runuser to send send audit messages..- Allow
- 2940: postfix-local to search .forward in munin lib dirs.- Allow udisk
- 2980: s to connect to D-Bus.- Allow spamd to connect to spamd port.- F
- 29c0: ix syntax error in snapper.te.- Dontaudit osad to search gconf h
- 2a00: ome files.- Allow rhsmcertd to manage /etc/sysconf/rhn director.
- 2a40: - Fix pcp labeling to accept /usr/bin for all daemon binaries.-
- 2a80: Fix mcelog_read_log() interface.- Allow iscsid to manage iscsi l
- 2ac0: ib files.- Allow snapper domtrans to lvm_t. Add support for /etc
- 2b00: /snapper and allow snapperd to manage it..- Make tuned_t as unco
- 2b40: nfined domain for RHEL7.0.- Allow ABRT to read puppet certs.- Ad
- 2b80: d sys_time capability for virt-ga.- Allow gemu-ga to domtrans to
- 2bc0: hwclock_t.- Allow additional access for virt_qemu_ga_t processe
- 2c00: s to read system clock and send audit messages.- Fix some AVCs i
- 2c40: n pcp policy.- Add to bacula capability setgid and setuid and al
- 2c80: low to bind to bacula ports.- Changed label from rhnsd_rw_conf_t
- 2cc0: to rhnsd_conf_t.- Add access rhnsd and osad to /etc/sysconfig/r
- 2d00: hn.- drbdadm executes drbdmeta.- Fixes needed for docker.- Allow
- 2d40: epmd to manage /var/log/rabbitmq/startup_err file.- Allow beam.
- 2d80: smp connect to amqp port.- Modify xdm_write_home to allow create
- 2dc0: also links as xdm_home_t if the boolean is on true.- Allow init
- 2e00: _t to manage pluto.ctl because of init_t instead of initrc_t.- A
- 2e40: llow systemd_tmpfiles_t to manage all non security files on the
- 2e80: system.- Added labels for bacula ports.- Fix label on /dev/vfio/
- 2ec0: vfio.- Add kernel_mounton_messages() interface.- init wants to m
- 2f00: anage lock files for iscsi.- Added osad policy.- Allow postfix t
- 2f40: o deliver to procmail.- Allow bumblebee to seng kill signal to x
- 2f80: server.- Allow vmtools to execute /usr/bin/lsb_release.- Allow d
- 2fc0: ocker to write system net ctrls.- Add support for rhnsd unit fil
- 3000: e.- Add dbus_chat_session_bus() interface.- Add dbus_stream_conn
- 3040: ect_session_bus() interface.- Fix pcp.te.- Fix logrotate_use_nfs
- 3080: boolean.- Add lot of pcp fixes found in RHEL7.- fix labeling fo
- 30c0: r pmie for pcp pkg.- Change thumb_t to be allowed to chat/connec
- 3100: t with session bus type.- Allow call renice in mlocate.- Add log
- 3140: rotate_use_nfs boolean.- Allow setroubleshootd to read rpc sysct
- 3180: l.- Turn on bacula, rhnsd policy.- Add support for rhnsd unit fi
- 31c0: le.- Add dbus_chat_session_bus() interface.- Add dbus_stream_con
- 3200: nect_session_bus() interface.- Fix logrotate_use_nfs boolean.- A
- 3240: dd lot of pcp fixes found in RHEL7.- fix labeling for pmie for p
- 3280: cp pkg.- Change thumb_t to be allowed to chat/connect with sessi
- 32c0: on bus type.- Allow call renice in mlocate.- Add logrotate_use_n
- 3300: fs boolean.- Allow setroubleshootd to read rpc sysctl.- Fixes fo
- 3340: r *_admin interfaces.- Add pegasus_openlmi_storage_var_run_t typ
- 3380: e def.- Add support for /var/run/openlmi-storage.- Allow tuned t
- 33c0: o create syslog.conf with correct labeling.- Add httpd_dontaudit
- 3400: _search_dirs boolean.- Add support for winbind.service.- ALlow a
- 3440: lso fail2ban-client to read apache logs.- Allow vmtools to getat
- 3480: tr on all fs.- Add support for dey_sapi port.- Add logging_filet
- 34c0: rans_named_conf().- Allow passwd_t to use ipc_lock, so that it c
- 3500: an change the password in gnome-keyring.- Update snapper policy.
- 3540: - Allow domains to append rkhunter lib files.- Allow snapperd to
- 3580: getattr on all fs.- Allow xdm to create /var/gdm with correct l
- 35c0: abeling.- Add label for snapper.log.- Allow fail2ban-client to r
- 3600: ead apache log files.- Allow thumb_t to execute dbus-daemon in t
- 3640: humb_t.- Allow gdm to create /var/gdm with correct labeling.- Al
- 3680: low domains to append rkhunterl lib files. #1057982.- Allow syst
- 36c0: emd_tmpfiles_t net_admin to communicate with journald.- Add inte
- 3700: rface to getattr on an isid_type for any type of file.- Update l
- 3740: ibs_filetrans_named_content() to have support for /usr/lib/debug
- 3780: directory.- Allow initrc_t domtrans to authconfig if unconfined
- 37c0: is enabled.- Allow docker and mount on devpts chr_file.- Allow
- 3800: docker to transition to unconfined_t if boolean set.- init calli
- 3840: ng needs to be optional in domain.te.- Allow uncofined domain ty
- 3880: pes to handle transient unit files.- Fix labeling for vfio devic
- 38c0: es.- Allow net_admin capability and send system log msgs.- Allow
- 3900: lldpad send dgram to NM.- Add networkmanager_dgram_send().- rkh
- 3940: unter_var_lib_t is correct type.- Back port pcp policy from rawh
- 3980: ide.- Allow openlmi-storage to read removable devices.- Allow sy
- 39c0: stem cron jobs to manage rkhunter lib files.- Add rkhunter_manag
- 3a00: e_lib_files().- Fix ftpd_use_fusefs boolean to allow manage also
- 3a40: symlinks.- Allow smbcontrob block_suspend cap2.- Allow slpd to
- 3a80: read network and system state info.- Allow NM domtrans to iscsid
- 3ac0: _t if iscsiadm is executed.- Allow slapd to send a signal itself
- 3b00: .- Allow sslget running as pki_ra_t to contact port 8443, the se
- 3b40: cure port of the CA..- Fix plymouthd_create_log() interface.- Ad
- 3b80: d rkhunter policy with files type definition for /var/lib/rkhunt
- 3bc0: er until it is fixed in rkhunter package.- Add mozilla_plugin_ex
- 3c00: ec_t for /usr/lib/firefox/plugin-container.- Allow postfix and c
- 3c40: yrus-imapd to work out of box.- Allow fcoemon to talk with unpri
- 3c80: v user domain using unix_stream_socket.- Dontaudit domains that
- 3cc0: are calling into journald to net_admin.- Add rules to allow vmto
- 3d00: ols to do what it does.- snapperd is D-Bus service.- Allow OpenL
- 3d40: MI PowerManagement to call 'systemctl --force reboot'.- Add hapr
- 3d80: oxy_connect_any boolean.- Allow haproxy also to use http cache p
- 3dc0: ort by default.Resolves:#1058248.- Allow apache to write to the
- 3e00: owncloud data directory in /var/www/html....- Allow consolekit t
- 3e40: o create log dir.- Add support for icinga CGI scripts.- Add supp
- 3e80: ort for icinga.- Allow kdumpctl_t to create kdump lock file.Reso
- 3ec0: lves:#1055634.- Allow kdump to create lnk lock file.- Allow nscd
- 3f00: _t block_suspen capability.- Allow unconfined domain types to ma
- 3f40: nage own transient unit file.- Allow systemd domains to handle t
- 3f80: ransient init unit files.- Add interfaces to handle transient.-
- 3fc0: Add cron unconfined role support for uncofined SELinux user.- Ca
- 13:00:16.845992 <= Recv data, 16384 bytes (0x4000)
- 0000: ll corenet_udp_bind_all_ports() in milter.te.- Allow fence_virtd
- 0040: to connect to zented port.- Fix header for mirrormanager_admin(
- 0080: ).- Allow dkim-milter to bind udp ports.- Allow milter domains t
- 00c0: o send signull itself.- Allow block_suspend for yum running as m
- 0100: ock_t.- Allow beam.smp to manage couchdb files.- Add couchdb_man
- 0140: age_files().- Add labeling for /var/log/php_errors.log.- Allow b
- 0180: umblebee to stream connect to xserver.- Allow bumblebee to send
- 01c0: a signal to xserver.- gnome-thumbnail to stream connect to bumbl
- 0200: ebee.- Allow xkbcomp running as bumblebee_t to execute bin_t.-
- 0240: Allow logrotate to read squid.conf.- Additional rules to get doc
- 0280: ker and lxc to play well with SELinux.- Allow bumbleed to connec
- 02c0: t to xserver port.- Allow pegasus_openlmi_storage_t to read hwda
- 0300: ta.- Allow init_t to work on transitient and snapshot unit files
- 0340: .- Add logging_manage_syslog_config().- Update sysnet_dns_name_r
- 0380: esolve() to allow connect to dnssec por.- Allow pegasus_openlmi_
- 03c0: storage_t to read hwdata.Resolves:#1031721.- Fix rhcs_rw_cluster
- 0400: _tmpfs().- Allow fenced_t to bind on zented udp port.- Added pol
- 0440: icy for vmtools.- Fix mirrormanager_read_lib_files().- Allow mir
- 0480: romanager scripts running as httpd_t to manage mirrormanager pid
- 04c0: files.- Allow ctdb to create sock files in /var/run/ctdb.- Add
- 0500: sblim_filetrans_named_content() interface.- Allow rpm scritplets
- 0540: to create /run/gather with correct labeling.- Allow gnome keyri
- 0580: ng domains to create gnome config dirs.- Dontaudit read/write to
- 05c0: init stream socket for lsmd_plugin_t.- Allow automount to read
- 0600: nfs link files.- Allow lsm plugins to read/write lsmd stream soc
- 0640: ket.- Allow certmonger to connect ldap port to make IPA CA certi
- 0680: ficate renewal working..- Add also labeling for /var/run/ctdb.-
- 06c0: Add missing labeling for /var/lib/ctdb.- ALlow tuned to manage s
- 0700: yslog.conf. Should be fixed in tuned. #1030446.- Dontaudit hyper
- 0740: vkvp to search homedirs.- Dontaudit hypervkvp to search admin ho
- 0780: medirs.- Allow hypervkvp to execute bin_t and ifconfig in the ca
- 07c0: ller domain.- Dontaudit xguest_t to read ABRT conf files.- Add a
- 0800: brt_dontaudit_read_config().- Allow namespace-init to getattr on
- 0840: fs.- Add thumb_role() also for xguest.- Add filename transition
- 0880: s to create .spamassassin with correct labeling.- Allow apache d
- 08c0: omain to read mirrormanager pid files.- Allow domains to read/wr
- 0900: ite shm and sem owned by mozilla_plugin_t.- Allow alsactl to sen
- 0940: d a generic signal to kernel_t.- Add back rpm_run() for unconfin
- 0980: ed user.- Add missing files_create_var_lib_dirs().- Fix typo in
- 09c0: ipsec.te.- Allow passwd to create directory in /var/lib.- Add fi
- 0a00: lename trans also for event21.- Allow iptables command to read /
- 0a40: dev/rand.- Add sigkill capabilityfor ipsec_t.- Add filename tran
- 0a80: sitions for bcache devices.- Add additional rules to create /var
- 0ac0: /log/cron by syslogd_t with correct labeling.- Add give everyone
- 0b00: full access to all key rings.- Add default lvm_var_run_t label
- 0b40: for /var/run/multipathd.- Fix log labeling to have correct defau
- 0b80: lt label for them after logrotate.- Labeled ~/.nv/GLCache as bei
- 0bc0: ng gstreamer output.- Allow nagios_system_plugin to read mrtg li
- 0c00: b files.- Add mrtg_read_lib_files().- Call rhcs_rw_cluster_tmpfs
- 0c40: for dlm_controld.- Make authconfing as named_filetrans domain.-
- 0c80: Allow virsh to connect to user process using stream socket.- Al
- 0cc0: low rtas_errd to read rand/urand devices and add chown capabilit
- 0d00: y.- Fix labeling from /var/run/net-snmpd to correct /var/run/net
- 0d40: -snmp.Resolves:#1051497.- Add also chown cap for abrt_upload_wat
- 0d80: ch_t. It already has dac_override.- Allow sosreport to manage rh
- 0dc0: smcertd pid files.- Add rhsmcertd_manage_pid_files().- Allow als
- 0e00: o setgid cap for rpc.gssd.- Dontaudit access check for abrt on c
- 0e40: ert_t.- Allow pegasus_openlmi_system providers to dbus chat with
- 0e80: systemd-logind.- Fix semanage import handling in spec file.- Ad
- 0ec0: d default lvm_var_run_t label for /var/run/multipathd.Resolves:#
- 0f00: 1051430.- Fix log labeling to have correct default label for the
- 0f40: m after logrotate.- Add files_write_root_dirs.- Add new openflow
- 0f80: port label for 6653/tcp and 6633/tcp.- Add xserver_manage_xkb_l
- 0fc0: ibs().- Label tcp/8891 as milter por.- Allow gnome_manage_generi
- 1000: c_cache_files also create cache_home_t files.- Fix aide.log labe
- 1040: ling.- Fix log labeling to have correct default label for them a
- 1080: fter logrotate.- Allow mysqld-safe write access on /root to make
- 10c0: mysqld working.- Allow sosreport domtrans to prelikn.- Allow Op
- 1100: envSwitch to connec to openflow ports.- Allow NM send dgram to l
- 1140: ldpad.- Allow hyperv domains to execute shell.- Allow lsmd plugi
- 1180: ns stream connect to lsmd/init.- Allow sblim domains to create /
- 11c0: run/gather with correct labeling.- Allow httpd to read ldap cert
- 1200: s.- Allow cupsd to send dbus msgs to process with different MLS
- 1240: level.- Allow bumblebee to stream connect to apmd.- Allow bumble
- 1280: bee to run xkbcomp.- Additional allow rules to get libvirt-lxc c
- 12c0: ontainers working with docker.- Additional allow rules to get li
- 1300: bvirt-lxc containers working with docker.- Allow docker to getat
- 1340: tr on itself.- Additional rules needed for sandbox apps.- Allow
- 1380: mozilla_plugin to set attributes on usb device if use_spice bool
- 13c0: ean enabled.- httpd should be able to send signal/signull to htt
- 1400: pd_suexec_t.- Add more fixes for neturon. Domtrans to dnsmasq, i
- 1440: ptables. Make neutron as filenamtrans domain..- Add neutron fixe
- 1480: s.- Allow sshd to write to all process levels in order to change
- 14c0: passwd when running at a level.- Allow updpwd_t to downgrade /e
- 1500: tc/passwd file to s0, if it is not running with this range.- All
- 1540: ow apcuspd_t to status and start the power unit file.- Allow ude
- 1580: v to manage kdump unit file.- Added new interface modutils_donta
- 15c0: udit_exec_insmod.- Allow cobbler to search dhcp_etc_t directory.
- 1600: - systemd_systemctl needs sys_admin capability.- Allow sytemd_tm
- 1640: pfiles_t to delete all directories.- passwd to create gnome-keyr
- 1680: ing passwd socket.- Add missing zabbix_var_lib_t type.- Fix file
- 16c0: name trans for zabbixsrv in zabbix.te.- Allow fprintd_t to send
- 1700: syslog messages.- Add zabbix_var_lib_t for /var/lib/zabbixsrv,
- 1740: also allow zabix to connect to smtp port.- Allow mozilla plugin
- 1780: to chat with policykit, needed for spice.- Allow gssprozy to cha
- 17c0: nge user and gid, as well as read user keyrings.- Label upgrades
- 1800: directory under /var/www as httpd_sys_rw_content_t, add other f
- 1840: iletrans rules to label content correctly.- Allow polipo to conn
- 1880: ect to http_cache_ports.- Allow cron jobs to manage apache var l
- 18c0: ib content.- Allow yppassword to manage the passwd_file_t.- Allo
- 1900: w showall_t to send itself signals.- Allow cobbler to restart dh
- 1940: cpc, dnsmasq and bind services.- Allow certmonger to manage home
- 1980: cert files.- Add userdom filename trans for user mail domains.-
- 19c0: Allow apcuspd_t to status and start the power unit file.- Allow
- 1a00: cgroupdrulesengd to create content in cgoups directories.- Allo
- 1a40: w smbd_t to signull cluster.- Allow gluster daemon to create fif
- 1a80: o files in glusterd_brick_t and sock_file in glusterd_var_lib_t.
- 1ac0: - Add label for /var/spool/cron.aquota.user.- Allow sandbox_x do
- 1b00: mains to use work with the mozilla plugin semaphore.- Added new
- 1b40: policy for speech-dispatcher.- Added dontaudit rule for insmod_e
- 1b80: xec_t in rasdaemon policy.- Updated rasdaemon policy.- Allow sy
- 1bc0: stem_mail_t to transition to postfix_postdrop_t.- Clean up mirro
- 1c00: rmanager policy.- Allow virt_domains to read cert files, needs b
- 1c40: ackport to RHEL7.- Allow sssd to read systemd_login_var_run_t.-
- 1c80: Allow irc_t to execute shell and bin-t files:.- Add new access f
- 1cc0: or mythtv.- Allow rsync_t to manage all non auth files.- allow m
- 1d00: odemmanger to read /dev/urand.- Allow sandbox apps to attempt to
- 1d40: set and get capabilties.- Add labeling for /var/lib/servicelog/
- 1d80: servicelog.db-journal.- Add support for freeipmi port.- Add sysa
- 1dc0: dm_u_default_contexts.- Make new type to texlive files in homedi
- 1e00: r.- Allow subscription-manager running as sosreport_t to manage
- 1e40: rhsmcertd.- Additional fixes for docker.te.- Remove ability to d
- 1e80: o mount/sys_admin by default in virt_sandbox domains.- New rules
- 1ec0: required to run docker images within libivrt.- Add label for ~/
- 1f00: .cvsignore.- Change mirrormanager to be run by cron.- Add mirror
- 1f40: manager policy.- Fixed bumblebee_admin() and mip6d_admin().- Add
- 1f80: log support for sensord.- Fix typo in docker.te.- Allow amanda
- 1fc0: to do backups over UDP.- Allow bumblebee to read /etc/group and
- 2000: clean up bumblebee.te.- type transitions with a filename not all
- 2040: owed inside conditionals.- Don't allow virt-sandbox tools to use
- 2080: netlink out of the box, needs back port to RHEL7.- Make new typ
- 20c0: e to texlive files in homedir.- Allow freeipmi_ipmidetectd_t to
- 2100: use freeipmi port.- Update freeipmi_domain_template().- Allow jo
- 2140: urnalctl running as ABRT to read /run/log/journal.- Allow NM to
- 2180: read dispatcher.d directory.- Update freeipmi policy.- Type tran
- 21c0: sitions with a filename not allowed inside conditionals.- Allow
- 2200: tor to bind to hplip port.- Make new type to texlive files in ho
- 2240: medir.- Allow zabbix_agent to transition to dmidecode.- Add rule
- 2280: s for docker.- Allow sosreport to send signull to unconfined_t.-
- 22c0: Add virt_noatsecure and virt_rlimitinh interfaces.- Fix labelin
- 2300: g in thumb.fc to add support for /usr/lib64/tumbler-1/tumblerddd
- 2340: support for freeipmi port.- Add sysadm_u_default_contexts.- Add
- 2380: logging_read_syslog_pid().- Fix userdom_manage_home_texlive() i
- 23c0: nterface.- Make new type to texlive files in homedir.- Add filen
- 2400: ame transitions for /run and /lock links.- Allow virtd to inheri
- 2440: t rlimit information.Resolves:#975358.- Change labeling for /usr
- 2480: /libexec/nm-dispatcher.action to NetworkManager_exec_t.Resolves:
- 24c0: #1039879.- Add labeling for /usr/lib/systemd/system/mariadb.serv
- 2500: ice.- Allow hyperv_domain to read sysfs.- Fix ldap_read_certs()
- 2540: interface to allow acess also link files.- Add support for /usr/
- 2580: libexec/pegasus/cmpiLMI_Journald-cimprovagt.- Allow tuned to run
- 25c0: modprobe.- Allow portreserve to search /var/lib/sss dir.- Add S
- 2600: ELinux support for the teamd package contains team network devic
- 2640: e control daemon..- Dontaudit access check on /proc for bumblebe
- 2680: e.- Bumblebee wants to load nvidia modules.- Fix rpm_named_filet
- 26c0: rans_log_files and wine.te.- Add conman policy for rawhide.- DRM
- 2700: master and input event devices are used by the TakeDevice API.
- 2740: - Clean up bumblebee policy.- Update pegasus_openlmi_storage_t p
- 2780: olicy.- Add freeipmi_stream_connect() interface.- Allow logwatch
- 27c0: read madm.conf to support RAID setup.- Add raid_read_conf_files
- 2800: () interface.- Allow up2date running as rpm_t create up2date log
- 2840: file with rpm_log_t labeling.- add rpm_named_filetrans_log_file
- 2880: s() interface.- Allow dkim-milter to create files/dirs in /tmp.-
- 28c0: update freeipmi policy.- Add policy for freeipmi services.- Add
- 2900: ed rdisc_admin and rdisc_systemctl interfaces.- opensm policy cl
- 2940: ean up.- openwsman policy clean up.- ninfod policy clean up.- Ad
- 2980: ded new policy for ninfod.- Added new policy for openwsman.- Add
- 29c0: ed rdisc_admin and rdisc_systemctl interfaces.- Fix kernel_donta
- 2a00: udit_access_check_proc().- Add support for /dev/uhid.- Allow sul
- 2a40: ogin to get the attributes of initctl and sys_admin cap.- Add ke
- 2a80: rnel_dontaudit_access_check_proc().- Fix dev_rw_ipmi_dev().- Fix
- 2ac0: new interface in devices.if.- DRM master and input event device
- 2b00: s are used by the TakeDevice API.- add dev_rw_inherited_dri() a
- 2b40: nd dev_rw_inherited_input_dev().- Added support for default conm
- 2b80: an port.- Add interfaces for ipmi devices.- Allow sosreport to s
- 2bc0: end a signal to ABRT.- Add proper aliases for pegasus_openlmi_se
- 2c00: rvice_exec_t and pegasus_openlmi_service_t.- Label /usr/sbin/htc
- 2c40: acheclean as httpd_exec_t.Resolves:#1037529.- Added support for
- 2c80: rdisc unit file.- Add antivirus_db_t labeling for /var/lib/clama
- 2cc0: v-unofficial-sigs.- Allow runuser running as logrotate connectio
- 2d00: ns to system DBUS.- Label bcache devices as fixed_disk_device_t.
- 2d40: - Allow systemctl running in ipsec_mgmt_t to access /usr/lib/sys
- 2d80: temd/system/ipsec.service.- Label /usr/lib/systemd/system/ipsec.
- 2dc0: service as ipsec_mgmt_unit_file_t.- Add back setpgid/setsched fo
- 2e00: r sosreport_t.- Added fix for clout_init to transition to rpm_sc
- 2e40: ript_t (dwalsh@redhat.com).- Dontaudit openshift domains trying
- 2e80: to use rawip_sockets, this is caused by a bad check in the kerne
- 2ec0: l..- Allow git_system_t to read git_user_content if the git_syst
- 2f00: em_enable_homedirs boolean is turned on.- Add lsmd_plugin_t for
- 2f40: lsm plugins.- Allow dovecot-deliver to search mountpoints.- Add
- 2f80: labeling for /etc/mdadm.conf.- Allow opelmi admin providers to d
- 2fc0: bus chat with init_t.- Allow sblim domain to read /dev/urandom a
- 3000: nd /dev/random.- Allow apmd to request the kernel load modules.-
- 3040: Add glusterd_brick_t type.- label mate-keyring-daemon with gkey
- 3080: ringd_exec_t.- Add plymouthd_create_log().- Dontaudit leaks from
- 30c0: openshift domains into mail domains, needs back port to RHEL6.-
- 3100: Allow sssd to request the kernel loads modules.- Allow gpg_agen
- 3140: t to use ssh-add.- Allow gpg_agent to use ssh-add.- Dontaudit ac
- 3180: cess check on /root for myslqd_safe_t.- Allow ctdb to getattr on
- 31c0: al filesystems.- Allow abrt to stream connect to syslog.- Allow
- 3200: dnsmasq to list dnsmasq.d directory.- Watchdog opens the raw so
- 3240: cket.- Allow watchdog to read network state info.- Dontaudit acc
- 3280: ess check on lvm lock dir.- Allow sosreport to send signull to s
- 32c0: etroubleshootd.- Add setroubleshoot_signull() interface.- Fix ld
- 3300: ap_read_certs() interface.- Allow sosreport all signal perms.- A
- 3340: llow sosreport to run systemctl.- Allow sosreport to dbus chat w
- 3380: ith rpm.- Add glusterd_brick_t files type.- Allow zabbix_agentd
- 33c0: to read all domain state.- Clean up rtas.if.- Allow smoltclient
- 3400: to execute ldconfig.- Allow sosreport to request the kernel to l
- 3440: oad a module.- Fix userdom_confined_admin_template().- Add back
- 3480: exec_content boolean for secadm, logadm, auditadm.- Fix files_fi
- 34c0: letrans_system_db_named_files() interface.- Allow sulogin to get
- 3500: attr on /proc/kcore.- Add filename transition also for servicelo
- 3540: g.db-journal.- Add files_dontaudit_access_check_root().- Add lvm
- 3580: _dontaudit_access_check_lock() interface.- Allow watchdog to rea
- 35c0: d /etc/passwd.- Allow browser plugins to connect to bumblebee.-
- 3600: New policy for bumblebee and freqset.- Add new policy for mip6d
- 3640: daemon.- Add new policy for opensm daemon.- Allow condor domains
- 3680: to read/write condor_master udp_socket.- Allow openshift_cron_t
- 36c0: to append to openshift log files, label /var/log/openshift.- Ad
- 3700: d back file_pid_filetrans for /var/run/dlm_controld.- Allow smbd
- 3740: _t to use inherited tmpfs content.- Allow mcelog to use the /dev
- 3780: /cpu device.- sosreport runs rpcinfo.- sosreport runs subscripti
- 37c0: on-manager.- Allow staff_t to run frequency command.- Allow syst
- 3800: emd_tmpfiles to relabel log directories.- Allow staff_t to read
- 3840: xserver_log file.- Label hsperfdata_root as tmp_t.- More sosrepo
- 3880: rt fixes to make ABRT working.- Fix files_dontaudit_unmount_all_
- 38c0: mountpoints().- Add support for 2608-2609 tcp/udp ports.- Should
- 3900: allow domains to lock the terminal device.- More fixes for user
- 3940: config files to make crond_t running in userdomain.- Add back d
- 3980: isable/reload/enable permissions for system class.- Fix manage_s
- 39c0: ervice_perms macro.- We need to require passwd rootok.- Fix zebr
- 3a00: a.fc.- Fix dnsmasq_filetrans_named_content() interface.- Allow a
- 3a40: ll sandbox domains create content in svirt_home_t.- Allow zebra
- 3a80: domains also create zebra_tmp_t files in /tmp.- Add support for
- 3ac0: new zebra services:isisd,babeld. Add systemd support for zebra s
- 3b00: ervices..- Fix labeling on neutron and remove transition to icon
- 3b40: fig_t.- abrt needs to read mcelog log file.- Fix labeling on dns
- 3b80: masq content.- Fix labeling on /etc/dnsmasq.d.- Allow glusterd t
- 3bc0: o relabel own lib files.- Allow sandbox domains to use pam_rooto
- 3c00: k, and dontaudit attempts to unmount file systems, this is cause
- 3c40: d by a bug in systemd.- Allow ipc_lock for abrt to run journalct
- 3c80: l.- Fix config.tgz.- Fix passenger_stream_connect interface.- se
- 3cc0: troubleshoot_fixit wants to read network state.- Allow procmail_
- 3d00: t to connect to dovecot stream sockets.- Allow cimprovagt servic
- 3d40: e providers to read network states.- Add labeling for /var/run/m
- 3d80: ariadb.- pwauth uses lastlog() to update system's lastlog.- Allo
- 3dc0: w account provider to read login records.- Add support for texli
- 3e00: ve2013.- More fixes for user config files to make crond_t runnin
- 3e40: g in userdomain.- Add back disable/reload/enable permissions for
- 3e80: system class.- Fix manage_service_perms macro.- Allow passwd_t
- 3ec0: to connect to gnome keyring to change password.- Update mls conf
- 3f00: ig files to have cronjobs in the user domains.- Remove access ch
- 3f40: ecks that systemd does not actually do.- Add support for yubikey
- 3f80: in homedir.- Add support for upd/3052 port.- Allow apcupsd to u
- 3fc0: se PowerChute Network Shutdown.- Allow lsmd to execute various l
- 13:00:16.853457 <= Recv data, 16384 bytes (0x4000)
- 0000: smplugins.- Add labeling also for /etc/watchdog\.d where are wat
- 0040: chdog scripts located too.- Update gluster_export_all_rw boolean
- 0080: to allow relabel all base file types.- Allow x86_energy_perf t
- 00c0: ool to modify the MSR.- Fix /var/lib/dspam/data labeling.- Add f
- 0100: iles_relabel_base_file_types() interface.- Allow netlabel-config
- 0140: to read passwd.- update gluster_export_all_rw boolean to allow
- 0180: relabel all base file types caused by lsetxattr().- Allow x86_en
- 01c0: ergy_perf tool to modify the MSR.- Fix /var/lib/dspam/data labe
- 0200: ling.- Allow pegasus to domtrans to mount_t.- Add labeling for u
- 0240: nconfined scripts in /usr/libexec/watchdog/scripts.- Add support
- 0280: for unconfined watchdog scripts.- Allow watchdog to manage own
- 02c0: log files.- Add label only for redhat.repo instead of /etc/yum.r
- 0300: epos.d. But probably we will need to switch for the directory..-
- 0340: Label /etc/yum.repos.d as system_conf_t.- Use sysnet_filetrans_
- 0380: named_content in udev.te instead of generic transition for net_c
- 03c0: onf_t.- Allow dac_override for sysadm_screen_t.- Allow init_t to
- 0400: read ipsec_conf_t as we had it for initrc_t. Needed by ipsec un
- 0440: it file..- Allow netlabel-config to read meminfo.- Add interface
- 0480: to allow docker to mounton file_t.- Add new interface to exec u
- 04c0: nlabeled files.- Allow lvm to use docker semaphores.- Setup tran
- 0500: sitons for .xsessions-errors.old.- Change labels of files in /va
- 0540: r/lib/*/.ssh to transition properly.- Allow staff_t and user_t t
- 0580: o look at logs using journalctl.- pluto wants to manage own log
- 05c0: file.- Allow pluto running as ipsec_t to create pluto.log.- Fix
- 0600: alias decl in corenetwork.te.in.- Add support for fuse.glusterfs
- 0640: .- Allow dmidecode to read/write /run/lock/subsys/rhsmcertd.- Al
- 0680: low rhsmcertd to manage redhat.repo which is now labeled as syst
- 06c0: em.conf. Allow rhsmcertd to manage all log files..- Additional a
- 0700: ccess for docker.- Added more rules to sblim policy.- Fix kdumpg
- 0740: ui_run_bootloader boolean.- Allow dspam to connect to lmtp port.
- 0780: - Included sfcbd service into sblim policy.- rhsmcertd wants to
- 07c0: manaage /etc/pki/consumer dir.- Add kdumpgui_run_bootloader bool
- 0800: ean.- Add support for /var/cache/watchdog.- Remove virt_domain a
- 0840: ttribute for virt_qemu_ga_unconfined_t.- Fixes for handling libv
- 0880: irt containes.- Dontaudit attempts by mysql_safe to write conten
- 08c0: t into /.- Dontaudit attempts by system_mail to modify network c
- 0900: onfig.- Allow dspam to bind to lmtp ports.- Add new policy to al
- 0940: low staff_t and user_t to look at logs using journalctl.- Allow
- 0980: apache cgi scripts to list sysfs.- Dontaudit attempts to write/d
- 09c0: elete user_tmp_t files.- Allow all antivirus domains to manage a
- 0a00: lso own log dirs.- Allow pegasus_openlmi_services_t to stream co
- 0a40: nnect to sssd_t.- Add missing permission checks for nscd.- Fix a
- 0a80: lias decl in corenetwork.te.in.- Add support for fuse.glusterfs.
- 0ac0: - Add file transition rules for content created by f5link.- Rena
- 0b00: me quantum_port information to neutron.- Allow all antivirus dom
- 0b40: ains to manage also own log dirs.- Rename quantum_port informati
- 0b80: on to neutron.- Allow pegasus_openlmi_services_t to stream conne
- 0bc0: ct to sssd_t.- Allow sysadm_t to read login information.- Allow
- 0c00: systemd_tmpfiles to setattr on var_log_t directories.- Udpdate M
- 0c40: akefile to include systemd_contexts.- Add systemd_contexts.- Add
- 0c80: fs_exec_hugetlbfs_files() interface.- Add daemons_enable_cluste
- 0cc0: r_mode boolean.- Fix rsync_filetrans_named_content().- Add rhcs_
- 0d00: read_cluster_pid_files() interface.- Update rhcs.if with additio
- 0d40: nal interfaces from RHEL6.- Fix rhcs_domain_template() to not cr
- 0d80: eate run dirs with cluster_var_run_t.- Allow glusterd_t to mount
- 0dc0: on glusterd_tmp_t.- Allow glusterd to unmout al filesystems.- Al
- 0e00: low xenstored to read virt config.- Add label for swift_server.l
- 0e40: ock and make add filetrans_named_content to make sure content ge
- 0e80: ts created with the correct label.- Allow mozilla_plugin_t to mm
- 0ec0: ap hugepages as an executable.- Add back userdom_security_admin_
- 0f00: template() interface and use it for sysadm_t if sysadm_secadm.pp
- 0f40: .- Allow sshd_t to read openshift content, needs backport to RHE
- 0f80: L6.5.- Label /usr/lib64/sasl2/libsasldb.so.3.0.0 as textrel_shli
- 0fc0: b_t.- Make sur kdump lock is created with correct label if kdump
- 1000: ctl is executed.- gnome interface calls should always be made wi
- 1040: thin an optional_block.- Allow syslogd_t to connect to the syslo
- 1080: g_tls port.- Add labeling for /var/run/charon.ctl socket.- Add k
- 10c0: dump_filetrans_named_content().- Allo setpgid for fenced_t.- All
- 1100: ow setpgid and r/w cluster tmpfs for fenced_t.- gnome calls shou
- 1140: ld always be within optional blocks.- wicd.pid should be labeled
- 1180: as networkmanager_var_run_t.- Allow sys_resource for lldpad.- A
- 11c0: dd rtas policy.- Allow mailserver_domains to manage and transiti
- 1200: on to mailman data.- Dontaudit attempts by mozilla plugin to rel
- 1240: abel content, caused by using mv and cp commands.- Allow mailser
- 1280: ver_domains to manage and transition to mailman data.- Allow svi
- 12c0: rt_domains to read sysctl_net_t.- Allow thumb_t to use tmpfs inh
- 1300: erited from the user.- Allow mozilla_plugin to bind to the vnc p
- 1340: ort if running with spice.- Add new attribute to discover confin
- 1380: ed_admins and assign confined admin to it.- Fix zabbix to handle
- 13c0: attributes in interfaces.- Fix zabbix to read system states for
- 1400: all zabbix domains.- Fix piranha_domain_template().- Allow ctdb
- 1440: d to create udp_socket. Allow ndmbd to access ctdbd var files..-
- 1480: Allow lldpad sys_rouserce cap due to #986870.- Allow dovecot-au
- 14c0: th to read nologin.- Allow openlmi-networking to read /proc/net/
- 1500: dev.- Allow smsd_t to execute scripts created on the fly labeled
- 1540: as smsd_spool_t.- Add zabbix_domain attribute for zabbix domain
- 1580: s to treat them together.- Add labels for zabbix-poxy-* (#101822
- 15c0: 1).- Update openlmi-storage policy to reflect #1015067.- Back po
- 1600: rt piranha tmpfs fixes from RHEL6.- Update httpd_can_sendmail bo
- 1640: olean to allow read/write postfix spool maildrop.- Add postfix_r
- 1680: w_spool_maildrop_files interface.- Call new userdom_admin_user_t
- 16c0: emplat() also for sysadm_secadm.pp.- Fix typo in userdom_admin_u
- 1700: ser_template().- Allow SELinux users to create coolkeypk11sE-Gat
- 1740: e in /var/cache/coolkey.- Add new attribute to discover confined
- 1780: _admins.- Fix labeling for /etc/strongswan/ipsec.d.- systemd_log
- 17c0: ind seems to pass fd to anyone who dbus communicates with it.- D
- 1800: ontaudit leaked write descriptor to dmesg.- Activate motion poli
- 1840: cy.- Fix gnome_read_generic_data_home_files().- allow openshift_
- 1880: cgroup_t to read/write inherited openshift file types.- Remove h
- 18c0: ttpd_cobbler_content * from cobbler_admin interface.- Allow svir
- 1900: t sandbox domains to setattr on chr_file and blk_file svirt_sand
- 1940: box_file_t, so sshd will work within a container.- Allow httpd_t
- 1980: to read also git sys content symlinks.- Allow init_t to read gn
- 19c0: ome home data.- Dontaudit setroubleshoot_fixit_t execmem, since
- 1a00: it does not seem to really need it..- Allow virsh to execute sys
- 1a40: temctl.- Fix for nagios_services plugins.- add type defintion fo
- 1a80: r ctdbd_var_t.- Add support for /var/ctdb. Allow ctdb block_susp
- 1ac0: end and read /etc/passwd file.- Allow net_admin/netlink_socket a
- 1b00: ll hyperv_domain domains.- Add labeling for zarafa-search.log an
- 1b40: d zarafa-search.pid.- Fix hypervkvp.te.- Fix nscd_shm_use().- Ad
- 1b80: d initial policy for /usr/sbin/hypervvssd in hypervkvp policy wh
- 1bc0: ich should be renamed to hyperv. Also add hyperv_domain attribut
- 1c00: e to treat these HyperV services..- Add hypervkvp_unit_file_t ty
- 1c40: pe.- Fix logging policy.- Allow syslog to bind to tls ports.- Up
- 1c80: date labeling for /dev/cdc-wdm.- Allow to su_domain to read init
- 1cc0: states.- Allow init_t to read gnome home data.- Make sure if sy
- 1d00: stemd_logind creates nologin file with the correct label.- Clean
- 1d40: up ipsec.te.- Add auth_exec_chkpwd interface.- Fix port definit
- 1d80: ion for ctdb ports.- Allow systemd domains to read /dev/urand.-
- 1dc0: Dontaudit attempts for mozilla_plugin to append to /dev/random.-
- 1e00: Add label for /var/run/charon.*.- Add labeling for /usr/lib/sys
- 1e40: temd/system/lvm2.*dd policy for motion service.- Fix for nagios_
- 1e80: services plugins.- Fix some bugs in zoneminder policy.- add type
- 1ec0: defintion for ctdbd_var_t.- Add support for /var/ctdb. Allow ct
- 1f00: db block_suspend and read /etc/passwd file.- Allow net_admin/net
- 1f40: link_socket all hyperv_domain domains.- Add labeling for zarafa-
- 1f80: search.log and zarafa-search.pid.- glusterd binds to random unre
- 1fc0: served ports.- Additional allow rules found by testing glusterfs
- 2000: .- apcupsd needs to send a message to all users on the system so
- 2040: needs to look them up.- Fix the label on ~/.juniper_networks.-
- 2080: Dontaudit attempts for mozilla_plugin to append to /dev/random.-
- 20c0: Allow polipo_daemon to connect to flash ports.- Allow gssproxy_
- 2100: t to create replay caches.- Fix nscd_shm_use().- Add initial pol
- 2140: icy for /usr/sbin/hypervvssd in hypervkvp policy which should be
- 2180: renamed to hyperv. Also add hyperv_domain attribute to treat th
- 21c0: ese HyperV services..- Add hypervkvp_unit_file_t type.- init rel
- 2200: oad from systemd_localed_t.- Allow domains that communicate wit
- 2240: h systemd_logind_sessions to use systemd_logind_t fd.- Allow sys
- 2280: temd_localed_t to ask systemd to reload the locale..- Add system
- 22c0: d_runtime_unit_file_t type for unit files that systemd creates i
- 2300: n memory.- Allow readahead to read /dev/urand.- Fix lots of avcs
- 2340: about tuned.- Any file names xenstored in /var/log should be tr
- 2380: eated as xenstored_var_log_t.- Allow tuned to inderact with huge
- 23c0: pages.- Allow condor domains to list etc rw dirs.- Fix nscd_shm_
- 2400: use().- Add initial policy for /usr/sbin/hypervvssd in hypervkvp
- 2440: policy which should be renamed to hyperv. Also add hyperv_domai
- 2480: n attribute to treat these HyperV services..- Add hypervkvp_unit
- 24c0: _file_t type.- Add additional fixes forpegasus_openlmi_account_t
- 2500: .- Allow mdadm to read /dev/urand.- Allow pegasus_openlmi_storag
- 2540: e_t to create mdadm.conf and write it.- Add label/rules for /etc
- 2580: /mdadm.conf.- Allow pegasus_openlmi_storage_t to transition to f
- 25c0: sadm_t.- Fixes for interface definition problems.- Dontaudit dov
- 2600: ecot-deliver to gettatr on all fs dirs.- Allow domains to search
- 2640: data_home_t directories.- Allow cobblerd to connect to mysql.-
- 2680: Allow mdadm to r/w kdump lock files.- Add support for kdump lock
- 26c0: files.- Label zarafa-search as zarafa-indexer.- Openshift cgrou
- 2700: p wants to read /etc/passwd.- Add new sandbox domains for kvm.-
- 2740: Allow mpd to interact with pulseaudio if mpd_enable_homedirs is
- 2780: turned on.- Fix labeling for /usr/lib/systemd/system/lvm2.*.- Ad
- 27c0: d labeling for /usr/lib/systemd/system/lvm2.*.- Fix typos to get
- 2800: a new build. We should not cover filename trans rules to preven
- 2840: t duplicate rules.- Add sshd_keygen_t policy for sshd-keygen.- F
- 2880: ix alsa_home_filetrans interface name and definition.- Allow cho
- 28c0: wn for ssh_keygen_t.- Add fs_dontaudit_getattr_all_dirs().- Allo
- 2900: w init_t to manage etc_aliases_t and read xserver_var_lib_t and
- 2940: chrony keys.- Fix up patch to allow systemd to manage home conte
- 2980: nt.- Allow domains to send/recv unlabeled traffic if unlabeledne
- 29c0: t.pp is enabled.- Allow getty to exec hostname to get info.- Add
- 2a00: systemd_home_t for ~/.local/share/systemd directory.- Fix lxc l
- 2a40: abels in config.tgz.- Fix labeling for /usr/libexec/kde4/kcmdate
- 2a80: timehelper.- Allow tuned to search all file system directories.-
- 2ac0: Allow alsa_t to sys_nice, to get top performance for sound mana
- 2b00: gement.- Add support for MySQL/PostgreSQL for amavis.- Allow ope
- 2b40: nvpn_t to manage openvpn_var_log_t files..- Allow dirsrv_t to cr
- 2b80: eate tmpfs_t directories.- Allow dirsrv to create dirs in /dev/s
- 2bc0: hm with dirsrv_tmpfs label.- Dontaudit leaked unix_stream_socket
- 2c00: s into gnome keyring.- Allow telepathy domains to inhibit pipes
- 2c40: on telepathy domains.- Allow cloud-init to domtrans to rpm.- All
- 2c80: ow abrt daemon to manage abrt-watch tmp files.- Allow abrt-uploa
- 2cc0: d-watcher to search /var/spool directory.- Allow nsswitch domain
- 2d00: s to manage own process key.- Fix labeling for mgetty.* logs.- A
- 2d40: llow systemd to dbus chat with upower.- Allow ipsec to send sign
- 2d80: ull to itself.- Allow setgid cap for ipsec_t.- Match upstream la
- 2dc0: beling.- Do not build sanbox pkg on MLS.- wine_tmp is no longer
- 2e00: needed.- Allow setroubleshoot to look at /proc.- Allow telepathy
- 2e40: domains to dbus with systemd logind.- Fix handling of fifo file
- 2e80: s of rpm.- Allow mozilla_plugin to transition to itself.- Allow
- 2ec0: certwatch to write to cert_t directories.- New abrt application.
- 2f00: - Allow NetworkManager to set the kernel scheduler.- Make wine_d
- 2f40: omain shared by all wine domains.- Allow mdadm_t to read images
- 2f80: labeled svirt_image_t.- Allow amanda to read /dev/urand.- ALlow
- 2fc0: my_print_default to read /dev/urand.- Allow mdadm to write to kd
- 3000: umpctl fifo files.- Allow nslcd to send signull to itself.- Allo
- 3040: w yppasswd to read /dev/urandom.- Fix zarafa_setrlimit.- Add sup
- 3080: port for /var/lib/php/wsdlcache.- Add zarafa_setrlimit boolean.-
- 30c0: Allow fetchmail to send mails.- Add additional alias for user_t
- 3100: mp_t because wine_tmp_t is no longer used.- More handling of the
- 3140: r kernel keyring required by kerberos.- New privs needed for ini
- 3180: t_t when running without transition to initrc_t over bin_t, and
- 31c0: without unconfined domain installed.- Dontaudit attempts by sosr
- 3200: eport to read shadow_t.- Allow browser sandbox plugins to connec
- 3240: t to cups to print.- Add new label mpd_home_t.- Label /srv/www/l
- 3280: ogs as httpd_log_t.- Add support for /var/lib/php/wsdlcache.- Ad
- 32c0: d zarafa_setrlimit boolean.- Allow fetchmail to send mails.- Add
- 3300: labels for apache logs under miq package.- Allow irc_t to use t
- 3340: cp sockets.- fix labels in puppet.if.- Allow tcsd to read utmp f
- 3380: ile.- Allow openshift_cron_t to run ssh-keygen in ssh_keygen_t t
- 33c0: o access host keys.- Define svirt_socket_t as a domain_type.- Ta
- 3400: ke away transition from init_t to initrc_t when executing bin_t,
- 3440: allow init_t to run chk_passwd_t.- Fix label on pam_krb5 helper
- 3480: apps.- Allow ldconfig to write to kdumpctl fifo files.- allow n
- 34c0: eutron to connect to amqp ports.- Allow kdump_manage_crash to li
- 3500: st the kdump_crash_t directory.- Allow glance-api to connect to
- 3540: amqp port.- Allow virt_qemu_ga_t to read meminfo.- Add antivirus
- 3580: _home_t type for antivirus date in HOMEDIRS.- Allow mpd setcap w
- 35c0: hich is needed by pulseaudio.- Allow smbcontrol to create conten
- 3600: t in /var/lib/samba.- Allow mozilla_exec_t to be used as a entry
- 3640: point to mozilla_domtrans_spec.- Add additional labeling for qem
- 3680: u-ga/fsfreeze-hook.d scripts.- amanda_exec_t needs to be executa
- 36c0: ble file.- Allow block_suspend cap for samba-net.- Allow apps th
- 3700: at read ipsec_mgmt_var_run_t to search ipsec_var_run_t.- Allow i
- 3740: nit_t to run crash utility.- Treat usr_t just like bin_t for tra
- 3780: nsitions and executions.- Add port definition of pka_ca to port
- 37c0: 829 for openshift.- Allow selinux_store to use symlinks.- Allow
- 3800: block_suspend cap for samba-net.- Allow t-mission-control to man
- 3840: age gabble cache files.- Allow nslcd to read /sys/devices/system
- 3880: /cpu.- Allow selinux_store to use symlinks.- Allow xdm_t to tran
- 38c0: sition to itself.- Call neutron interfaces instead of quantum.-
- 3900: Allow init to change targed role to make uncofined services (xrd
- 3940: p which now has own systemd unit file) working. We want them to
- 3980: have in unconfined_t.- Make sure directories in /run get created
- 39c0: with the correct label.- Make sure /root/.pki gets created with
- 3a00: the right label.- try to remove labeling for motion from zonemi
- 3a40: nder_exec_t to bin_t.- Allow inetd_t to execute shell scripts.-
- 3a80: Allow cloud-init to read all domainstate.- Fix to use quantum po
- 3ac0: rt.- Add interface netowrkmanager_initrc_domtrans.- Fix boinc_ex
- 3b00: ecmem.- Allow t-mission-control to read gabble cache home.- Add
- 3b40: labeling for ~/.cache/telepathy/avatars/gabble.- Allow memcache
- 3b80: to read sysfs data.- Cleanup antivirus policy and add additional
- 3bc0: fixes.- Add boolean boinc_enable_execstack.- Add support for co
- 3c00: uchdb in rabbitmq policy.- Add interface couchdb_search_pid_dirs
- 3c40: .- Allow firewalld to read NM state.- Allow systemd running as g
- 3c80: it_systemd to bind git port.- Fix mozilla_plugin_rw_tmpfs_files(
- 3cc0: ).- Split out rlogin ports from inetd.- Treat files labeld as us
- 3d00: r_t like bin_t when it comes to transitions.- Allow staff_t to r
- 3d40: ead login config.- Allow ipsec_t to read .google authenticator d
- 3d80: ata.- Allow systemd running as git_systemd to bind git port.- Fi
- 3dc0: x mozilla_plugin_rw_tmpfs_files().- Call the correct interface -
- 3e00: corenet_udp_bind_ktalkd_port().- Allow all domains that can rea
- 3e40: d gnome_config to read kde config.- Allow sandbox domain to read
- 3e80: /write mozilla_plugin_tmpfs_t so pulseaudio will work.- Allow md
- 3ec0: adm to getattr any file system.- Allow a confined domain to exec
- 3f00: utes mozilla_exec_t via dbus.- Allow cupsd_lpd_t to bind to the
- 3f40: printer port.- Dontaudit attempts to bind to ports < 1024 when n
- 3f80: is is turned on.- Allow apache domain to connect to gssproxy soc
- 3fc0: ket.- Allow rlogind to bind to the rlogin_port.- Allow telnetd t
- 13:00:16.861410 <= Recv data, 16384 bytes (0x4000)
- 0000: o bind to the telnetd_port.- Allow ktalkd to bind to the ktalkd_
- 0040: port.- Allow cvs to bind to the cvs_port.- Cleanup related to in
- 0080: it_domain()+inetd_domain fixes.- Use just init_domain instead of
- 00c0: init_daemon_domain in inetd_core_service_domain.- svirt domains
- 0100: neeed to create kobject_uevint_sockets.- Lots of new access req
- 0140: uired for sosreport.- Allow tgtd_t to connect to isns ports.- Al
- 0180: low init_t to transition to all inetd domains:.- openct needs to
- 01c0: be able to create netlink_object_uevent_sockets.- Dontaudit lea
- 0200: ks into ldconfig_t.- Dontaudit su domains getattr on /dev device
- 0240: s, move su domains to attribute based calls.- Move kernel_stream
- 0280: _connect into all Xwindow using users.- Dontaudit inherited lock
- 02c0: files in ifconfig o dhcpc_t.- Also sock_file trans rule is need
- 0300: ed in lsm.- Fix labeling for fetchmail pid files/dirs.- Add addi
- 0340: tional fixes for abrt-upload-watch.- Fix polipo.te.- Fix transit
- 0380: ion rules in asterisk policy.- Add fowner capability to networkm
- 03c0: anager policy.- Allow polipo to connect to tor ports.- Cleanup l
- 0400: smd.if.- Cleanup openhpid policy.- Fix kdump_read_crash() interf
- 0440: ace.- Make more domains as init domain.- Fix cupsd.te.- Fix requ
- 0480: ires in rpm_rw_script_inherited_pipes.- Fix interfaces in lsm.if
- 04c0: .- Allow munin service plugins to manage own tmpfs files/dirs.-
- 0500: Allow virtd_t also relabel unix stream sockets for virt_image_ty
- 0540: pe.- Make ktalk as init domain.- Fix to define ktalkd_unit_file_
- 0580: t correctly.- Fix ktalk.fc.- Add systemd support for talk-server
- 05c0: .- Allow glusterd to create sock_file in /run.- Allow xdm_t to d
- 0600: elete gkeyringd_tmp_t files on logout.- Add fixes for hypervkvp
- 0640: policy.- Add logwatch_can_sendmail boolean.- Allow mysqld_safe_t
- 0680: to handle also symlinks in /var/log/mariadb.- Allow xdm_t to de
- 06c0: lete gkeyringd_tmp_t files on logout.- Add selinux-policy-sandbo
- 0700: x pkg.0 .- Allow rhsmcertd to read init state.- Allow fsetid for
- 0740: pkcsslotd.- Fix labeling for /usr/lib/systemd/system/pkcsslotd.
- 0780: service.- Allow fetchmail to create own pid with correct labelin
- 07c0: g.- Fix rhcs_domain_template().- Allow roles which can run mock
- 0800: to read mock lib files to view results.- Allow rpcbind to use ns
- 0840: switch.- Fix lsm.if summary.- Fix collectd_t can read /etc/passw
- 0880: d file.- Label systemd unit files under dracut correctly.- Add s
- 08c0: upport for pam_mount to mount user's encrypted home When a user
- 0900: logs in and logs out using ssh.- Add support for .Xauthority-n.-
- 0940: Label umount.crypt as lvm_exec_t.- Allow syslogd to search psad
- 0980: lib files.- Allow ssh_t to use /dev/ptmx.- Make sure /run/pluto
- 09c0: dir is created with correct labeling.- Allow syslog to run shel
- 0a00: l and bin_t commands.- Allow ip to relabel tun_sockets.- Allow m
- 0a40: ount to create directories in files under /run.- Allow processes
- 0a80: to use inherited fifo files.- Add policy for lsmd.- Add support
- 0ac0: for /var/log/mariadb dir and allow mysqld_safe to list this dir
- 0b00: ectory.- Update condor_master rules to allow read system state i
- 0b40: nfo and allow logging.- Add labeling for /etc/condor and allow c
- 0b80: ondor domain to write it (bug).- Allow condor domains to manage
- 0bc0: own logs.- Allow glusterd to read domains state.- Fix initial hy
- 0c00: pervkvp policy.- Add policy for hypervkvpd.- Fix redis.if summar
- 0c40: y.- Allow boinc to connect to @/tmp/.X11-unix/X0.- Allow beam.s
- 0c80: mp to connect to tcp/5984.- Allow named to manage own log files.
- 0cc0: - Add label for /usr/libexec/dcc/start-dccifd and domtrans to d
- 0d00: ccifd_t.- Add virt_transition_userdomain boolean decl.- Allow ht
- 0d40: tpd_t to sendto unix_dgram sockets on its children.- Allow nova
- 0d80: domains to execute ifconfig.- bluetooth wants to create fifo_fil
- 0dc0: es in /tmp.- exim needs to be able to manage mailman data.- Allo
- 0e00: w sysstat to getattr on all file systems.- Looks like bluetoothd
- 0e40: has moved.- Allow collectd to send ping packets.- Allow svirt_l
- 0e80: xc domains to getpgid.- Remove virt-sandbox-service labeling as
- 0ec0: virsh_exec_t, since it no longer does virsh_t stuff.- Allow frpi
- 0f00: ntd_t to read /dev/urandom.- Allow asterisk_t to create sock_fil
- 0f40: e in /var/run.- Allow usbmuxd to use netlink_kobject.- sosreport
- 0f80: needs to getattr on lots of devices, and needs access to netlin
- 0fc0: k_kobject_uevent_socket.- More cleanup of svirt_lxc policy.- vir
- 1000: td_lxc_t now talks to dbus.- Dontaudit leaked ptmx_t.- Allow pro
- 1040: cesses to use inherited fifo files.- Allow openvpn_t to connect
- 1080: to squid ports.- Allow prelink_cron_system_t to ask systemd to r
- 10c0: eloaddd miscfiles_dontaudit_access_check_cert().- Allow ssh_t to
- 1100: use /dev/ptmx.- Make sure /run/pluto dir is created with correc
- 1140: t labeling.- Allow syslog to run shell and bin_t commands.- Allo
- 1180: w ip to relabel tun_sockets.- Allow mount to create directories
- 11c0: in files under /run.- Allow processes to use inherited fifo file
- 1200: s.- Allow user roles to connect to the journal socket.- selinux_
- 1240: set_enforce_mode needs to be used with type.- Add append to the
- 1280: dontaudit for unix_stream_socket of xdm_t leak.- Allow xdm_t to
- 12c0: create symlinks in log direcotries.- Allow login programs to rea
- 1300: d afs config.- Label 10933 as a pop port, for dovecot.- New poli
- 1340: cy to allow selinux_server.py to run as semanage_t as a dbus ser
- 1380: vice.- Add fixes to make netlabelctl working on MLS.- AVCs requi
- 13c0: red for running sepolicy gui as staff_t.- Dontaudit attempts to
- 1400: read symlinks, sepolicy gui is likely to cause this type of AVC.
- 1440: - New dbus server to be used with new gui.- After modifying some
- 1480: files in /etc/mail, I saw this needed on the next boot.- Loadin
- 14c0: g a vm from /usr/tmp with virt-manager.- Clean up oracleasm poli
- 1500: cy for Fedora.- Add oracleasm policy written by rlopez@redhat.co
- 1540: m.- Make postfix_postdrop_t as mta_agent to allow domtrans to sy
- 1580: stem mail if it is executed by apache.- Add label for /var/crash
- 15c0: .- Allow fenced to domtrans to sanclok_t.- Allow nagios to manag
- 1600: e nagios spool files.- Make tfptd as home_manager.- Allow kdump
- 1640: to read kcore on MLS system.- Allow mysqld-safe sys_nice/sys_res
- 1680: ource caps.- Allow apache to search automount tmp dirs if http_u
- 16c0: se_nfs is enabled.- Allow crond to transition to named_t, for us
- 1700: e with unbound.- Allow crond to look at named_conf_t, for unboun
- 1740: d.- Allow mozilla_plugin_t to transition its home content.- Allo
- 1780: w dovecot_domain to read all system and network state.- Allow ht
- 17c0: tpd_user_script_t to call getpw.- Allow semanage to read pid fil
- 1800: es.- Dontaudit leaked file descriptors from user domain into thu
- 1840: mb.- Make PAM authentication working if it is enabled in ejabber
- 1880: d.- Add fixes for rabbit to fix ##992920,#992931.- Allow gluster
- 18c0: d to mount filesystems.- Loading a vm from /usr/tmp with virt-ma
- 1900: nager.- Trying to load a VM I got an AVC from devicekit_disk for
- 1940: loopcontrol device.- Add fix for pand service.- shorewall touch
- 1980: es own log.- Allow nrpe to list /var.- Mozilla_plugin_roles can
- 19c0: not be passed into lpd_run_lpr.- Allow afs domains to read afs_c
- 1a00: onfig files.- Allow login programs to read afs config.- Allow vi
- 1a40: rt_domain to read virt_var_run_t symlinks.- Allow smokeping to s
- 1a80: end its process signals.- Allow fetchmail to setuid.- Add kdump_
- 1ac0: manage_crash() interface.- Allow abrt domain to write abrt.socke
- 1b00: t.- Add more aliases in pegasus.te.- Add more fixes for *_admin
- 1b40: interfaces.- Add interface fixes.- Allow nscd to stream connect
- 1b80: to nmbd.- Allow gnupg apps to write to pcscd socket.- Add more f
- 1bc0: ixes for openlmi provides. Fix naming and support for additional
- 1c00: s.- Allow fetchmail to resolve host names.- Allow firewalld to i
- 1c40: nteract also with lnk files labeled as firewalld_etc_rw_t.- Add
- 1c80: labeling for cmpiLMI_Fan-cimprovagt.- Allow net_admin for gluste
- 1cc0: rd.- Allow telepathy domain to create dconf with correct labelin
- 1d00: g in /home/userX/.cache/.- Add pegasus_openlmi_system_t.- Fix pu
- 1d40: ppet_domtrans_master() to make all puppet calling working in pas
- 1d80: senger.te.- Fix corecmd_exec_chroot().- Fix logging_relabel_sysl
- 1dc0: og_pid_socket interface.- Fix typo in unconfineduser.te.- Allow
- 1e00: system_r to access unconfined_dbusd_t to run hp_chec.- Allow xdm
- 1e40: _t to act as a dbus client to itsel.- Allow fetchmail to resolve
- 1e80: host names.- Allow gnupg apps to write to pcscd socket.- Add la
- 1ec0: beling for cmpiLMI_Fan-cimprovagt.- Allow net_admin for glusterd
- 1f00: .- Allow telepathy domain to create dconf with correct labeling
- 1f40: in /home/userX/.cache/.- Add pegasus_openlmi_system_t.- Fix pupp
- 1f80: et_domtrans_master() to make all puppet calling working in passe
- 1fc0: nger.te.-httpd_t does access_check on certs.- Add support for cm
- 2000: piLMI_Service-cimprovagt.- Allow pegasus domtrans to rpm_t to ma
- 2040: ke pycmpiLMI_Software-cimprovagt running as rpm_t.- Label pycmpi
- 2080: LMI_Software-cimprovagt as rpm_exec_t.- Add support for pycmpiLM
- 20c0: I_Storage-cimprovagt.- Add support for cmpiLMI_Networking-cimpro
- 2100: vagt.- Allow system_cronjob_t to create user_tmpfs_t to make pul
- 2140: seaudio working.- Allow virtual machines and containers to run a
- 2180: s user doains, needed for virt-sandbox.- Allow buglist.cgi to re
- 21c0: ad cpu info.- Allow systemd-tmpfile to handle tmp content in pri
- 2200: nt spool dir.- Allow systemd-sysctl to send system log messages.
- 2240: - Add support for RTP media ports and fmpro-internal.- Make audi
- 2280: td working if audit is configured to perform SINGLE action on di
- 22c0: sk error.- Add interfaces to handle systemd units.- Make systemd
- 2300: -notify working if pcsd is used.- Add support for netlabel and l
- 2340: abel /usr/sbin/netlabelctl as iptables_exec_t.- Instead of havin
- 2380: g all unconfined domains get all of the named transition rules,.
- 23c0: - Only allow unconfined_t, init_t, initrc_t and rpm_script_t by
- 2400: default..- Add definition for the salt ports.- Allow xdm_t to cr
- 2440: eate link files in xdm_var_run_t.- Dontaudit reads of blk files
- 2480: or chr files leaked into ldconfig_t.- Allow sys_chroot for usera
- 24c0: dd_t.- Allow net_raw cap for ipsec_t.- Allow sysadm_t to reload
- 2500: services.- Add additional fixes to make strongswan working with
- 2540: a simple conf.- Allow sysadm_t to enable/disable init_t services
- 2580: .- Add additional glusterd perms.- Allow apache to read lnk file
- 25c0: s in the /mnt directory.- Allow glusterd to ask the kernel to lo
- 2600: ad a module.- Fix description of ftpd_use_fusefs boolean.- Allow
- 2640: svirt_lxc_net_t to sys_chroot, modify policy to tighten up svir
- 2680: t_lxc_domain capabilties and process controls, but add them to s
- 26c0: virt_lxc_net_t.- Allow glusterds to request load a kernel module
- 2700: .- Allow boinc to stream connect to xserver_t.- Allow sblim doma
- 2740: ins to read /etc/passwd.- Allow mdadm to read usb devices.- Allo
- 2780: w collectd to use ping plugin.- Make foghorn working with SNMP.-
- 27c0: Allow sssd to read ldap certs.- Allow haproxy to connect to RTP
- 2800: media ports.- Add additional trans rules for aide_db.- Add labe
- 2840: ling for /usr/lib/pcsd/pcsd.- Add labeling for /var/log/pcsd.- A
- 2880: dd support for pcs which is a corosync and pacemaker configurati
- 28c0: on tool.- Label /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t
- 2900: .- Add labeling for /usr/libexec/kde4/polkit-kde-authentication-
- 2940: agent-1.- Allow all domains that can domtrans to shutdown, to st
- 2980: art the power services script to shutdown.- consolekit needs to
- 29c0: be able to shut down system.- Move around interfaces.- Remove nf
- 2a00: sd_rw_t and nfsd_ro_t, they don't do anything.- Add additional f
- 2a40: ixes for rabbitmq_beam to allow getattr on mountpoints.- Allow g
- 2a80: conf-defaults-m to read /etc/passwd.- Fix pki_rw_tomcat_cert() i
- 2ac0: nterface to support lnk_files.- Add support for gluster ports.-
- 2b00: Make sure that all keys located in /etc/ssh/ are labeled correct
- 2b40: ly.- Make sure apcuspd lock files get created with the correct l
- 2b80: abel.- Use getcap in gluster.te.- Fix gluster policy.- add addit
- 2bc0: ional fixes to allow beam.smp to interact with couchdb files.- A
- 2c00: dditional fix for #974149.- Allow gluster to user gluster ports.
- 2c40: - Allow glusterd to transition to rpcd_t and add additional fixe
- 2c80: s for #980683.- Allow tgtd working when accessing to the passthr
- 2cc0: ough device.- Fix labeling for mdadm unit files.- Add mdadm fixe
- 2d00: s.- Fix definition of sandbox.disabled to sandbox.pp.disabled.-
- 2d40: Allow mdamd to execute systemctl.- Allow mdadm to read /dev/kvm.
- 2d80: - Allow ipsec_mgmt_t to read l2tpd pid content.- Allow nsd_t to
- 2dc0: read /dev/urand.- Allow mdadm_t to read framebuffer.- Allow rabb
- 2e00: itmq_beam_t to read process info on rabbitmq_epmd_t.- Allow mozi
- 2e40: lla_plugin_config_t to create tmp files.- Cleanup openvswitch po
- 2e80: licy.- Allow mozilla plugin to getattr on all executables.- Allo
- 2ec0: w l2tpd_t to create fifo_files in /var/run.- Allow samba to touc
- 2f00: h/manage fifo_files or sock_files in a samba_share_t directory.-
- 2f40: Allow mdadm to connecto its own unix_stream_socket.- FIXME: nag
- 2f80: ios changed locations to /log/nagios which is wrong. But we need
- 2fc0: to have this workaround for now..- Allow apache to access smoke
- 3000: ping pid files.- Allow rabbitmq_beam_t to getattr on all filesys
- 3040: tems.- Add systemd support for iodined.- Allow nup_upsdrvctl_t t
- 3080: o execute its entrypoint.- Allow fail2ban_client to write to fai
- 30c0: l2ban_var_run_t, Also allow it to use nsswitch.- add labeling fo
- 3100: r ~/.cache/libvirt-sandbox.- Add interface to allow domains tran
- 3140: sitioned to by confined users to send sigchld to screen program.
- 3180: - Allow sysadm_t to check the system status of files labeled etc
- 31c0: _t, /etc/fstab.- Allow systemd_localed to start /usr/lib/systemd
- 3200: /system/systemd-vconsole-setup.service.- Allow an domain that ha
- 3240: s an entrypoint from a type to be allowed to execute the entrypo
- 3280: int without a transition, I can see no case where this is a ba
- 32c0: d thing, and elminiates a whole class of AVCs..- Allow staff to
- 3300: getsched all domains, required to run htop.- Add port definition
- 3340: for redis port.- fix selinuxuser_use_ssh_chroot boolean.- Add p
- 3380: rosody policy written by Michael Scherer.- Allow nagios plugins
- 33c0: to read /sys info.- ntpd needs to manage own log files.- Add sup
- 3400: port for HOME_DIR/.IBMERS.- Allow iptables commands to read fire
- 3440: walld config.- Allow consolekit_t to read utmp.- Fix filename tr
- 3480: ansitions on .razor directory.- Add additional fixes to make DSP
- 34c0: AM with LDA working.- Allow snort to read /etc/passwd.- Allow fa
- 3500: il2ban to communicate with firewalld over dbus.- Dontaudit opens
- 3540: hift_cgreoup_file_t read/write leaked dev.- Allow nfsd to use mo
- 3580: untd port.- Call th proper interface.- Allow openvswitch to read
- 35c0: sys and execute plymouth.- Allow tmpwatch to read /var/spool/cu
- 3600: ps/tmp.- Add support for /usr/libexec/telepathy-rakia.- Add syst
- 3640: emd support for zoneminder.- Allow mysql to create files/directo
- 3680: ries under /var/log/mysql.- Allow zoneminder apache scripts to r
- 36c0: w zoneminder tmpfs.- Allow httpd to manage zoneminder lib files.
- 3700: - Add zoneminder_run_sudo boolean to allow to start zoneminder.-
- 3740: Allow zoneminder to send mails.- gssproxy_t sock_file can be un
- 3780: der /var/lib.- Allow web domains to connect to whois port..- All
- 37c0: ow sandbox_web_type to connect to the same ports as mozilla_plug
- 3800: in_t..- We really need to add an interface to corenet to define
- 3840: what a web_client_domain is and.- then define chrome_sandbox_t,
- 3880: mozilla_plugin_t and sandbox_web_type to that domain..- Add labe
- 38c0: ling for cmpiLMI_LogicalFile-cimprovagt.- Also make pegasus_open
- 3900: lmi_logicalfile_t as unconfined to have unconfined_domain attrib
- 3940: ute for filename trans rules.- Update policy rules for pegasus_o
- 3980: penlmi_logicalfile_t.- Add initial types for logicalfile/unconfi
- 39c0: ned OpenLMI providers.- mailmanctl needs to read own log.- Allow
- 3a00: logwatch manage own lock files.- Allow nrpe to read meminfo.- A
- 3a40: llow httpd to read certs located in pki-ca.- Add pki_read_tomcat
- 3a80: _cert() interface.- Add support for nagios openshift plugins.- A
- 3ac0: dd port definition for redis port.- fix selinuxuser_use_ssh_chro
- 3b00: ot boolean.- Shrink the size of policy by moving to attributes,
- 3b40: also add dridomain so that mozilla_plugin can follow selinuxuse_
- 3b80: dri boolean. .- Allow bootloader to manage generic log files .-
- 3bc0: Allow ftp to bind to port 989 .- Fix label of new gear directory
- 3c00: .- Add support for new directory /var/lib/openshift/gears/ .- A
- 3c40: dd openshift_manage_lib_dirs() .- allow virtd domains to manage
- 3c80: setrans_var_run_t .- Allow useradd to manage all openshift conte
- 3cc0: nt .- Add support so that mozilla_plugin_t can use dri devices .
- 3d00: - Allow chronyd to change the scheduler .- Allow apmd to shut do
- 3d40: wnthe system .- Devicekit_disk_t needs to manage /etc/fstab.- Ma
- 3d80: ke DSPAM to act as a LDA working.- Allow ntop to create netlink
- 3dc0: socket.- Allow policykit to send a signal to policykit-auth.- Al
- 3e00: low stapserver to dbus chat with avahi/systemd-logind.- Fix labe
- 3e40: ling on haproxy unit file.- Clean up haproxy policy.- A new poli
- 3e80: cy for haproxy and placed it to rhcs.te.- Add support for ldirec
- 3ec0: tord and treat it with cluster_t.- Make sure anaconda log dir is
- 3f00: created with var_log_t.- Allow lvm_t to create default targets
- 3f40: for filesystem handling.- Fix labeling for razor-lightdm binarie
- 3f80: s.- Allow insmod_t to read any file labeled var_lib_t.- Add poli
- 3fc0: cy for pesign.- Activate policy for cmpiLMI_Account-cimprovagt.-
- 13:00:16.868725 <= Recv data, 16384 bytes (0x4000)
- 0000: Allow isnsd syscall=listen.- /usr/libexec/pegasus/cimprovagt ne
- 0040: eds setsched caused by sched_setscheduler.- Allow ctdbd to use u
- 0080: dp/4379.- gatherd wants sys_nice and setsched.- Add support for
- 00c0: texlive2012.- Allow NM to read file_t (usb stick with no labels
- 0100: used to transfer keys for example).- Allow cobbler to execute ap
- 0140: ache with domain transition.- condor_collector uses tcp/9000.- L
- 0180: abel /usr/sbin/virtlockd as virtd_exec_t for now.- Allow cobbler
- 01c0: to execute ldconfig.- Allow NM to execute ssh.- Allow mdadm to
- 0200: read /dev/crash.- Allow antivirus domains to connect to snmp por
- 0240: t.- Make amavisd-snmp working correctly.- Allow nfsd_t to mounto
- 0280: n nfsd_fs_t.- Add initial snapper policy.- We still need to have
- 02c0: consolekit policy.- Dontaudit firefox attempting to connect to
- 0300: the xserver_port_t if run within sandbox_web_t.- Dontaudit sandb
- 0340: ox apps attempting to open user_devpts_t.- Allow dirsrv to read
- 0380: network state.- Fix pki_read_tomcat_lib_files.- Add labeling for
- 03c0: /usr/libexec/nm-ssh-service.- Add label cert_t for /var/lib/ipa
- 0400: /pki-ca/publish.- Lets label /sys/fs/cgroup as cgroup_t for now,
- 0440: to keep labels consistant.- Allow nfsd_t to mounton nfsd_fs_t.-
- 0480: Dontaudit sandbox apps attempting to open user_devpts_t.- Allow
- 04c0: passwd_t to change role to system_r from unconfined_r.- Don't a
- 0500: udit access checks by sandbox xserver on xdb var_lib.- Allow nto
- 0540: p to read usbmon devices.- Add labeling for new polcykit authori
- 0580: zor.- Dontaudit access checks from fail2ban_client.- Don't audit
- 05c0: access checks by sandbox xserver on xdb var_lib.- Allow apps th
- 0600: at connect to xdm stream to conenct to xdm_dbusd_t stream.- Fix
- 0640: labeling for all /usr/bim/razor-lightdm-* binaries.- Add filenam
- 0680: e trans for /dev/md126p1.- Make vdagent able to request loading
- 06c0: kernel module.- Add support for cloud-init make it as unconfined
- 0700: domain.- Allow snmpd to run smartctl in fsadm_t domain.- remove
- 0740: duplicate openshift_search_lib() interface.- Allow mysqld to se
- 0780: arch openshift lib files.- Allow openshift cgroup to interact wi
- 07c0: th passedin file descriptors.- Allow colord to list directories
- 0800: inthe users homedir.- aide executes prelink to check files.- Mak
- 0840: e sure cupsd_t creates content in /etc/cups with the correct lab
- 0880: el.- Lest dontaudit apache read all domains, so passenger will n
- 08c0: ot cause this avc.- Allow gssd to connect to gssproxy.- systemd-
- 0900: tmpfiles needs to be able to raise the level to fix labeling on
- 0940: /run/setrans in MLS.- Allow systemd-tmpfiles to relabel also loc
- 0980: k files.- Allow useradd to add homdir in /var/lib/openshift.- Al
- 09c0: low setfiles and semanage to write output to /run/files.- Add la
- 0a00: beling for /dev/tgt.- Dontaudit leak fd from firewalld for modpr
- 0a40: obe.- Allow runuser running as rpm_script_t to create netlink_au
- 0a80: dit socket.- Allow mdadm to read BIOS non-volatile RAM.- account
- 0ac0: service watches when accounts come and go in wtmp.- /usr/java/jr
- 0b00: e1.7.0_21/bin/java needs to create netlink socket.- Add httpd_us
- 0b40: e_sasl boolean.- Allow net_admin for tuned_t.- iscsid needs sys_
- 0b80: module to auto-load kernel modules.- Allow blueman to read bluet
- 0bc0: ooth conf.- Add nova_manage_lib_files() interface.- Fix mplayer_
- 0c00: filetrans_home_content().- Add mplayer_filetrans_home_content().
- 0c40: - mozilla_plugin_config_roles need to be able to access mozilla_
- 0c80: plugin_config_t.- Revert "Allow thumb_t to append inherited xdm
- 0cc0: stream socket".- Add iscsi_filetrans_named_content() interface.-
- 0d00: Allow to create .mplayer with the correct labeling for unconfin
- 0d40: ed.- Allow iscsiadmin to create lock file with the correct label
- 0d80: ing.- Allow wine to manage wine home content.- Make amanda worki
- 0dc0: ng with socket actiovation.- Add labeling for /usr/sbin/iscsiadm
- 0e00: .- Add support for /var/run/gssproxy.sock.- dnsmasq_t needs to r
- 0e40: ead sysctl_net_t.- Fix courier_domain_template() interface.- All
- 0e80: ow blueman to write ip_forward.- Allow mongodb to connect to mon
- 0ec0: godb port.- Allow mongodb to connect to mongodb port.- Allow jav
- 0f00: a to bind jobss_debug port.- Fixes for *_admin interfaces.- Allo
- 0f40: w iscsid auto-load kernel modules needed for proper iSCSI functi
- 0f80: onality.- Need to assign attribute for courier_domain to all cou
- 0fc0: rier_domains.- Fail2ban reads /etc/passwd.- postfix_virtual will
- 1000: create new files in postfix_spool_t.- abrt triggers sys_ptrace
- 1040: by running pidof.- Label ~/abc as mozilla_home_t, since java app
- 1080: s as plugin want to create it.- Add passenger fixes needed by fo
- 10c0: reman.- Remove dup interfaces.- Add additional interfaces for qu
- 1100: antum.- Add new interfaces for dnsmasq.- Allow passenger to rea
- 1140: d localization and send signull to itself.- Allow dnsmasq to str
- 1180: eam connect to quantum.- Add quantum_stream_connect().- Make sur
- 11c0: e that mcollective starts the service with the correct labeling.
- 1200: - Add labels for ~/.manpath.- Dontaudit attempts by svirt_t to g
- 1240: etpw* calls.- sandbox domains are trying to look at parent proce
- 1280: ss data.- Allow courior auth to create its pid file in /var/spoo
- 12c0: l/courier subdir.- Add fixes for beam to have it working with co
- 1300: uchdb.- Add labeling for /run/nm-xl2tpd.con.- Allow apache to st
- 1340: ream connect to thin.- Add systemd support for amand.- Make publ
- 1380: ic types usable for fs mount points.- Call correct mandb interfa
- 13c0: ce in domain.te.- Allow iptables to r/w quantum inherited pipes
- 1400: and send sigchld.- Allow ifconfig domtrans to iptables and execu
- 1440: te ldconfig.- Add labels for ~/.manpath.- Allow systemd to read
- 1480: iscsi lib files.- seunshare is trying to look at parent process
- 14c0: data.- Fix openshift_search_lib.- Add support for abrt-uefioops-
- 1500: oops.- Allow colord to getattr any file system.- Allow chrome pr
- 1540: ocesses to look at each other.- Allow sys_ptrace for abrt_t.- Ad
- 1580: d new policy for gssproxy.- Dontaudit leaked file descriptor wri
- 15c0: tes from firewalld.- openshift_net_type is interface not templat
- 1600: e.- Dontaudit pppd to search gnome config.- Update openshift_sea
- 1640: rch_lib() interface.- Add fs_list_pstorefs().- Fix label on libb
- 1680: cm_host.so since it is built incorrectly on raspberry pi, needs
- 16c0: back port to F18.- Better labels for raspberry pi devices.- Allo
- 1700: w init to create devpts_t directory.- Temporarily label rasbery
- 1740: pi devices as memory_device_t, needs back port to f18.- Allow sy
- 1780: sadm_t to build kernels.- Make sure mount creates /var/run/blkid
- 17c0: with the correct label, needs back port to F18.- Allow userdoma
- 1800: ins to stream connect to gssproxy.- Dontaudit leaked file descri
- 1840: ptor writes from firewalld.- Allow xserver to read /dev/urandom.
- 1880: - Add additional fixes for ipsec-mgmt.- Make SSHing into an Open
- 18c0: shift Enterprise Node working.- Add transition rules to unconfin
- 1900: ed domains and to sysadm_t to create /etc/adjtime.- with the pro
- 1940: per label..- Update files_filetrans_named_content() interface to
- 1980: get right labeling for pam.d conf files.- Allow systemd-timedat
- 19c0: ed to create adjtime.- Add clock_create_adjtime().- Additional f
- 1a00: ix ifconfing for #966106.- Allow kernel_t to create boot.log wit
- 1a40: h correct labeling.- Remove unconfined_mplayer for which we don'
- 1a80: t have rules.- Rename interfaces.- Add userdom_manage_user_home_
- 1ac0: files/dirs interfaces.- Fix files_dontaudit_read_all_non_securit
- 1b00: y_files.- Fix ipsec_manage_key_file().- Fix ipsec_filetrans_key_
- 1b40: file().- Label /usr/bin/razor-lightdm-greeter as xdm_exec_t inst
- 1b80: ead of spamc_exec_t.- Fix labeling for ipse.secrets.- Add interf
- 1bc0: aces for ipsec and labeling for ipsec.info and ipsec_setup.pid.-
- 1c00: Add files_dontaudit_read_all_non_security_files() interface.- /
- 1c40: var/log/syslog-ng should be labeled var_log_t.- Make ifconfig_va
- 1c80: r_run_t a mountpoint.- Add transition from ifconfig to dnsmasq.-
- 1cc0: Allow ifconfig to execute bin_t/shell_exec_t.- We want to have
- 1d00: hwdb.bin labeled as etc_t.- update logging_filetrans_named_conte
- 1d40: nt() interface.- Allow systemd_timedate_t to manage /etc/adjtime
- 1d80: .- Allow NM to send signals to l2tpd.- Update antivirus_can_scan
- 1dc0: _system boolean.- Allow devicekit_disk_t to sys_config_tty.- Run
- 1e00: abrt-harvest programs as abrt_t, and allow abrt_t to list all f
- 1e40: ilesystem directories.- Make printing from vmware working.- Allo
- 1e80: w php-cgi from php54 collection to access /var/lib/net-snmp/mib_
- 1ec0: indexes.- Add virt_qemu_ga_data_t for qemu-ga.- Make chrome and
- 1f00: mozilla able to connect to same ports, add jboss_management_port
- 1f40: _t to both.- Fix typo in virt.te.- Add virt_qemu_ga_unconfined_t
- 1f80: for hook scripts.- Make sure NetworkManager files get created w
- 1fc0: ith the correct label.- Add mozilla_plugin_use_gps boolean.- Fix
- 2000: cyrus to have support for net-snmp.- Additional fixes for dnsma
- 2040: sq and quantum for #966106.- Add plymouthd_create_log().- remove
- 2080: httpd_use_oddjob for which we don't have rules.- Add missing ru
- 20c0: les for httpd_can_network_connect_cobbler.- Add missing cluster_
- 2100: use_execmem boolean.- Call userdom_manage_all_user_home_type_fil
- 2140: es/dirs.- Additional fix for ftp_home_dir.- Fix ftp_home_dir boo
- 2180: lean.- Allow squit to recv/send client squid packet.- Fix nut.te
- 21c0: to have nut_domain attribute.- Add support for ejabberd; TODO:
- 2200: revisit jabberd and rabbit policy.- Fix amanda policy.- Add more
- 2240: fixes for domains which use libusb.- Make domains which use lib
- 2280: usb working correctly.- Allow l2tpd to create ipsec key files wi
- 22c0: th correct labeling and manage them.- Fix cobbler_manage_lib_fil
- 2300: es/cobbler_read_lib_files to cover also lnk files.- Allow rabbit
- 2340: mq-beam to bind generic node.- Allow l2tpd to read ipse-mgmt pid
- 2380: files.- more fixes for l2tpd, NM and pppd from #967072.- Dontau
- 23c0: dit to getattr on dirs for dovecot-deliver.- Allow raiudusd serv
- 2400: er connect to postgresql socket.- Add kerberos support for radiu
- 2440: sd.- Allow saslauthd to connect to ldap port.- Allow postfix to
- 2480: manage postfix_private_t files.- Add chronyd support for #965457
- 24c0: .- Fix labeling for HOME_DIR/\.icedtea.- CHange squid and snmpd
- 2500: to be allowed also write own logs.- Fix labeling for /usr/libexe
- 2540: c/qemu-ga.- Allow virtd_t to use virt_lock_t.- Allow also sealer
- 2580: t to read the policy from the kernel.- qemu-ga needs to execute
- 25c0: scripts in /usr/libexec/qemu-ga and to use /tmp content.- Dontau
- 2600: dit listing of users homedir by sendmail Seems like a leak.- All
- 2640: ow passenger to transition to puppet master.- Allow apache to co
- 2680: nnect to mythtv.- Add definition for mythtv ports.- Add addition
- 26c0: al fixes for #948073 bug.- Allow sge_execd_t to also connect to
- 2700: sge ports.- Allow openshift_cron_t to manage openshift_var_lib_t
- 2740: sym links.- Allow openshift_cron_t to manage openshift_var_lib_
- 2780: t sym links.- Allow sge_execd to bind sge ports. Allow kill capa
- 27c0: bility and reads cgroup files.- Remove pulseaudio filetrans puls
- 2800: eaudio_manage_home_dirs which is a part of pulseaudio_manage_hom
- 2840: e_files.- Add networkmanager_stream_connect().- Make gnome-abrt
- 2880: wokring with staff_t.- Fix openshift_manage_lib_files() interfac
- 28c0: e.- mdadm runs ps command which seems to getattr on random log f
- 2900: iles.- Allow mozilla_plugin_t to create pulseaudit_home_t direct
- 2940: ories.- Allow qemu-ga to shutdown virtual hosts.- Add labelling
- 2980: for cupsd-browsed.- Add web browser plugins to connect to aol po
- 29c0: rts.- Allow nm-dhcp-helper to stream connect to NM.- Add port de
- 2a00: finition for sge ports.- Make sure users and unconfined domains
- 2a40: create .hushlogin with the correct label.- Allow pegaus to chat
- 2a80: with realmd over DBus.- Allow cobblerd to read network state.- A
- 2ac0: llow boicn-client to stat on /dev/input/mice.- Allow certwatch t
- 2b00: o read net_config_t when it executes apache.- Allow readahead to
- 2b40: create /run/systemd and then create its own directory with the
- 2b80: correct label.- Transition directories and files when in a user_
- 2bc0: tmp_t directory.- Change certwatch to domtrans to apache instead
- 2c00: of just execute.- Allow virsh_t to read xen lib files.- update
- 2c40: policy rules for pegasus_openlmi_account_t.- Add support for svn
- 2c80: serve_tmp_t.- Activate account openlmi policy.- pegasus_openlmi_
- 2cc0: domain_template needs also require pegasus_t.- One more fix for
- 2d00: policykit.te.- Call fs_list_cgroups_dirs() in policykit.te.- All
- 2d40: ow nagios service plugin to read mysql config files.- Add labeli
- 2d80: ng for /var/svn.- Fix chrome.te.- Fix pegasus_openlmi_domain_tem
- 2dc0: plate() interfaces.- Fix dev_rw_vfio_dev definiton, allow virtd_
- 2e00: t to read tmpfs_t symlinks.- Fix location of google-chrome data.
- 2e40: - Add support for chome_sandbox to store content in the homedir.
- 2e80: - Allow policykit to watch for changes in cgroups file system.-
- 2ec0: Add boolean to allow mozilla_plugin_t to use spice.- Allow coll
- 2f00: ectd to bind to udp port.- Allow collected_t to read all of /pro
- 2f40: c.- Should use netlink socket_perms.- Should use netlink socket_
- 2f80: perms.- Allow glance domains to connect to apache ports.- Allow
- 2fc0: apcupsd_t to manage its log files.- Allow chrome objects to rw_i
- 3000: nherited unix_stream_socket from callers.- Allow staff_t to exec
- 3040: ute virtd_exec_t for running vms.- nfsd_t needs to bind mountd p
- 3080: ort to make nfs-mountd.service working.- Allow unbound net_admin
- 30c0: capability because of setsockopt syscall.- Fix fs_list_cgroup_d
- 3100: irs().- Label /usr/lib/nagios/plugins/utils.pm as bin_t.- Remove
- 3140: uplicate definition of fs_read_cgroup_files().- Remove duplicat
- 3180: e definition of fs_read_cgroup_files().- Add files_mountpoint_fi
- 31c0: letrans interface to be used by quotadb_t and snapperd.- Additio
- 3200: nal interfaces needed to list and read cgroups config.- Add port
- 3240: definition for collectd port.- Add labels for /dev/ptp*.- Allow
- 3280: staff_t to execute virtd_exec_t for running vms.- Allow samba-n
- 32c0: et to also read realmd tmp files.- Allow NUT to use serial ports
- 3300: .- realmd can be started by systemctl now.- Remove userdom_home_
- 3340: manager for xdm_t and move all rules to xserver.te directly.- Ad
- 3380: d new xdm_write_home boolean to allow xdm_t to create files in H
- 33c0: OME dirs with xdm_home_t.- Allow postfix-showq to read/write uni
- 3400: x.showq in /var/spool/postfix/pid.- Allow virsh to read xen lock
- 3440: file.- Allow qemu-ga to create files in /run with proper labeli
- 3480: ng.- Allow glusterd to connect to own socket in /tmp.- Allow gla
- 34c0: nce-api to connect to http port to make glance image-create work
- 3500: ing.- Allow keystonte_t to execute rpm.- Fix realmd cache interf
- 3540: aces.- Allow tcpd to execute leafnode.- Allow samba-net to read
- 3580: realmd cache files.- Dontaudit sys_tty_config for alsactl.- Fix
- 35c0: allow rules for postfix_var_run.- Allow cobblerd to read /etc/pa
- 3600: sswd.- Allow pegasus to read exports.- Allow systemd-timedate to
- 3640: read xdm state.- Allow mout to stream connect to rpcbind.- Add
- 3680: labeling just for /usr/share/pki/ca-trust-source instead of /usr
- 36c0: /share/pki.- Allow thumbnails to share memory with apps which ru
- 3700: n thumbnails.- Allow postfix-postqueue block_suspend.- Add lib i
- 3740: nterfaces for smsd.- Add support for nginx.- Allow s2s running a
- 3780: s jabberd_t to connect to jabber_interserver_port_t.- Allow pki
- 37c0: apache domain to create own tmp files and execute httpd_suexec.-
- 3800: Allow procmail to manger user tmp files/dirs/lnk_files.- Add vi
- 3840: rt_stream_connect_svirt() interface.- Allow dovecot-auth to exec
- 3880: ute bin_t.- Allow iscsid to request that kernel load a kernel mo
- 38c0: dule.- Add labeling support for /var/lib/mod_security.- Allow iw
- 3900: running as tuned_t to create netlink socket.- Dontaudit sys_tty
- 3940: _config for thumb_t.- Add labeling for nm-l2tp-service.- Allow h
- 3980: ttpd running as certwatch_t to open tcp socket.- Allow useradd t
- 39c0: o manager smsd lib files.- Allow useradd_t to add homedirs in /v
- 3a00: ar/lib.- Fix typo in userdomain.te.- Cleanup userdom_read_home_c
- 3a40: erts.- Implement userdom_home_reader_certs_type to allow read ce
- 3a80: rts also on encrypt /home with ecryptfs_t.- Allow staff to strea
- 3ac0: m connect to svirt_t to make gnome-boxes working.- Allow lvm to
- 3b00: create its own unit files.- Label /var/lib/sepolgen as selinux_c
- 3b40: onfig_t.- Add filetrans rules for tw devices.- Add transition fr
- 3b80: om cupsd_config_t to cupsd_t.- Add filetrans rules for tw device
- 3bc0: s.- Cleanup bad transition lines.- Fix lockdev_manage_files().-
- 3c00: Allow setroubleshootd to read var_lib_t to make email_alert work
- 3c40: ing.- Add lockdev_manage_files().- Call proper interface in virt
- 3c80: .te.- Allow gkeyring_domain to create /var/run/UID/config/dbus f
- 3cc0: ile.- system dbus seems to be blocking suspend.- Dontaudit attem
- 3d00: ps to sys_ptrace, which I believe gpsd does not need.- When you
- 3d40: enter a container from root, you generate avcs with a leaked fil
- 3d80: e descriptor.- Allow mpd getattr on file system directories.- Ma
- 3dc0: ke sure realmd creates content with the correct label.- Allow sy
- 3e00: stemd-tty-ask to write kmsg.- Allow mgetty to use lockdev librar
- 3e40: y for device locking.- Fix selinuxuser_user_share_music boolean
- 3e80: name to selinuxuser_share_music.- When you enter a container fro
- 3ec0: m root, you generate avcs with a leaked file descriptor.- Make s
- 3f00: ure init.fc files are labeled correctly at creation.- File name
- 3f40: trans vconsole.conf.- Fix labeling for nagios plugins.- label sh
- 3f80: ared libraries in /opt/google/chrome as testrel_shlib_t.- Allow
- 3fc0: certmonger to dbus communicate with realmd .- Make realmd workin
- 13:00:16.874029 <= Recv data, 16384 bytes (0x4000)
- 0000: g.- Fix mozilla specification of homedir content.- Allow certmon
- 0040: ger to read network state.- Allow tmpwatch to read tmp in /var/s
- 0080: pool/{cups,lpd}.- Label all nagios plugin as unconfined by defau
- 00c0: lt.- Add httpd_serve_cobbler_files().- Allow mdadm to read /dev/
- 0100: sr0 and create tmp files.- Allow certwatch to send mails.- Fix l
- 0140: abeling for nagios plugins.- label shared libraries in /opt/goog
- 0180: le/chrome as testrel_shlib_t.- Allow realmd to run ipa, really n
- 01c0: eeds to be an unconfined_domain.- Allow sandbox domains to use i
- 0200: nherted terminals.- Allow pscd to use devices labeled svirt_imag
- 0240: e_t in order to use cat cards..- Add label for new alsa pid.- Al
- 0280: sa now uses a pid file and needs to setsched .- Fix oracleasmfs_
- 02c0: t definition.- Add support for sshd_unit_file_t.- Add oracleasmf
- 0300: s_t.- Allow unlabeled_t files to be stored on unlabeled_t filesy
- 0340: stems.- Fix description of deny_ptrace boolean.- Remove allow fo
- 0380: r execmod lib_t for now.- Allow quantum to connect to keystone p
- 03c0: ort.- Allow nova-console to talk with mysql over unix stream soc
- 0400: ket.- Allow dirsrv to stream connect to uuidd.- thumb_t needs to
- 0440: be able to create ~/.cache if it does not exist.- virtd needs t
- 0480: o be able to sys_ptrace when starting and stoping containers.- A
- 04c0: llow alsa_t signal_perms, we probaly should search for any app t
- 0500: hat can execute something without transition and give it signal_
- 0540: perms....- Add dontaudit for mozilla_plugin_t looking at the xdm
- 0580: _t sockets.- Fix deny_ptrace boolean, certain ptrace leaked into
- 05c0: the system.- Allow winbind to manage kerberos_rcache_host.- All
- 0600: ow spamd to create spamd_var_lib_t directories.- Remove transiti
- 0640: on to mozilla_tmp_t by mozilla_t, to allow it to manage the user
- 0680: s tmp dirs.- Add mising nslcd_dontaudit_write_sock_file() interf
- 06c0: ace.- one more fix.- Fix pki_read_tomcat_lib_files() interface.-
- 0700: Allow certmonger to read pki-tomcat lib files.- Allow certwatch
- 0740: to execute bin_t.- Allow snmp to manage /var/lib/net-snmp files
- 0780: .- Call snmp_manage_var_lib_files(fogorn_t) instead of snmp_mana
- 07c0: ge_var_dirs.- Fix vmware_role() interface.- Fix cobbler_manage_l
- 0800: ib_files() interface.- Allow nagios check disk plugins to execut
- 0840: e bin_t.- Allow quantum to transition to openvswitch_t.- Allow p
- 0880: ostdrop to stream connect to postfix-master.- Allow quantum to s
- 08c0: tream connect to openvswitch.- Add xserver_dontaudit_xdm_rw_stre
- 0900: am_sockets() interface.- Allow daemon to send dgrams to initrc_t
- 0940: .- Allow kdm to start the power service to initiate a reboot or
- 0980: poweroff.- Add mising nslcd_dontaudit_write_sock_file() interfac
- 09c0: e.- one more fix.- Fix pki_read_tomcat_lib_files() interface.- A
- 0a00: llow certmonger to read pki-tomcat lib files.- Allow certwatch t
- 0a40: o execute bin_t.- Allow snmp to manage /var/lib/net-snmp files.-
- 0a80: Don't audit attempts to write to stream socket of nscld by thum
- 0ac0: bnailers.- Allow git_system_t to read network state.- Allow pega
- 0b00: sas to execute mount command.- Fix desc for drdb_admin.- Fix con
- 0b40: dor_amin().- Interface fixes for uptime, vdagent, vnstatd.- Fix
- 0b80: labeling for moodle in /var/www/moodle/data.- Add interface fixe
- 0bc0: s.- Allow bugzilla to read certs.- /var/www/moodle needs to be w
- 0c00: ritable by apache.- Add interface to dontaudit attempts to send
- 0c40: dbus messages to systemd domains, for xguest.- Fix namespace_ini
- 0c80: t_t to create content with proper labels, and allow it to manage
- 0cc0: all user content.- Allow httpd_t to connect to osapi_compute po
- 0d00: rt using httpd_use_openstack bolean.- Fixes for dlm_controld.- F
- 0d40: ix apache_read_sys_content_rw_dirs() interface.- Allow logrotate
- 0d80: to read /var/log/z-push dir.- Fix sys_nice for cups_domain.- Al
- 0dc0: low postfix_postdrop to acces postfix_public socket.- Allow sche
- 0e00: d_setscheduler for cupsd_t.- Add missing context for /usr/sbin/s
- 0e40: nmpd.- Kernel_t needs mac_admin in order to support labeled NFS.
- 0e80: - Fix systemd_dontaudit_dbus_chat() interface.- Add interface to
- 0ec0: dontaudit attempts to send dbus messages to systemd domains, fo
- 0f00: r xguest.- Allow consolehelper domain to write Xauth files in /r
- 0f40: oot.- Add port definition for osapi_compute port.- Allow unconfi
- 0f80: ned to create /etc/hostname with correct labeling.- Add systemd_
- 0fc0: filetrans_named_hostname() interface.- Allow httpd_t to connect
- 1000: to osapi_compute port using httpd_use_openstack bolean.- Fixes f
- 1040: or dlm_controld.- Fix apache_read_sys_content_rw_dirs() interfac
- 1080: e.- Allow logrotate to read /var/log/z-push dir.- Allow postfix_
- 10c0: postdrop to acces postfix_public socket.- Allow sched_setschedul
- 1100: er for cupsd_t.- Add missing context for /usr/sbin/snmpd.- Allow
- 1140: consolehelper more access discovered by Tom London.- Allow fsda
- 1180: emon to send signull to all domain.- Add port definition for osa
- 11c0: pi_compute port.- Allow unconfined to create /etc/hostname with
- 1200: correct labeling.- Add systemd_filetrans_named_hostname() interf
- 1240: ace.- Fix file_contexts.subs to label /run/lock correctly.- Try
- 1280: to label on controlC devices up to 30 correctly.- Add mount_rw_p
- 12c0: id_files() interface.- Add additional mount/umount interfaces ne
- 1300: eded by mock.- fsadm_t sends audit messages in reads kernel_ipc_
- 1340: info when doing livecd-iso-to-disk.- Fix tabs.- Allow initrc_dom
- 1380: ain to search rgmanager lib files.- Add more fixes which make mo
- 13c0: ck working together with confined users. * Allow mock_t to mana
- 1400: ge rpm files. * Allow mock_t to read rpm log files. * Allow mo
- 1440: ck to setattr on tmpfs, devpts. * Allow mount/umount filesystem
- 1480: s.- Add rpm_read_log() interface.- yum-cron runs rpm from within
- 14c0: it..- Allow tuned to transition to dmidecode.- Allow firewalld
- 1500: to do net_admin.- Allow mock to unmont tmpfs_t.- Fix virt_sigkil
- 1540: l() interface.- Add additional fixes for mock. Mainly caused by
- 1580: mount running in mock_t.- Allow mock to write sysfs_t and mount
- 15c0: pid files.- Add mailman_domain to mailman_template().- Allow ope
- 1600: nvswitch to execute shell.- Allow qpidd to use kerberos.- Allow
- 1640: mailman to use fusefs, needs back port to RHEL6.- Allow apache a
- 1680: nd its scripts to use anon_inodefs.- Add alias for git_user_cont
- 16c0: ent_t and git_sys_content_t so that RHEL6 will update to RHEL7.-
- 1700: Realmd needs to connect to samba ports, needs back port to F18
- 1740: also.- Allow colord to read /run/initial-setup-.- Allow sanlock-
- 1780: helper to send sigkill to virtd which is registred to sanlock.-
- 17c0: Add virt_kill() interface.- Add rgmanager_search_lib() interface
- 1800: .- Allow wdmd to getattr on all filesystems. Back ported from RH
- 1840: EL6.- Allow realmd to create tmp files.- FIx ircssi_home_t type
- 1880: to irssi_home_t.- Allow adcli running as realmd_t to connect to
- 18c0: ldap port.- Allow NetworkManager to transition to ipsec_t, for r
- 1900: unning strongswan.- Make openshift_initrc_t an lxc_domain.- Allo
- 1940: w gssd to manage user_tmp_t files.- Fix handling of irclogs in u
- 1980: sers homedir.- Fix labeling for drupal an wp-content in subdirs
- 19c0: of /var/www/html.- Allow abrt to read utmp_t file.- Fix openshif
- 1a00: t policy to transition lnk_file, sock-file an fifo_file when cre
- 1a40: ated in a tmpfs_t, needs back port to RHEL6.- fix labeling for (
- 1a80: oo|rhc)-restorer-wrapper.sh.- firewalld needs to be able to writ
- 1ac0: e to network sysctls.- Fix mozilla_plugin_dontaudit_rw_sem() int
- 1b00: erface.- Dontaudit generic ipc read/write to a mozilla_plugin fo
- 1b40: r sandbox_x domains.- Add mozilla_plugin_dontaudit_rw_sem() inte
- 1b80: rface.- Allow svirt_lxc_t to transition to openshift domains.- A
- 1bc0: llow condor domains block_suspend and dac_override caps.- Allow
- 1c00: condor_master to read passd.- Allow condor_master to read system
- 1c40: state.- Allow NetworkManager to transition to ipsec_t, for runn
- 1c80: ing strongswan.- Lots of access required by lvm_t to created enc
- 1cc0: rypted usb device.- Allow xdm_t to dbus communicate with systemd
- 1d00: _localed_t.- Label strongswan content as ipsec_exec_mgmt_t for n
- 1d40: ow.- Allow users to dbus chat with systemd_localed.- Fix handlin
- 1d80: g of .xsession-errors in xserver.if, so kde will work.- Might be
- 1dc0: a bug but we are seeing avc's about people status on init_t:ser
- 1e00: vice.- Make sure we label content under /var/run/lock as <<none>
- 1e40: >.- Allow daemon and systemprocesses to search init_var_run_t di
- 1e80: rectory.- Add boolean to allow xdm to write xauth data to the ho
- 1ec0: me directory.- Allow mount to write keys for the unconfined doma
- 1f00: in.- Add unconfined_write_keys() interface.- Add labeling for /u
- 1f40: sr/share/pki.- Allow programs that read var_run_t symlinks also
- 1f80: read var_t symlinks.- Add additional ports as mongod_port_t for
- 1fc0: 27018, 27019, 28017, 28018 and 28019 ports.- Fix labeling for /
- 2000: etc/dhcp directory.- add missing systemd_stub_unit_file() interf
- 2040: ace.- Add files_stub_var() interface.- Add lables for cert_t dir
- 2080: ectories.- Make localectl set-x11-keymap working at all.- Allow
- 20c0: abrt to manage mock build environments to catch build problems..
- 2100: - Allow virt_domains to setsched for running gdb on itself.- All
- 2140: ow thumb_t to execute user home content.- Allow pulseaudio runni
- 2180: ng as mozilla_plugin_t to read /run/systemd/users/1000.- Allow c
- 21c0: ertwatch to execut /usr/bin/httpd.- Allow cgred to send signal p
- 2200: erms to itself, needs back port to RHEL6.- Allow openshift_cron_
- 2240: t to look at quota.- Allow cups_t to read inhered tmpfs_t from t
- 2280: he kernel.- Allow yppasswdd to use NIS.- Tuned wants sys_rawio c
- 22c0: apability.- Add ftpd_use_fusefs boolean.- Allow dirsrvadmin_t to
- 2300: signal itself.- Allow localectl to read /etc/X11/xorg.conf.d di
- 2340: rectory.- Revert "Revert "Fix filetrans rules for kdm creates .x
- 2380: session-errors"".- Allow mount to transition to systemd_passwd_a
- 23c0: gent.- Make sure abrt directories are labeled correctly.- Allow
- 2400: commands that are going to read mount pid files to search mount_
- 2440: var_run_t.- label /usr/bin/repoquery as rpm_exec_t.- Allow autom
- 2480: ount to block suspend.- Add abrt_filetrans_named_content so that
- 24c0: abrt directories get labeled correctly.- Allow virt domains to
- 2500: setrlimit and read file_context.- Allow nagios to manage nagios
- 2540: spool files.- /var/spool/snmptt is a directory which snmdp needs
- 2580: to write to, needs back port to RHEL6.- Add swift_alias.* polic
- 25c0: y files which contain typealiases for swift types.- Add support
- 2600: for /run/lock/opencryptoki.- Allow pkcsslotd chown capability.-
- 2640: Allow pkcsslotd to read passwd.- Add rsync_stub() interface.- Al
- 2680: low systemd_timedate also manage gnome config homedirs.- Label /
- 26c0: usr/lib64/security/pam_krb5/pam_krb5_cchelper as bin_t.- Fix fil
- 2700: etrans rules for kdm creates .xsession-errors.- Allow sytemd_tmp
- 2740: files to create wtmp file.- Really should not label content und
- 2780: er /var/lock, since it could have labels on it different from va
- 27c0: r_lock_t.- Allow systemd to list all file system directories.- A
- 2800: dd some basic stub interfaces which will be used in PRODUCT poli
- 2840: cies.- Fix log transition rule for cluster domains.- Start to gr
- 2880: oup all cluster log together.- Dont use filename transition for
- 28c0: POkemon Advanced Adventure until a new checkpolicy update.- cups
- 2900: uses usbtty_device_t devices.- These fixes were all required to
- 2940: build a MLS virtual Machine with single level desktops.- Allow
- 2980: domains to transiton using httpd_exec_t.- Allow svirt domains to
- 29c0: manage kernel key rings.- Allow setroubleshoot to execute ldcon
- 2a00: fig.- Allow firewalld to read generate gnome data.- Allow blueto
- 2a40: oth to read machine-info.- Allow boinc domain to send signal to
- 2a80: itself.- Fix gnome_filetrans_home_content() interface.- Allow mo
- 2ac0: zilla_plugins to list apache modules, for use with gxine.- Fix l
- 2b00: abels for POkemon in the users homedir.- Allow xguest to read md
- 2b40: stat.- Dontaudit virt_domains getattr on /dev/*.- These fixes we
- 2b80: re all required to build a MLS virtual Machine with single level
- 2bc0: desktops.- Need to back port this to RHEL6 for openshift.- Add
- 2c00: tcp/8891 as milter port.- Allow nsswitch domains to read sssd_va
- 2c40: r_lib_t files.- Allow ping to read network state..- Fix typo.- A
- 2c80: dd labels to /etc/X11/xorg.d and allow systemd-timestampd_t to m
- 2cc0: anage them.- Adopt swift changes from lhh@redhat.com.- Add rhcs_
- 2d00: manage_cluster_pid_files() interface.- Allow screen domains to c
- 2d40: onfigure tty and setup sock_file in ~/.screen directory.- ALlow
- 2d80: setroubleshoot to read default_context_t, needed to backport to
- 2dc0: F18.- Label /etc/owncloud as being an apache writable directory.
- 2e00: - Allow sshd to stream connect to an lxc domain.- Allow postgres
- 2e40: ql to manage rgmanager pid files.- Allow postgresql to read ccs
- 2e80: data.- Allow systemd_domain to send dbus messages to policykit.-
- 2ec0: Add labels for /etc/hostname and /etc/machine-info and allow sy
- 2f00: stemd-hostnamed to create them.- All systemd domains that create
- 2f40: content are reading the file_context file and setfscreate.- Sys
- 2f80: temd domains need to search through init_var_run_t.- Allow sshd
- 2fc0: to communicate with libvirt to set containers labels.- Add inter
- 3000: face to manage pid files.- Allow NetworkManger_t to read /etc/ho
- 3040: stname.- Dontaudit leaked locked files into openshift_domains.-
- 3080: Add fixes for oo-cgroup-read - it nows creates tmp files.- Allow
- 30c0: gluster to manage all directories as well as files.- Dontaudit
- 3100: chrome_sandbox_nacl_t using user terminals.- Allow sysstat to ma
- 3140: nage its own log files.- Allow virtual machines to setrlimit and
- 3180: send itself signals..- Add labeling for /var/run/hplip.- Fix PO
- 31c0: STIN scriptlet.- Merge rgmanger, corosync,pacemaker,aisexec poli
- 3200: cies to cluster_t in rhcs.pp.- Fix authconfig.py labeling.- Make
- 3240: any domains that write homedir content do it correctly.- Allow
- 3280: glusterd to read/write anyhwere on the file system by default.-
- 32c0: Be a little more liberal with the rsync log files.- Fix iscsi_ad
- 3300: min interface.- Allow iscsid_t to read /dev/urand.- Fix up iscsi
- 3340: domain for use with unit files.- Add filename transition suppor
- 3380: t for spamassassin policy.- Allow web plugins to use badly forma
- 33c0: ted libraries.- Allow nmbd_t to create samba_var_t directories.-
- 3400: Add filename transition support for spamassassin policy.- Add f
- 3440: ilename transition support for tvtime.- Fix alsa_home_filetrans_
- 3480: alsa_home() interface.- Move all userdom_filetrans_home_content(
- 34c0: ) calling out of booleans.- Allow logrotote to getattr on all fi
- 3500: le sytems.- Remove duplicate userdom_filetrans_home_content() ca
- 3540: lling.- Allow kadmind to read /etc/passwd.- Dontaudit append .xs
- 3580: ession-errors file on ecryptfs for policykit-auth.- Allow antiv
- 35c0: irus domain to manage antivirus db links.- Allow logrotate to re
- 3600: ad /sys.- Allow mandb to setattr on man dirs.- Remove mozilla_pl
- 3640: ugin_enable_homedirs boolean.- Fix ftp_home_dir boolean.- homedi
- 3680: r mozilla filetrans has been moved to userdom_home_manager.- hom
- 36c0: edir telepathy filetrans has been moved to userdom_home_manager.
- 3700: - Remove gnome_home_dir_filetrans() from gnome_role_gkeyringd().
- 3740: - Might want to eventually write a daemon on fusefsd..- Add poli
- 3780: cy fixes for sshd [net] child from plautrba@redhat.com.- Tor use
- 37c0: s a new port.- Remove bin_t for authconfig.py.- Fix so only one
- 3800: call to userdom_home_file_trans.- Allow home_manager_types to cr
- 3840: eate content with the correctl label.- Fix all domains that writ
- 3880: e data into the homedir to do it with the correct label.- Change
- 38c0: the postgresql to use proper boolean names, which is causing ht
- 3900: tpd_t to.- not get access to postgresql_var_run_t.- Hostname nee
- 3940: ds to send syslog messages.- Localectl needs to be able to send
- 3980: dbus signals to users.- Make sure userdom_filetrans_type will cr
- 39c0: eate files/dirs with user_home_t labeling by default.- Allow use
- 3a00: r_home_manger domains to create spam* homedir content with corre
- 3a40: ct labeling.- Allow user_home_manger domains to create HOMEDIR/.
- 3a80: tvtime with correct labeling.- Add missing miscfiles_setattr_man
- 3ac0: _pages() interface and for now comment some rules for userdom_fi
- 3b00: letrans_type to make build process working.- Declare userdom_fil
- 3b40: etrans_type attribute.- userdom_manage_home_role() needs to be c
- 3b80: alled withoout usertype attribute because of userdom_filetrans_t
- 3bc0: ype attribute.- fusefsd is mounding a fuse file system on /run/u
- 3c00: ser/UID/gvfs.- Man pages are now generated in the build process.
- 3c40: - Allow cgred to list inotifyfs filesystem.- Allow gluster to ge
- 3c80: t attrs on all fs.- New access required for virt-sandbox.- Allow
- 3cc0: dnsmasq to execute bin_t.- Allow dnsmasq to create content in /
- 3d00: var/run/NetworkManager.- Fix openshift_initrc_signal() interface
- 3d40: .- Dontaudit openshift domains doing getattr on other domains.-
- 3d80: Allow consolehelper domain to communicate with session bus.- Moc
- 3dc0: k should not be transitioning to any other domains, we should k
- 3e00: eep mock_t as mock_t.- Update virt_qemu_ga_t policy.- Allow auth
- 3e40: config running from realmd to restart oddjob service.- Add syste
- 3e80: md support for oddjob.- Add initial policy for realmd_consolehel
- 3ec0: per_t which if for authconfig executed by realmd.- Add labeling
- 3f00: for gnashpluginrc.- Allow chrome_nacl to execute /dev/zero.- All
- 3f40: ow condor domains to read /proc.- mozilla_plugin_t will getattr
- 3f80: on /core if firefox crashes.- Allow condor domains to read /etc/
- 3fc0: passwd.- Allow dnsmasq to execute shell scripts, openstack requi
- 13:00:16.878540 <= Recv data, 16384 bytes (0x4000)
- 0000: res this access.- Fix glusterd labeling.- Allow virtd_t to inter
- 0040: act with the socket type.- Allow nmbd_t to override dac if you t
- 0080: urned on sharing all files.- Allow tuned to created kobject_ueve
- 00c0: nt socket.- Allow guest user to run fusermount.- Allow openshift
- 0100: to read /proc and locale.- Allow realmd to dbus chat with rpm.-
- 0140: Add new interface for virt.- Remove depracated interfaces.- All
- 0180: ow systemd_domains read access on etc, etc_runtime and usr files
- 01c0: , also allow them to connect stream to syslog socket.- /usr/shar
- 0200: e/munin/plugins/plugin.sh should be labeled as bin_t.- Remove so
- 0240: me more unconfined_t process transitions, that I don't believe a
- 0280: re necessary.- Stop transitioning uncofnined_t to checkpc.- dmra
- 02c0: id creates /var/lock/dmraid.- Allow systemd_localed to creatre u
- 0300: nix_dgram_sockets.- Allow systemd_localed to write kernel messag
- 0340: es..- Also cleanup systemd definition a little..- Fix userdom_re
- 0380: stricted_xwindows_user_template() interface.- Label any block de
- 03c0: vices or char devices under /dev/infiniband as fixed_disk_device
- 0400: _t.- User accounts need to dbus chat with accountsd daemon.- Gno
- 0440: me requires all users to be able to read /proc/1/.- virsh now do
- 0480: es a setexeccon call.- Additional rules required by openshift do
- 04c0: mains.- Allow svirt_lxc_domains to use inherited terminals, need
- 0500: ed to make virt-sandbox-service execute work.- Allow spamd_updat
- 0540: e_t to search spamc_home_t.- Avcs discovered by mounting an isci
- 0580: device under /mnt.- Allow lspci running as logrotate to read pc
- 05c0: i.ids.- Additional fix for networkmanager_read_pid_files().- Fix
- 0600: networkmanager_read_pid_files() interface.- Allow all svirt dom
- 0640: ains to connect to svirt_socket_t.- Allow virsh to set SELinux c
- 0680: ontext for a process..- Allow tuned to create netlink_kobject_ue
- 06c0: vent_socket.- Allow systemd-timestamp to set SELinux context.- A
- 0700: dd support for /var/lib/systemd/linger.- Fix ssh_sysadm_login to
- 0740: be working on MLS as expected.- Rename files_rw_inherited_tmp_f
- 0780: iles to files_rw_inherited_tmp_file.- Add missing files_rw_inher
- 07c0: ited_tmp_files interface.- Add additional interface for ecryptfs
- 0800: .- ALlow nova-cert to connect to postgresql.- Allow keystone to
- 0840: connect to postgresql.- Allow all cups domains to getattr on fil
- 0880: esystems.- Allow pppd to send signull.- Allow tuned to execute l
- 08c0: dconfig.- Allow gpg to read fips_enabled.- Add additional fixes
- 0900: for ecryptfs.- Allow httpd to work with posgresql.- Allow keysto
- 0940: ne getsched and setsched.- Allow gpg to read fips_enabled.- Add
- 0980: support for /var/cache/realmd.- Add support for /usr/sbin/blazer
- 09c0: _usb and systemd support for nut.- Add labeling for fenced_sanlo
- 0a00: ck and allow sanclok transition to fenced_t.- bitlbee wants to r
- 0a40: ead own log file.- Allow glance domain to send a signal itself.-
- 0a80: Allow xend_t to request that the kernel load a kernel module.-
- 0ac0: Allow pacemaker to execute heartbeat lib files.- cleanup new swi
- 0b00: ft policy.- Fix smartmontools.- Fix userdom_restricted_xwindows_
- 0b40: user_template() interface.- Add xserver_xdm_ioctl_log() interfac
- 0b80: e.- Allow Xusers to ioctl lxdm.log to make lxdm working.- Add ML
- 0bc0: S fixes to make MLS boot/log-in working.- Add mls_socket_write_a
- 0c00: ll_levels() also for syslogd.- fsck.xfs needs to read passwd.- F
- 0c40: ix ntp_filetrans_named_content calling in init.te.- Allow postgr
- 0c80: esql to create pg_log dir.- Allow sshd to read rsync_data_t to m
- 0cc0: ake rsync <backuphost> working.- Change ntp.conf to be labeled n
- 0d00: et_conf_t.- Allow useradd to create homedirs in /run. ircd-ratb
- 0d40: ox does this and we should just allow it.- Allow xdm_t to execut
- 0d80: e gstreamer home content.- Allod initrc_t and unconfined domains
- 0dc0: , and sysadm_t to manage ntp.- New policy for openstack swift do
- 0e00: mains.- More access required for openshift_cron_t.- Use cupsd_lo
- 0e40: g_t instead of cupsd_var_log_t.- rpm_script_roles should be used
- 0e80: in rpm_run.- Fix rpm_run() interface.- Fix openshift_initrc_run
- 0ec0: ().- Fix sssd_dontaudit_stream_connect() interface.- Fix sssd_do
- 0f00: ntaudit_stream_connect() interface.- Allow LDA's job to deliver
- 0f40: mail to the mailbox.- dontaudit block_suspend for mozilla_plugin
- 0f80: _t.- Allow l2tpd_t to all signal perms.- Allow uuidgen to read /
- 0fc0: dev/random.- Allow mozilla-plugin-config to read power_supply in
- 1000: fo.- Implement cups_domain attribute for cups domains.- We now n
- 1040: eed access to user terminals since we start by executing a comma
- 1080: nd outside the tty.- We now need access to user terminals since
- 10c0: we start by executing a command outside the tty.- svirt lxc cont
- 1100: ainers want to execute userhelper apps, need these changes to al
- 1140: low this to happen.- Add containment of openshift cron jobs.- Al
- 1180: low system cron jobs to create tmp directories.- Make userhelp_c
- 11c0: onf_t a config file.- Change rpm to use rpm_script_roles.- More
- 1200: fixes for rsync to make rsync <backuphost> wokring.- Allow logwa
- 1240: tch to domtrans to mdadm.- Allow pacemaker to domtrans to ifconf
- 1280: ig.- Allow pacemaker to setattr on corosync.log.- Add pacemaker_
- 12c0: use_execmem for memcheck-amd64 command.- Allow block_suspend cap
- 1300: ability.- Allow create fifo_file in /tmp with pacemaker_tmp_t.-
- 1340: Allow systat to getattr on fixed disk.- Relabel /etc/ntp.conf to
- 1380: be net_conf_t.- ntp_admin should create files in /etc with the
- 13c0: correct label.- Add interface to create ntp_conf_t files in /etc
- 1400: .- Add additional labeling for quantum.- Allow quantum to execut
- 1440: e dnsmasq with transition.- boinc_cliean wants also execmem as b
- 1480: oinc projecs have.- Allow sa-update to search admin home for /ro
- 14c0: ot/.spamassassin.- Allow sa-update to search admin home for /roo
- 1500: t/.spamassassin.- Allow antivirus domain to read net sysctl.- Do
- 1540: ntaudit attempts from thumb_t to connect to ssd.- Dontaudit atte
- 1580: mpts by readahead to read sock_files.- Dontaudit attempts by rea
- 15c0: dahead to read sock_files.- Create tmpfs file while running as w
- 1600: ine as user_tmpfs_t.- Dontaudit attempts by readahead to read so
- 1640: ck_files.- libmpg ships badly created librarie.- Change ssh_use_
- 1680: pts to use macro and only inherited sshd_devpts_t.- Allow confin
- 16c0: ed users to read systemd_logind seat information.- libmpg ships
- 1700: badly created libraries.- Add support for strongswan.service.- A
- 1740: dd labeling for strongswan.- Allow l2tpd_t to read network manag
- 1780: er content in /run directory.- Allow rsync to getattr any file i
- 17c0: n rsync_data_t.- Add labeling and filename transition for .grl-p
- 1800: odcasts.- mount.glusterfs executes glusterfsd binary.- Allow sys
- 1840: temd_hostnamed_t to stream connect to systemd.- Dontaudit any us
- 1880: er doing a access check.- Allow obex-data-server to request the
- 18c0: kernel to load a module.- Allow gpg-agent to manage gnome conten
- 1900: t (~/.cache/gpg-agent-info).- Allow gpg-agent to read /proc/sys/
- 1940: crypto/fips_enabled.- Add new types for antivirus.pp policy modu
- 1980: le.- Allow gnomesystemmm_t caps because of ioprio_set.- Make sur
- 19c0: e if mozilla_plugin creates files while in permissive mode, they
- 1a00: get created with the correct label, user_home_t.- Allow gnomesy
- 1a40: stemmm_t caps because of ioprio_set.- Allow NM rawip socket.- fi
- 1a80: les_relabel_non_security_files can not be used with boolean.- Ad
- 1ac0: d interface to thumb_t dbus_chat to allow it to read remote proc
- 1b00: ess state.- ALlow logrotate to domtrans to mdadm_t.- kde gnomecl
- 1b40: ock wants to write content to /tmp.- kde gnomeclock wants to wri
- 1b80: te content to /tmp.- /usr/libexec/kde4/kcmdatetimehelper attempt
- 1bc0: s to create /root/.kde.- Allow blueman_t to rwx zero_device_t, f
- 1c00: or some kind of jre.- Allow mozilla_plugin_t to rwx zero_device_
- 1c40: t, for some kind of jre.- Ftp full access should be allowed to c
- 1c80: reate directories as well as files.- Add boolean to allow rsync_
- 1cc0: full_acces, so that an rsync server can write all.- over the loc
- 1d00: al machine.- logrotate needs to rotate logs in openshift directo
- 1d40: ries, needs back port to RHEL6.- Add missing vpnc_roles type lin
- 1d80: e.- Allow stapserver to write content in /tmp.- Allow gnome keyr
- 1dc0: ing to create keyrings dir in ~/.local/share.- Dontaudit thumb d
- 1e00: rives trying to bind to udp sockets if nis_enabled is turned on.
- 1e40: - Add interface to colord_t dbus_chat to allow it to read remote
- 1e80: process state.- Allow colord_t to read cupsd_t state.- Add mate
- 1ec0: -thumbnail-font as thumnailer.- Allow sectoolm to sys_ptrace sin
- 1f00: ce it is looking at other proceses /proc data..- Allow qpidd to
- 1f40: list /tmp. Needed by ssl.- Only allow init_t to transition to rs
- 1f80: ync_t domain, not initrc_t. This should be back ported to F17,
- 1fc0: F18.- - Added systemd support for ksmtuned.- Added booleans. .ks
- 2000: mtuned_use_nfs. .ksmtuned_use_cifs.- firewalld seems to be creat
- 2040: ing mmap files which it needs to execute in /run /tmp and /dev/s
- 2080: hm. Would like to clean this up but for now we will allow.- Loo
- 20c0: ks like qpidd_t needs to read /dev/random.- Lots of probing avc'
- 2100: s caused by execugting gpg from staff_t.- Dontaudit senmail trig
- 2140: gering a net_admin avc.- Change thumb_role to use thumb_run, not
- 2180: sure why we have a thumb_role, needs back port.- Logwatch does
- 21c0: access check on mdadm binary.- Add raid_access_check_mdadm() ite
- 2200: rface.- Fix systemd_manage_unit_symlinks() interface.- Call syst
- 2240: emd_manage_unit_symlinks(() which is correct interface.- Add fil
- 2280: ename transition for opasswd.- Switch gnomeclock_dbus_chat to sy
- 22c0: stemd_dbus_chat_timedated since we have switched the name of gno
- 2300: meclock.- Allow sytstemd-timedated to get status of init_t.- Add
- 2340: new systemd policies for hostnamed and rename gnomeclock_t to s
- 2380: ystemd_timedate_t.- colord needs to communicate with systemd and
- 23c0: systemd_logind, also remove duplicate rules.- Switch gnomeclock
- 2400: _dbus_chat to systemd_dbus_chat_timedated since we have switched
- 2440: the name of gnomeclock.- Allow gpg_t to manage all gnome files.
- 2480: - Stop using pcscd_read_pub_files.- New rules for xguest, dontau
- 24c0: dit attempts to dbus chat.- Allow firewalld to create its mmap f
- 2500: iles in tmpfs and tmp directories.- Allow firewalld to create it
- 2540: s mmap files in tmpfs and tmp directories.- run unbound-chkconf
- 2580: as named_t, so it can read dnssec.- Colord is reading xdm proces
- 25c0: s state, probably reads state of any apps that sends dbus messag
- 2600: e.- Allow mdadm_t to change the kernel scheduler.- mythtv policy
- 2640: .- Update mandb_admin() interface.- Allow dsspam to listen on ow
- 2680: n tpc_socket.- seutil_filetrans_named_content needs to be option
- 26c0: al.- Allow sysadm_t to execute content in his homedir.- Add atta
- 2700: ch_queue to tun_socket, new patch from Paul Moore.- Change most
- 2740: of selinux configuration types to security_file_type..- Add file
- 2780: name transition rules for selinux configuration.- ssh into a box
- 27c0: with -X -Y requires ssh_use_ptys.- Dontaudit thumb drives tryin
- 2800: g to bind to udp sockets if nis_enabled is turned on.- Allow all
- 2840: unpriv userdomains to send dbus messages to hostnamed and timed
- 2880: ated.- New allow rules found by Tom London for systemd_hostnamed
- 28c0: .- Allow systemd-tmpfiles to relabel lpd spool files.- Ad labeli
- 2900: ng for texlive bash scripts.- Add xserver_filetrans_fonts_cache_
- 2940: home_content() interface.- Remove duplicate rules from *.te.- Ad
- 2980: d support for /var/lock/man-db.lock.- Add support for /var/tmp/a
- 29c0: brt(/.*)?.- Add additional labeling for munin cgi scripts.- Allo
- 2a00: w httpd_t to read munin conf files.- Allow certwatch to read mem
- 2a40: info.- Fix nscd_dontaudit_write_sock_file() interfac.- Fix gnome
- 2a80: _filetrans_home_content() to include also "fontconfig" dir as ca
- 2ac0: che_home_t.- llow mozilla_plugin_t to create HOMEDIR/.fontconfig
- 2b00: with the proper labeling.- Allow gnomeclock to talk to puppet o
- 2b40: ver dbus.- Allow numad access discovered by Dominic.- Add suppor
- 2b80: t for HOME_DIR/.maildir.- Fix attribute_role for mozilla_plugin_
- 2bc0: t domain to allow staff_r to access this domain.- Allow udev to
- 2c00: relabel udev_var_run_t lnk_files.- New bin_t file in mcelog.- Re
- 2c40: move all mcs overrides and replace with t1 != mcs_constrained_ty
- 2c80: pes.- Add attribute_role for iptables.- mcs_process_set_categori
- 2cc0: es needs to be called for type.- Implement additional role_attri
- 2d00: bute statements.- Sodo domain is attempting to get the additribu
- 2d40: tes of proc_kcore_t.- Unbound uses port 8953.- Allow svirt_t ima
- 2d80: ges to compromise_kernel when using pci-passthrough.- Add label
- 2dc0: for dns lib files.- Bluetooth aquires a dbus name.- Remove redun
- 2e00: dant files_read_usr_file calling.- Remove redundant files_read_e
- 2e40: tc_file calling.- Fix mozilla_run_plugin().- Add role_attribute
- 2e80: support for more domains.- Mass merge with upstream.- Bump the p
- 2ec0: olicy version to 28 to match selinux userspace.- Rebuild versus
- 2f00: latest libsepol.- Add systemd_status_all_unit_files() interface.
- 2f40: - Add support for nshadow.- Allow sysadm_t to administrate the p
- 2f80: ostfix domains.- Add interface to setattr on isid directories fo
- 2fc0: r use by tmpreaper.- Allow sshd_t sys_admin for use with afs log
- 3000: ins.- Allow systemd to read/write all sysctls.- Allow sshd_t sys
- 3040: _admin for use with afs logins.- Allow systemd to read/write all
- 3080: sysctls.- Add systemd_status_all_unit_files() interface.- Add s
- 30c0: upport for nshadow.- Allow sysadm_t to administrate the postfix
- 3100: domains.- Add interface to setattr on isid directories for use b
- 3140: y tmpreaper.- Allow sshd_t sys_admin for use with afs logins.- A
- 3180: llow systemd to read/write all sysctls.- Allow sshd_t sys_admin
- 31c0: for use with afs logins.- Add labeling for /var/named/chroot/etc
- 3200: /localtim.- Allow setroubleshoot_fixit to execute rpm.- zonemind
- 3240: er needs to connect to httpd ports where remote cameras are list
- 3280: ening.- Allow firewalld to execute content created in /run direc
- 32c0: tory.- Allow svirt_t to read generic certs.- Dontaudit leaked ps
- 3300: content to mozilla plugin.- Allow sshd_t sys_admin for use with
- 3340: afs logins.- Allow systemd to read/write all sysctls.- init scr
- 3380: ipts are creating systemd_unit_file_t directories.- systemd_logi
- 33c0: nd_t is looking at all files under /run/user/apache.- Allow syst
- 3400: emd to manage all user tmp files.- Add labeling for /var/named/c
- 3440: hroot/etc/localtime.- Allow netlabel_peer_t type to flow over ne
- 3480: tif_t and node_t, and only be hindered by MLS, need back port to
- 34c0: RHEL6.- Keystone is now using a differnt port.- Allow xdm_t to
- 3500: use usbmuxd daemon to control sound.- Allow passwd daemon to exe
- 3540: cute gnome_exec_keyringd.- Fix chrome_sandbox policy.- Add label
- 3580: ing for /var/run/checkquorum-timer.- More fixes for the dspam do
- 35c0: main, needs back port to RHEL6.- More fixes for the dspam domain
- 3600: , needs back port to RHEL6.- sssd needs to connect to kerberos p
- 3640: assword port if a user changes his password.- Lots of fixes from
- 3680: RHEL testing of dspam web.- Allow chrome and mozilla_plugin to
- 36c0: create msgq and semaphores.- Fixes for dspam cgi scripts.- Fixes
- 3700: for dspam cgi scripts.- Allow confine users to ptrace screen.-
- 3740: Backport virt_qemu_ga_t changes from RHEL.- Fix labeling for dsp
- 3780: am.cgi needed for RHEL6.- We need to back port this policy to RH
- 37c0: EL6, for lxc domains.- Dontaudit attempts to set sys_resource of
- 3800: logrotate.- Allow corosync to read/write wdmd's tmpfs files.- I
- 3840: see a ptrace of mozilla_plugin_t by staff_t, will allow without
- 3880: deny_ptrace being set.- Allow cron jobs to read bind config for
- 38c0: unbound.- libvirt needs to inhibit systemd.- kdumpctl needs to
- 3900: delete boot_t files.- Fix duplicate gnome_config_filetrans.- vir
- 3940: td_lxc_t is using /dev/fuse.- Passenger needs to create a direct
- 3980: ory in /var/log, needs a backport to RHEL6 for openshift.- apcup
- 39c0: sd can be setup to listen to snmp trafic.- Allow transition from
- 3a00: kdumpgui to kdumpctl.- Add fixes for munin CGI scripts.- Allow
- 3a40: deltacloud to connect to openstack at the keystone port.- Allow
- 3a80: domains that transition to svirt domains to be able to signal th
- 3ac0: em.- Fix file context of gstreamer in .cache directory.- libvirt
- 3b00: is communicating with logind.- NetworkManager writes to the sys
- 3b40: temd inhibit pipe.- Allow munin disk plugins to get attributes o
- 3b80: f all directories.- Allow munin disk plugins to get attributes o
- 3bc0: f all directorie.- Allow logwatch to get attributes of all direc
- 3c00: tories.- Fix networkmanager_manage_lib() interface.- Fix gnome_m
- 3c40: anage_config() to allow to manage sock_file.- Fix virtual_domain
- 3c80: _context.- Add support for dynamic DNS for DHCPv6.- Allow svirt
- 3cc0: to use netlink_route_socket which was a part of auth_use_nsswitc
- 3d00: h.- Add additional labeling for /var/www/openshift/broker.- Fix
- 3d40: rhev policy.- Allow openshift_initrc domain to dbus chat with sy
- 3d80: stemd_logind.- Allow httpd to getattr passenger log file if run_
- 3dc0: stickshift.- Allow consolehelper-gtk to connect to xserver.- Add
- 3e00: labeling for the tmp-inst directory defined in pam_namespace.co
- 3e40: nf.- Add lvm_metadata_t labeling for /etc/multipath.- consoletyp
- 3e80: e is no longer used.- Add label for efivarfs.- Allow certmonger
- 3ec0: to send signal to itself.- Allow plugin-config to read own proce
- 3f00: ss status.- Add more fixes for pacemaker.- apache/drupal can run
- 3f40: clamscan on uploaded content.- Allow chrome_sandbox_nacl_t to r
- 3f80: ead pid 1 content.- Fix MCS Constraints to control ingres and eg
- 3fc0: res controls on the network..- Change name of svirt_nokvm_t to s
- 13:00:16.884519 <= Recv data, 16384 bytes (0x4000)
- 0000: virt_tcg_t.- Allow tuned to request the kernel to load kernel mo
- 0040: dules.- Label /var/lib/pgsql/.ssh as ssh_home_t.- Add labeling f
- 0080: or /usr/bin/pg_ctl.- Allow systemd-logind to manage keyring user
- 00c0: tmp dirs.- Add support for 7389/tcp port.- gems seems to be pla
- 0100: ced in lots of places.- Since xdm is running a full session, it
- 0140: seems to be trying to execute lots of executables via dbus.- Add
- 0180: back tcp/8123 port as http_cache port.- Add ovirt-guest-agent\.
- 01c0: pid labeling.- Allow xend to run scsi_id.- Allow rhsmcertd-worke
- 0200: r to read "physical_package_id".- Allow pki_tomcat to connect to
- 0240: ldap port.- Allow lpr to read /usr/share/fonts.- Allow open fil
- 0280: e from CD/DVD drive on domU.- Allow munin services plugins to ta
- 02c0: lk to SSSD.- Allow all samba domains to create samba directory i
- 0300: n var_t directories.- Take away svirt_t ability to use nsswitch.
- 0340: - Dontaudit attempts by openshift to read apache logs.- Allow ap
- 0380: ache to create as well as append _ra_content_t.- Dontaudit sendm
- 03c0: ail_t reading a leaked file descriptor.- Add interface to have a
- 0400: dmin transition /etc/prelink.cache to the proper label.- Add snt
- 0440: p support to ntp policy.- Allow firewalld to dbus chat with devi
- 0480: cekit_power.- Allow tuned to call lsblk.- Allow tor to read /pro
- 04c0: c/sys/kernel/random/uuid.- Add tor_can_network_relay boolean.- A
- 0500: dd openshift_initrc_signal() interface.- Fix typos.- dspam port
- 0540: is treat as spamd_port_t.- Allow setroubleshoot to getattr on al
- 0580: l executables.- Allow tuned to execute profiles scripts in /etc/
- 05c0: tuned.- Allow apache to create directories to store its log file
- 0600: s.- Allow all directories/files in /var/log starting with passen
- 0640: ger to be labeled passenger_log_t.- Looks like apache is sending
- 0680: sinal to openshift_initrc_t now,needs back port to RHEL6.- Allo
- 06c0: w Postfix to be configured to listen on TCP port 10026 for email
- 0700: from DSPAM.- Add filename transition for /etc/tuned/active_prof
- 0740: ile.- Allow condor_master to send mails.- Allow condor_master to
- 0780: read submit.cf.- Allow condor_master to create /tmp files/dirs.
- 07c0: - Allow condor_mater to send sigkill to other condor domains.- A
- 0800: llow condor_procd sigkill capability.- tuned-adm wants to talk w
- 0840: ith tuned daemon.- Allow kadmind and krb5kdc to also list sssd_p
- 0880: ublic_t.- Allow accountsd to dbus chat with init.- Fix git_read_
- 08c0: generic_system_content_files() interface.- pppd wants sys_nice b
- 0900: y nmcli because of "syscall=sched_setscheduler".- Fix mozilla_pl
- 0940: ugin_can_network_connect to allow to connect to all ports.- Labe
- 0980: l all munin plugins which are not covered by munin plugins polic
- 09c0: y as unconfined_munin_plugin_exec_t.- dspam wants to search /va
- 0a00: r/spool for opendkim data.- Revert "Add support for tcp/10026 po
- 0a40: rt as dspam_port_t".- Turning on labeled networking requires add
- 0a80: itional access for netlabel_peer_t; these allow rules need to be
- 0ac0: back ported to RHEL6.- Allow all application domains to use fif
- 0b00: o_files passed in from userdomains, also allow them to write to
- 0b40: tmp_files inherited from userdomain.- Allow systemd_tmpfiles_t t
- 0b80: o setattr on mandb_cache_t.- consolekit.pp was not removed from
- 0bc0: the postinstall script.- Add back consolekit policy.- Silence bo
- 0c00: otloader trying to use inherited tty.- Silence xdm_dbusd_t tryin
- 0c40: g to execute telepathy apps.- Fix shutdown avcs when machine has
- 0c80: unconfined.pp disabled.- The host and a virtual machine can sha
- 0cc0: re the same printer on a usb device.- Change oddjob to transitio
- 0d00: n to a ranged openshift_initr_exec_t when run from oddjob.- Allo
- 0d40: w abrt_watch_log_t to execute bin_t.- Allow chrome sandbox to wr
- 0d80: ite content in ~/.config/chromium.- Dontaudit setattr on fontcon
- 0dc0: fig dir for thumb_t.- Allow lircd to request the kernel to load
- 0e00: module.- Make rsync as userdom_home_manager.- Allow rsync to sea
- 0e40: rch automount filesystem.- Add fixes for pacemaker.- Add support
- 0e80: for 4567/tcp port.- Random fixes from Tuomo Soini.- xdm wants t
- 0ec0: o get init status.- Allow programs to run in fips_mode.- Add int
- 0f00: erface to allow the reading of all blk device nodes.- Allow init
- 0f40: to relabel rpcbind sock_file.- Fix labeling for lastlog and fai
- 0f80: llog related to logrotate.- ALlow aeolus_configserver to use TRA
- 0fc0: M port.- Add fixes for aeolus_configserver.- Allow snmpd to conn
- 1000: ect to snmp port.- Allow spamd_update to create spamd_var_lib_t
- 1040: directories.- Allow domains that can read sssd_public_t files to
- 1080: also list the directory.- Remove miscfiles_read_localization, t
- 10c0: his is defined for all domains.- Allow syslogd to request the ke
- 1100: rnel to load a module.- Allow syslogd_t to read the network stat
- 1140: e information.- Allow xdm_dbusd_t connect to the system DBUS.- A
- 1180: dd support for 7389/tcp port.- Allow domains to read/write all i
- 11c0: nherited sockets.- Allow staff_t to read kmsg.- Add awstats_purg
- 1200: e_apache_log boolean.- Allow ksysguardproces to read /.config/Tr
- 1240: olltech.conf.- Allow passenger to create and append puppet log f
- 1280: iles.- Add puppet_append_log and puppet_create_log interfaces.-
- 12c0: Add puppet_manage_log() interface.- Allow tomcat domain to searc
- 1300: h tomcat_var_lib_t.- Allow pki_tomcat_t to connect to pki_ca por
- 1340: ts.- Allow pegasus_t to have net_admin capability.- Allow pegasu
- 1380: s_t to write /sys/class/net/<interface>/flags.- Allow mailserver
- 13c0: _delivery to manage mail_home_rw_t lnk_files.- Allow fetchmail t
- 1400: o create log files.- Allow gnomeclock to manage home config in .
- 1440: kde.- Allow bittlebee to read kernel sysctls.- Allow logrotate t
- 1480: o list /root.- Fix userhelper_console_role_template().- Allow en
- 14c0: abling Network Access Point service using blueman.- Make vmware_
- 1500: host_t as unconfined domain.- Allow authenticate users in webacc
- 1540: ess via squid, using mysql as backend.- Allow gathers to get var
- 1580: ious metrics on mounted file systems.- Allow firewalld to read /
- 15c0: etc/hosts.- Fix cron_admin_role() to make sysadm cronjobs runnin
- 1600: g in the sysadm_t instead of cronjob_t.- Allow kdumpgui to read/
- 1640: write to zipl.conf.- Commands needed to get mock to build from s
- 1680: taff_t in enforcing mode.- Allow mdadm_t to manage cgroup files.
- 16c0: - Allow all daemons and systemprocesses to use inherited initrc_
- 1700: tmp_t files.- dontaudit ifconfig_t looking at fifo_files that ar
- 1740: e leaked to it.- Add lableing for Quest Authentication System.-
- 1780: Fix filetrans interface definitions.- Dontaudit xdm_t to getattr
- 17c0: on BOINC lib files.- Add systemd_reload_all_services() interfac
- 1800: e.- Dontaudit write access on /var/lib/net-snmp/mib_indexes .- O
- 1840: nly stop mcsuntrustedproc from relableing files.- Allow accounts
- 1880: d to dbus chat with gdm.- Allow realmd to getattr on all fs.- Al
- 18c0: low logrotate to reload all services.- Add systemd unit file for
- 1900: radiusd.- Allow winbind to create samba pid dir.- Add labeling
- 1940: for /var/nmbd/unexpected.- Allow chrome and mozilla plugin to co
- 1980: nnect to msnp ports.- Fix storage_rw_inherited_fixed_disk_dev()
- 19c0: to cover also blk_file.- Dontaudit setfiles reading /dev/random.
- 1a00: - On initial boot gnomeclock is going to need to be set buy gdm.
- 1a40: - Fix tftp_read_content() interface.- Random apps looking at ker
- 1a80: nel file systems.- Testing virt with lxc requiers additional acc
- 1ac0: ess for virsh_t.- New allow rules requied for latest libvirt, li
- 1b00: bvirt talks directly to journald,lxc setup tool needs compromize
- 1b40: _kernel,and we need ipc_lock in the container.- Allow MPD to rea
- 1b80: d /dev/radnom.- Allow sandbox_web_type to read logind files whic
- 1bc0: h needs to read pulseaudio.- Allow mozilla plugins to read /dev/
- 1c00: hpet.- Add labeling for /var/lib/zarafa-webap.- Allow BOINC clie
- 1c40: nt to use an HTTP proxy for all connections.- Allow rhsmertd to
- 1c80: domain transition to dmidecod.- Allow setroubleshootd to send D
- 1cc0: -Bus msg to ABRT.- Define usbtty_device_t as a term_tty.- Allow
- 1d00: svnserve to accept a connection.- Allow xend manage default virt
- 1d40: _image_t type.- Allow prelink_cron_system_t to overide user comp
- 1d80: onant when executing cp.- Add labeling for z-push.- Gnomeclock s
- 1dc0: ets the realtime clock.- Openshift seems to be storing apache lo
- 1e00: gs in /var/lib/openshift/.log/httpd.- Allow lxc domains to use /
- 1e40: dev/random and /dev/urandom.- Add port defintion for tcp/9000.-
- 1e80: Fix labeling for /usr/share/cluster/checkquorum to label also ch
- 1ec0: eckquorum.wdmd.- Add rules and labeling for $HOME/cache/\.gstrea
- 1f00: mer-.* directory.- Add support for CIM provider openlmi-networki
- 1f40: ng which uses NetworkManager dbus API.- Allow shorewall_t to cre
- 1f80: ate netlink_socket.- Allow krb5admind to block suspend.- Fix lab
- 1fc0: els on /var/run/dlm_controld /var/log/dlm_controld.- Allow krb5k
- 2000: dc to block suspend.- gnomessytemmm_t needs to read /etc/passwd.
- 2040: - Allow cgred to read all sysctls.- Allow all domains to read /p
- 2080: roc/sys/vm/overcommit_memory.- Make proc_numa_t an MLS Trusted O
- 20c0: bject.- Add /proc/numactl support for confined users.- Allow ssh
- 2100: _t to connect to any port > 1023.- Add openvswitch domain.- Puls
- 2140: eaudio tries to create directories in gnome_home_t directories.-
- 2180: New ypbind pkg wants to search /var/run which is caused by sd_n
- 21c0: otify.- Allow NM to read certs on NFS/CIFS using use_nfs_*, use_
- 2200: samba_* booleans.- Allow sanlock to read /dev/random.- Treat php
- 2240: -fpm with httpd_t.- Allow domains that can read named_conf_t to
- 2280: be able to list the directories.- Allow winbind to create sock f
- 22c0: iles in /var/run/samba.- Add smsd policy.- Add support for OpenS
- 2300: hift sbin labelin.- Add boolean to allow virt to use rawip.- All
- 2340: ow mozilla_plugin to read all file systems with noxattrs support
- 2380: .- Allow kerberos to write on anon_inodefs fs.- Additional acces
- 23c0: s required by fenced.- Add filename transitions for passwd.lock/
- 2400: group.lock.- UPdate man pages.- Create coolkey directory in /var
- 2440: /cache with the correct label.- Fix label on /etc/group.lock.- A
- 2480: llow gnomeclock to create lnk_file in /etc.- label /root/.pki as
- 24c0: a home_cert_t.- Add interface to make sure rpcbind.sock is crea
- 2500: ted with the correct label.- Add definition for new directory /v
- 2540: ar/lib/os-probe and bootloader wants to read udev rules.- opendk
- 2580: im should be a part of milter.- Allow libvirt to set the kernel
- 25c0: sched algorythm.- Allow mongod to read sysfs_t.- Add authconfig
- 2600: policy.- Remove calls to miscfiles_read_localization all domains
- 2640: get this.- Allow virsh_t to read /root/.pki/ content.- Add labe
- 2680: l for log directory under /var/www/stickshift.- Allow getty to s
- 26c0: etattr on usb ttys.- Allow sshd to search all directories for ss
- 2700: hd_home_t content.- Allow staff domains to send dbus messages to
- 2740: kdumpgui.- Fix labels on /etc/.pwd.lock and friends to be passw
- 2780: d_file_t.- Dontaudit setfiles reading urand.- Add files_dontaudi
- 27c0: t_list_tmp() for domains to which we added sys_nice/setsched.- A
- 2800: llow staff_gkeyringd_t to read /home/$USER/.local/share/keyrings
- 2840: dir.- Allow systemd-timedated to read /dev/urandom.- Allow entr
- 2880: opyd_t to read proc_t (meminfo).- Add unconfined munin plugin.-
- 28c0: Fix networkmanager_read_conf() interface.- Allow blueman to list
- 2900: /tmp which is needed by sys_nic/setsched.- Fix label of /etc/ma
- 2940: il/aliasesdb-stamp.- numad is searching cgroups.- realmd is comm
- 2980: unicating with networkmanager using dbus.- Lots of fixes to try
- 29c0: to get kdump to work.- Allow loging programs to dbus chat with r
- 2a00: ealmd.- Make apache_content_template calling as optional.- realm
- 2a40: d is using policy kit.- Add new selinuxuser_use_ssh_chroot boole
- 2a80: an.- dbus needs to be able to read/write inherited fixed disk de
- 2ac0: vice_t passed through it.- Cleanup netutils process allow rule.-
- 2b00: Dontaudit leaked fifo files from openshift to ping.- sanlock ne
- 2b40: eds to read mnt_t lnk files.- Fail2ban needs to setsched and sys
- 2b80: _nice.- Change default label of all files in /var/run/rpcbind.-
- 2bc0: Allow sandbox domains (java) to read hugetlbfs_t.- Allow awstats
- 2c00: cgi content to create tmp files and read apache log files.- All
- 2c40: ow setuid/setgid for cupsd-config.- Allow setsched/sys_nice pro
- 2c80: cupsd-config.- Fix /etc/localtime sym link to be labeled locale
- 2cc0: _t.- Allow sshd to search postgresql db t since this is a homedi
- 2d00: r.- Allow xwindows users to chat with realmd.- Allow unconfined
- 2d40: domains to configure all files and null_device_t service.- Adopt
- 2d80: pki-selinux policy.- pki is leaking which we dontaudit until a
- 2dc0: pki code fix.- Allow setcap for arping.- Update man pages.- Add
- 2e00: labeling for /usr/sbin/mcollectived.- pki fixes.- Allow smokepin
- 2e40: g to execute fping in the netutils_t domain.- Allow mount to rel
- 2e80: abelfrom unlabeled file systems.- systemd_logind wants to send a
- 2ec0: nd receive messages from devicekit disk over dbus to make connec
- 2f00: ted mouse working.- Add label to get bin files under libreoffice
- 2f40: labeled correctly.- Fix interface to allow executing of base_ro
- 2f80: _file_type.- Add fixes for realmd.- Update pki policy.- Add tftp
- 2fc0: _homedir boolean.- Allow blueman sched_setscheduler.- openshift
- 3000: user domains wants to r/w ssh tcp sockets.- Additional requireme
- 3040: nts for disable unconfined module when booting.- Fix label of sy
- 3080: stemd script files.- semanage can use -F /dev/stdin to get input
- 30c0: .- syslog now uses kerberos keytabs.- Allow xserver to compromis
- 3100: e_kernel access.- Allow nfsd to write to mount_var_run_t when r
- 3140: unning the mount command.- Add filename transition rule for bin_
- 3180: t directories.- Allow files to read usr_t lnk_files.- dhcpc want
- 31c0: s chown.- Add support for new openshift labeling.- Clean up for
- 3200: tunable+optional statements.- Add labeling for /usr/sbin/mkhomed
- 3240: ir_helper.- Allow antivirus domain to managa amavis spool files.
- 3280: - Allow rpcbind_t to read passwd .- Allow pyzor running as spamc
- 32c0: to manage amavis spool.- Add interfaces to read kernel_t proc i
- 3300: nfo.- Missed this version of exec_all.- Allow anyone who can loa
- 3340: d a kernel module to compromise kernel.- Add oddjob_dbus_chat to
- 3380: openshift apache policy.- Allow chrome_sandbox_nacl_t to send s
- 33c0: ignals to itself.- Add unit file support to usbmuxd_t.- Allow al
- 3400: l openshift domains to read sysfs info.- Allow openshift domains
- 3440: to getattr on all domains.- MLS fixes from Dan.- Fix name of ca
- 3480: pability2 secure_firmware->compromise_kerne.- Allow xdm to searc
- 34c0: h all file systems.- Add interface to allow the config of all fi
- 3500: les.- Add rngd policy.- Remove kgpg as a gpg_exec_t type.- Allow
- 3540: plymouthd to block suspend.- Allow systemd_dbus to config any f
- 3580: ile.- Allow system_dbus_t to configure all services.- Allow fres
- 35c0: hclam_t to read usr_files.- varnishd requires execmem to load mo
- 3600: dules.- Allow semanage to verify types.- Allow sudo domain to ex
- 3640: ecute user home files.- Allow session_bus_type to transition to
- 3680: user_tmpfs_t.- Add dontaudit caused by yum updates.- Implement p
- 36c0: ki policy but not activated.- tuned wants to getattr on all file
- 3700: systems.- tuned needs also setsched. The build is needed for tes
- 3740: t day.- Add policy for qemu-qa.- Allow razor to write own config
- 3780: files.- Add an initial antivirus policy to collect all antivir
- 37c0: us program.- Allow qdisk to read usr_t.- Add additional caps for
- 3800: vmware_host.- Allow tmpfiles_t to setattr on mandb_cache_t.- Do
- 3840: ntaudit leaked files into mozilla_plugin_config_t.- Allow wdmd t
- 3880: o getattr on tmpfs.- Allow realmd to use /dev/random.- allow con
- 38c0: tainers to send audit messages.- Allow root mount any file via l
- 3900: oop device with enforcing mls policy.- Allow tmpfiles_t to setat
- 3940: tr on mandb_cache_t.- Allow tmpfiles_t to setattr on mandb_cache
- 3980: _t.- Make userdom_dontaudit_write_all_ not allow open.- Allow in
- 39c0: it scripts to read all unit files.- Add support for saphostctrl
- 3a00: ports.- Add kernel_read_system_state to sandbox_client_t.- Add s
- 3a40: ome of the missing access to kdumpgui.- Allow systemd_dbusd_t to
- 3a80: status the init system.- Allow vmnet-natd to request the kernel
- 3ac0: to load a module.- Allow gsf-office-thum to append .cache/gdm/s
- 3b00: ession.log.- realmd wants to read .config/dconf/user.- Firewalld
- 3b40: wants sys_nice/setsched.- Allow tmpreaper to delete mandb cache
- 3b80: files.- Firewalld wants sys_nice/setsched.- Allow firewalld to
- 3bc0: perform a DNS name resolution.- Allown winbind to read /usr/sha
- 3c00: re/samba/codepages/lowcase.dat.- Add support for HTTPProxy* in /
- 3c40: etc/freshclam.conf.- Fix authlogin_yubike boolean.- Extend smbd_
- 3c80: selinux man page to include samba booleans.- Allow dhcpc to exec
- 3cc0: ute consoletype.- Allow ping to use inherited tmp files created
- 3d00: in init scripts.- On full relabel with unconfined domain disable
- 3d40: d, initrc was running some chcon's.- Allow people who delete man
- 3d80: pages to delete mandb cache files.- Add missing permissive doma
- 3dc0: ins.- Add new mandb policy.- ALlow systemd-tmpfiles_t to relabel
- 3e00: mandb_cache_t.- Allow logrotate to start all unit files.- Add f
- 3e40: ixes for ctbd.- Allow nmbd to stream connect to ctbd.- Make cgle
- 3e80: ar_t as nsswitch_domain.- Fix bogus in interfaces.- Allow opensh
- 3ec0: ift to read/write postfix public pipe.- Add postfix_manage_spool
- 3f00: _maildrop_files() interface.- stickshift paths have been renamed
- 3f40: to openshift.- gnome-settings-daemon wants to write to /run/sys
- 3f80: temd/inhibit/ pipes.- Update man pages, adding ENTRYPOINTS.- Ad
- 3fc0: d mei_device_t.- Make sure gpg content in homedir created with c
- 13:00:16.889861 <= Recv data, 16384 bytes (0x4000)
- 0000: orrect label.- Allow dmesg to write to abrt cache files.- automo
- 0040: unt wants to search virtual memory sysctls.- Add support for hp
- 0080: lip logs stored in /var/log/hp/tmp.- Add labeling for /etc/owncl
- 00c0: oud/config.php.- Allow setroubleshoot to send analysys to syslog
- 0100: d-journal.- Allow virsh_t to interact with new fenced daemon.- A
- 0140: llow gpg to write to /etc/mail/spamassassiin directories.- Make
- 0180: dovecot_deliver_t a mail server delivery type.- Add label for /v
- 01c0: ar/tmp/DNS25.- Fixes for tomcat_domain template interface.- Remo
- 0200: ve init_systemd and init_upstart boolean, Move init_daemon_domai
- 0240: n and init_system_domain to use attributes.- Add attribute to al
- 0280: l base os types. Allow all domains to read all ro base OS types
- 02c0: .- Additional unit files to be defined as power unit files.- Fix
- 0300: more boolean names.- Fix boolean name so subs will continue to
- 0340: work.- dbus needs to start getty unit files.- Add interface to a
- 0380: llow system_dbusd_t to start the poweroff service.- xdm wants to
- 03c0: exec telepathy apps.- Allow users to send messages to systemdlo
- 0400: gind.- Additional rules needed for systemd and other boot apps.-
- 0440: systemd wants to list /home and /boot.- Allow gkeyringd to writ
- 0480: e dbus/conf file.- realmd needs to read /dev/urand.- Allow reada
- 04c0: head to delete /.readahead if labeled root_t, might get created
- 0500: before policy is loaded.- Fixes to safe more rules.- Re-write to
- 0540: mcat_domain_template().- Fix passenger labeling.- Allow all doma
- 0580: ins to read man pages.- Add ephemeral_port_t to the 'generic' po
- 05c0: rt interfaces.- Fix the names of postgresql booleans.- Stop usin
- 0600: g attributes form netlabel_peer and syslog, auth_use_nsswitch se
- 0640: tsup netlabel_peer.- Move netlable_peer check out of booleans.-
- 0680: Remove call to recvfrom_netlabel for kerberos call.- Remove use
- 06c0: of attributes when calling syslog call .- Move -miscfiles_read_l
- 0700: ocalization to domain.te to save hundreds of allow rules.- Allow
- 0740: all domains to read locale files. This eliminates around 1500
- 0780: allow rules- Cleanup nis_use_ypbind_uncond interface.- Allow rnd
- 07c0: c to block suspend.- tuned needs to modify the schedule of the k
- 0800: ernel.- Allow svirt_t domains to read alsa configuration files.-
- 0840: ighten security on irc domains and make sure they label content
- 0880: in homedir correctly.- Add filetrans_home_content for irc files
- 08c0: .- Dontaudit all getattr access for devices and filesystems for
- 0900: sandbox domains.- Allow stapserver to search cgroups directories
- 0940: .- Allow all postfix domains to talk to spamd.- Add interfaces t
- 0980: o ignore setattr until kernel fixes this to be checked after the
- 09c0: DAC check.- Change pam_t to pam_timestamp_t.- Add dovecot_domai
- 0a00: n attribute and allow this attribute block_suspend capability2.-
- 0a40: Add sanlock_use_fusefs boolean.- numad wants send/recieve msg.-
- 0a80: Allow rhnsd to send syslog msgs.- Make piranha-pulse as initrc
- 0ac0: domain.- Update openshift instances to dontaudit setattr until t
- 0b00: he kernel is fixed..- Fix auth_login_pgm_domain() interface to
- 0b40: allow domains also managed user tmp dirs because of #856880 rela
- 0b80: ted to pam_systemd.- Remove pam_selinux.8 which conflicts with m
- 0bc0: an page owned by the pam package.- Allow glance-api to talk to m
- 0c00: ysql.- ABRT wants to read Xorg.0.log if if it detects problem wi
- 0c40: th Xorg.- Fix gstreamer filename trans. interface.- Man page fix
- 0c80: es by Dan Walsh.- Allow postalias to read postfix config files.-
- 0cc0: Allow man2html to read man pages.- Allow rhev-agentd to search
- 0d00: all mountpoints.- Allow rhsmcertd to read /dev/random.- Add tgtd
- 0d40: _stream_connect() interface.- Add cyrus_write_data() interface.-
- 0d80: Dontaudit attempts by sandboxX clients connectiing to the xserv
- 0dc0: er_port_t.- Add port definition for tcp/81 as http_port_t.- Fix
- 0e00: /dev/twa labeling.- Allow systemd to read modules config.- Merge
- 0e40: openshift policy.- Allow xauth to read /dev/urandom.- systemd n
- 0e80: eeds to relabel content in /run/systemd directories.- Files unco
- 0ec0: nfined should be able to perform all services on all files.- Pup
- 0f00: pet tmp file can be leaked to all domains.- Dontaudit rhsmcertd-
- 0f40: worker to search /root/.local.- Allow chown capability for zaraf
- 0f80: a domains.- Allow system cronjobs to runcon into openshift doma
- 0fc0: ins.- Allow virt_bridgehelper_t to manage content in the svirt_h
- 1000: ome_t labeled directories.- nmbd wants to create /var/nmbd.- St
- 1040: op transitioning out of anaconda and firstboot, just causes AVC
- 1080: messages.- Allow clamscan to read /etc files.- Allow bcfg2 to bi
- 10c0: nd cyphesis port.- heartbeat should be run as rgmanager_t instea
- 1100: d of corosync_t.- Add labeling for /etc/openldap/certs.- Add lab
- 1140: eling for /opt/sartest directory.- Make crontab_t as userdom hom
- 1180: e reader.- Allow tmpreaper to list admin_home dir.- Add defition
- 11c0: for imap_0 replay cache file.- Add support for gitolite3.- Allo
- 1200: w virsh_t to send syslog messages.- allow domains that can read
- 1240: samba content to be able to list the directories also.- Add real
- 1280: md_dbus_chat to allow all apps that use nsswitch to talk to real
- 12c0: md.- Separate out sandbox from sandboxX policy so we can disable
- 1300: it by default.- Run dmeventd as lvm_t.- Mounting on any directo
- 1340: ry requires setattr and write permissions.- Fix use_nfs_home_dir
- 1380: s() boolean.- New labels for pam_krb5.- Allow init and initrc do
- 13c0: mains to sys_ptrace since this is needed to look at processes no
- 1400: t owned by uid 0.- Add realmd_dbus_chat to allow all apps that u
- 1440: se nsswitch to talk to realmd.- Separate sandbox policy into san
- 1480: dbox and sandboxX, and disable sandbox by default on fresh insta
- 14c0: lls.- Allow domains that can read etc_t to read etc_runtime_t .-
- 1500: Allow all domains to use inherited tmpfiles.- Allow realmd to r
- 1540: ead resolv.conf.- Add pegasus_cache_t type.- Label /usr/sbin/fen
- 1580: ce_virtd as virsh_exec_t.- Add policy for pkcsslotd.- Add suppor
- 15c0: t for cpglockd.- Allow polkit-agent-helper to read system-auth-a
- 1600: c.- telepathy-idle wants to read gschemas.compiled.- Allow plymo
- 1640: uthd to getattr on fs_t.- Add slpd policy.- Allow ksysguardproce
- 1680: s to read/write config_usr_t.- Fix labeling substitution so rpm
- 16c0: will label /lib/systemd content correctly.- Add file name transi
- 1700: tions for ttyACM0.- spice-vdagent(d)'s are going to log over to
- 1740: syslog.- Add sensord policy.- Add more fixes for passenger polic
- 1780: y related to puppet.- Allow wdmd to create wdmd_tmpfs_t.- Fix la
- 17c0: beling for /var/run/cachefilesd\.pid.- Add thumb_tmpfs_t files t
- 1800: ype.- Allow svirt domains to manage the network since this is co
- 1840: ntainerized.- Allow svirt_lxc_net_t to send audit messages.- Mak
- 1880: e "snmpwalk -mREDHAT-CLUSTER-MIB ...." working.- Allow dlm_contr
- 18c0: old to execute dlm_stonith labeled as bin_t.- Allow GFS2 working
- 1900: on F17.- Abrt needs to execute dmesg.- Allow jockey to list the
- 1940: contents of modeprobe.d.- Add policy for lightsquid as squid_cr
- 1980: on_t.- Mailscanner is creating files and directories in /tmp.- d
- 19c0: mesg is now reading /dev/kmsg.- Allow xserver to communicate wit
- 1a00: h secure_firmware.- Allow fsadm tools (fsck) to read /run/mount
- 1a40: contnet.- Allow sysadm types to read /dev/kmsg.-.- Allow postfix
- 1a80: , sssd, rpcd to block_suspend.- udev seems to need secure_firmwa
- 1ac0: re capability.- Allow virtd to send dbus messages to firewalld s
- 1b00: o it can configure the firewall.- Fix labeling of content in /ru
- 1b40: n created by virsh_t.- Allow condor domains to read kernel sysct
- 1b80: ls.- Allow condor_master to connect to amqp.- Allow thumb drives
- 1bc0: to create shared memory and semaphores.- Allow abrt to read moz
- 1c00: illa_plugin config files.- Add labels for lightsquid.- Default f
- 1c40: iles in /opt and /usr that end in .cgi as httpd_sys_script_t, al
- 1c80: low.- dovecot_auth_t uses ldap for user auth.- Allow domains tha
- 1cc0: t can read dhcp_etc_t to read lnk_files.- Add more then one watc
- 1d00: hdog device.- Allow useradd_t to manage etc_t files so it can re
- 1d40: name it and edit them.- Fix invalid class dir should be fifo_fil
- 1d80: e.- Move /run/blkid to fsadm and make sure labeling is correct.-
- 1dc0: Fix bogus regex found by eparis.- Fix manage run interface sinc
- 1e00: e lvm needs more access.- syslogd is searching cgroups directory
- 1e40: .- Fixes to allow virt-sandbox-service to manage lxc var run con
- 1e80: tent.- Fix Boolean settings.- Add new libjavascriptcoregtk as te
- 1ec0: xtrel_shlib_t.- Allow xdm_t to create xdm_home_t directories.- A
- 1f00: dditional access required for systemd.- Dontaudit mozilla_plugin
- 1f40: attempts to ipc_lock.- Allow tmpreaper to delete unlabeled file
- 1f80: s.- Eliminate screen_tmp_t and allow it to manage user_tmp_t.- D
- 1fc0: ontaudit mozilla_plugin_config_t to append to leaked file descri
- 2000: ptors.- Allow web plugins to connect to the asterisk ports.- Con
- 2040: dor will recreate the lock directory if it does not exist.- Oddj
- 2080: ob mkhomedir needs to connectto user processes.- Make oddjob_mkh
- 20c0: omedir_t a userdom home manager.- Put placeholder back in place
- 2100: for proper numbering of capabilities.- Systemd also configures i
- 2140: nit scripts.- Fix ecryptfs interfaces.- Bootloader seems to be t
- 2180: rolling around /dev/shm and /dev.- init wants to create /etc/sys
- 21c0: temd/system-update.target.wants.- Fix systemd_filetrans call to
- 2200: move it out of tunable.- Fix up policy to work with systemd user
- 2240: space manager.- Add secure_firmware capability and remove bogus
- 2280: epolwakeup.- Call seutil_*_login_config interfaces where should
- 22c0: be needed.- Allow rhsmcertd to send signal to itself.- Allow thi
- 2300: n domains to send signal to itself.- Allow Chrome_ChildIO to rea
- 2340: d dosfs_t.- Add role rules for realmd, sambagui.- Add new type s
- 2380: elinux_login_config_t for /etc/selinux/<type>/logins/.- Addition
- 23c0: al fixes for seutil_manage_module_store().- dbus_system_domain()
- 2400: should be used with optional_policy.- Fix svirt to be allowed t
- 2440: o use fusefs file system.- Allow login programs to read /run/ da
- 2480: ta created by systemd_login.- sssd wants to write /etc/selinux/<
- 24c0: policy>/logins/ for SELinux PAM module.- Fix svirt to be allowed
- 2500: to use fusefs file system.- Allow piranha domain to use nsswitc
- 2540: h.- Sanlock needs to send Kill Signals to non root processes.- P
- 2580: ulseaudio wants to execute /run/user/PID/.orc.- Fix saslauthd wh
- 25c0: en it tries to read /etc/shadow.- Label gnome-boxes as a virt ho
- 2600: medir.- Need to allow svirt_t ability to getattr on nfs_t file s
- 2640: ystems.- Update sanlock policy to solve all AVC's.- Change confi
- 2680: ned users can optionally manage virt content.- Handle new direct
- 26c0: ories under ~/.cache.- Add block suspend to appropriate domains.
- 2700: - More rules required for containers.- Allow login programs to r
- 2740: ead /run/ data created by systemd_logind.- Allow staff users to
- 2780: run svirt_t processes.- Update to upstream.- More fixes for syst
- 27c0: emd to make rawhide booting from Dan Walsh.- Add systemd fixes t
- 2800: o make rawhide booting.- Add systemd_logind_inhibit_var_run_t at
- 2840: tribute.- Remove corenet_all_recvfrom_unlabeled() for non-contri
- 2880: b policies because we moved it to domain.if for all domain_type.
- 28c0: - Add interface for mysqld to dontaudit signull to all processes
- 2900: .- Label new /var/run/journal directory correctly.- Allow users
- 2940: to inhibit suspend via systemd.- Add new type for the /var/run/i
- 2980: nhibit directory.- Add interface to send signull to systemd_logi
- 29c0: n so avahi can send them.- Allow systemd_passwd to send syslog m
- 2a00: essages.- Remove corenet_all_recvfrom_unlabeled() calling fro po
- 2a40: licy files.- Allow editparams.cgi running as httpd_bugzill
- 2a80: a_script_t to read /etc/group.- Allow smbd to read cluster confi
- 2ac0: g.- Add additional labeling for passenger.- Allow dbus to inhibi
- 2b00: t suspend via systemd.- Allow avahi to send signull to systemd_l
- 2b40: ogin.- Add interface to dontaudit getattr access on sysctls.- Al
- 2b80: low sshd to execute /bin/login.- Looks like xdm is recreating th
- 2bc0: e xdm directory in ~/.cache/ on login.- Allow syslog to use the
- 2c00: leaked kernel_t unix_dgram_socket from system-jounald.- Fix sem
- 2c40: anage to work with unconfined domain disabled on F18.- Dontaudit
- 2c80: attempts by mozilla plugins to getattr on all kernel sysctls.-
- 2cc0: Virt seems to be using lock files.- Dovecot seems to be searchin
- 2d00: g directories of every mountpoint.- Allow jockey to read random/
- 2d40: urandom, execute shell and install third-party drivers.- Add adi
- 2d80: tional params to allow cachedfiles to manage its content.- gpg a
- 2dc0: gent needs to read /dev/random.- The kernel hands an svirt domai
- 2e00: ns /SYSxxxxx which is a tmpfs that httpd wants to read and write
- 2e40: .- Add a bunch of dontaudit rules to quiet svirt_lxc domains.- A
- 2e80: dditional perms needed to run svirt_lxc domains.- Allow cgclear
- 2ec0: to read cgconfig.- Allow sys_ptrace capability for snmp.- Allow
- 2f00: freshclam to read /proc.- Allow procmail to manage /home/user/Ma
- 2f40: ildir content.- Allow NM to execute wpa_cli.- Allow amavis to re
- 2f80: ad clamd system state.- Regenerate man pages.- Rebuilt for https
- 2fc0: ://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild.- Add realmd an
- 3000: d stapserver policies.- Allow useradd to manage stap-server lib
- 3040: files.- Tighten up capabilities for confined users.- Label /etc/
- 3080: security/opasswd as shadow_t.- Add label for /dev/ecryptfs.- All
- 30c0: ow condor_startd_t to start sshd with the ranged.- Allow lpstat.
- 3100: cups to read fips_enabled file.- Allow pyzor running as spamc_t
- 3140: to create /root/.pyzor directory.- Add labelinf for amavisd-snmp
- 3180: init script.- Add support for amavisd-snmp.- Allow fprintd sigk
- 31c0: ill self.- Allow xend (w/o libvirt) to start virtual machines.-
- 3200: Allow aiccu to read /etc/passwd.- Allow condor_startd to Make sp
- 3240: ecified domain MCS trusted for setting any category set for the
- 3280: processes it executes.- Add condor_startd_ranged_domtrans_to() i
- 32c0: nterface.- Add ssd_conf_t for /etc/sssd.- accountsd needs to fch
- 3300: own some files/directories.- Add ICACLient and zibrauserdata as
- 3340: mozilla_filetrans_home_content.- SELinux reports afs_t needs dac
- 3380: _override to read /etc/mtab, even though everything works, addin
- 33c0: g dontaudit.- Allow xend_t to read the /etc/passwd file.- Until
- 3400: we figure out how to fix systemd issues, allow all apps that sen
- 3440: d syslog messages to send them to kernel_t.- Add init_access_che
- 3480: ck() interface.- Fix label on /usr/bin/pingus to not be labeled
- 34c0: as ping_exec_t.- Allow tcpdump to create a netlink_socket.- Labe
- 3500: l newusers like useradd.- Change xdm log files to be labeled xdm
- 3540: _log_t.- Allow sshd_t with privsep to work in MLS.- Allow freshc
- 3580: lam to update databases thru HTTP proxy.- Allow s-m-config to ac
- 35c0: cess check on systemd.- Allow abrt to read public files by defau
- 3600: lt.- Fix amavis_create_pid_files() interface.- Add labeling and
- 3640: filename transition for dbomatic.log.- Allow system_dbusd_t to s
- 3680: tream connect to bluetooth, and use its socket.- Allow amavisd t
- 36c0: o execute fsav.- Allow tuned to use sys_admin and sys_nice capab
- 3700: ilities.- Add php-fpm policy from Bryan.- Add labeling for aeolu
- 3740: s-configserver-thinwrapper.- Allow thin domains to execute shell
- 3780: .- Fix gnome_role_gkeyringd() interface description.- Lot of int
- 37c0: erface fixes.- Allow OpenMPI job running as condor_startd_ssh_t
- 3800: to manage condor lib files.- Allow OpenMPI job to use kerberos.-
- 3840: Make deltacloudd_t as nsswitch_domain.- Allow xend_t to run lss
- 3880: csi.- Allow qemu-dm running as xend_t to create tun_socket.- Add
- 38c0: labeling for /opt/brother/Printers(.*/)?inf.- Allow jockey-back
- 3900: end to read pyconfig-64.h labeled as usr_t.- Fix clamscan_can_sc
- 3940: an_system boolean.- Allow lpr to connectto to /run/user/$USER/ke
- 3980: yring-22uREb/pkcs11.- initrc is calling exportfs which is not co
- 39c0: nfined so it attempts to read nfsd_files.- Fixes for passenger r
- 3a00: unning within openshift..- Add labeling for all tomcat6 dirs.- A
- 3a40: dd support for tomcat6.- Allow cobblerd to read /etc/passwd.- Al
- 3a80: low jockey to read sysfs and and execute binaries with bin_t.- A
- 3ac0: llow thum to use user terminals.- Allow cgclear to read cgconfig
- 3b00: config files.- Fix bcf2g.fc.- Remove sysnet_dns_name_resolve()
- 3b40: from policies where auth_use_nsswitch() is used for other domain
- 3b80: s.- Allow dbomatic to execute ruby.- abrt_watch_log should be ab
- 3bc0: rt_domain.- Allow mozilla_plugin to connect to gatekeeper port.-
- 3c00: add ptrace_child access to process.- remove files_read_etc_file
- 3c40: s() calling from all policies which have auth_use_nsswith().- Al
- 3c80: low boinc domains to manage boinc_lib_t lnk_files.- Add support
- 3cc0: for boinc-client.service unit file.- Add support for boinc.log.-
- 3d00: Allow mozilla_plugin execmod on mozilla home files if allow_ex.
- 3d40: - Allow dovecot_deliver_t to read dovecot_var_run_t.- Allow ldco
- 3d80: nfig and insmod to manage kdumpctl tmp files.- Move thin policy
- 3dc0: out from cloudform.pp and add a new thin poli.- pacemaker needs
- 3e00: to communicate with corosync streams.- abrt is now started on de
- 3e40: mand by dbus.- Allow certmonger to talk directly to Dogtag serve
- 3e80: rs.- Change labeling for /var/lib/cobbler/webui_sessions to http
- 3ec0: d_c.- Allow mozila_plugin to execute gstreamer home files.- Allo
- 3f00: w useradd to delete all file types stored in the users hom.- rhs
- 3f40: mcertd reads the rpm database.- Add support for lightdm.- Add to
- 3f80: mcat policy.- Remove pyzor/razor policy.- rhsmcertd reads the rp
- 3fc0: m database.- Dontaudit thumb to setattr on xdm_tmp dir.- Allow
- 13:00:16.894352 <= Recv data, 16384 bytes (0x4000)
- 0000: wicd to execute ldconfig in the networkmanager_t domain.- Add /v
- 0040: ar/run/cherokee\.pid labeling.- Allow mozilla_plugin to create m
- 0080: ozilla_plugin_tmp_t lnk files too.- Allow postfix-master to r/w
- 00c0: pipes other postfix domains.- Allow snort to create netlink_sock
- 0100: et.- Add kdumpctl policy.- Allow firstboot to create tmp_t files
- 0140: /directories.- /usr/bin/paster should not be labeled as piranha_
- 0180: exec_t.- remove initrc_domain from tomcat.- Allow ddclient to re
- 01c0: ad /etc/passwd.- Allow useradd to delete all file types stored i
- 0200: n the users homedir.- Allow ldconfig and insmod to manage kdumpc
- 0240: tl tmp files.- Firstboot should be just creating tmp_t dirs and
- 0280: xauth should be allowed to write to those.- Transition xauth fil
- 02c0: es within firstboot_tmp_t.- Fix labeling of /run/media to match
- 0300: /media.- Label all lxdm.log as xserver_log_t.- Add port definiti
- 0340: on for mxi port.- Allow local_login_t to execute tmux.- apcupsd
- 0380: needs to read /etc/passwd.- Sanlock allso sends sigkill.- Allow
- 03c0: glance_registry to connect to the mysqld port.- Dontaudit mozill
- 0400: a_plugin trying to getattr on /dev/gpmctl.- Allow firefox plugin
- 0440: s/flash to connect to port 1234.- Allow mozilla plugins to delet
- 0480: e user_tmp_t files.- Add transition name rule for printers.conf.
- 04c0: O.- Allow virt_lxc_t to read urand.- Allow systemd_loigind to li
- 0500: st gstreamer_home_dirs.- Fix labeling for /usr/bin.- Fixes for c
- 0540: loudform services. * support FIPS.- Allow polipo to work as web
- 0580: caching.- Allow chfn to execute tmux.- Add support for ecryptfs
- 05c0: . * ecryptfs does not support xattr. * we need labeling for HO
- 0600: MEDIR.- Add policy for (u)mount.ecryptfs*.- Fix labeling of kerb
- 0640: ero host cache files, allow rpc.svcgssd to manage host cache.- A
- 0680: llow dovecot to manage Maildir content, fix transitions to Maild
- 06c0: ir.- Allow postfix_local to transition to dovecot_deliver.- Dont
- 0700: audit attempts to setattr on xdm_tmp_t, looks like bogus code.-
- 0740: Cleanup interface definitions.- Allow apmd to change with the lo
- 0780: gind daemon.- Changes required for sanlock in rhel6.- Label /run
- 07c0: /user/apache as httpd_tmp_t.- Allow thumb to use lib_t as execmo
- 0800: d if boolean turned on.- Allow squid to create the squid directo
- 0840: ry in /var with the correct labe.- Add a new policy for glusterd
- 0880: from Bryan Bickford (bbickfor@redhat.com).- Allow virtd to exec
- 08c0: xend_exec_t without transition.- Allow virtd_lxc_t to unmount a
- 0900: ll file systems.- PolicyKit path has changed.- Allow httpd conne
- 0940: ct to dirsrv socket.- Allow tuned to write generic kernel sysctl
- 0980: s.- Dontaudit logwatch to gettr on /dev/dm-2.- Allow policykit-a
- 09c0: uth to manage kerberos files.- Make condor_startd and rgmanager
- 0a00: as initrc domain.- Allow virsh to read /etc/passwd.- Allow mount
- 0a40: to mount on user_tmp_t for /run/user/dwalsh/gvfs.- xdm now need
- 0a80: s to execute xsession_exec_t.- Need labels for /var/lib/gdm.- Fi
- 0ac0: x files_filetrans_named_content() interface.- Add new attribute
- 0b00: - initrc_domain.- Allow systemd_logind_t to signal, signull, sig
- 0b40: kill all processes.- Add filetrans rules for etc_runtime files.-
- 0b80: Rename boolean names to remove allow_.- Mass merge with upstrea
- 0bc0: m. * new policy topology to include contrib policy modules. *
- 0c00: we have now two base policy patches.- Fix description of authlog
- 0c40: in_nsswitch_use_ldap.- Fix transition rule for rhsmcertd_t neede
- 0c80: d for RHEL7.- Allow useradd to list nfs state data.- Allow openv
- 0cc0: pn to manage its log file and directory.- We want vdsm to transi
- 0d00: tion to mount_t when executing mount command to make sure /etc/m
- 0d40: tab remains labeled correctly.- Allow thumb to use nvidia device
- 0d80: s.- Allow local_login to create user_tmp_t files for kerberos.-
- 0dc0: Pulseaudio needs to read systemd_login /var/run content.- virt
- 0e00: should only transition named system_conf_t config files.- Allow
- 0e40: munin to execute its plugins.- Allow nagios system plugin to re
- 0e80: ad /etc/passwd.- Allow plugin to connect to soundd port.- Fix ht
- 0ec0: tpd_passwd to be able to ask passwords.- Radius servers can use
- 0f00: ldap for backing store.- Seems to need to mount on /var/lib for
- 0f40: xguest polyinstatiation to work..- Allow systemd_logind to list
- 0f80: the contents of gnome keyring.- VirtualGL need xdm to be able to
- 0fc0: manage content in /etc/opt/VirtualGL.- Add policy for isns-util
- 1000: s.- Add policy for subversion daemon.- Allow boinc to read passw
- 1040: d.- Allow pads to read kernel network state.- Fix man2html inter
- 1080: face for sepolgen-ifgen.- Remove extra /usr/lib/systemd/system/s
- 10c0: mb.- Remove all /lib/systemd and replace with /usr/lib/systemd.-
- 1100: Add policy for man2html.- Fix the label of kerberos_home_t to k
- 1140: rb5_home_t.- Allow mozilla plugins to use Citrix.- Allow tuned t
- 1180: o read /proc/sys/kernel/nmi_watchdog.- Allow tune /sys options v
- 11c0: ia systemd's tmpfiles.d "w" type.- Dontaudit lpr_t to read/write
- 1200: leaked mozilla tmp files.- Add file name transition for .grl-po
- 1240: dcasts directory.- Allow corosync to read user tmp files.- Allow
- 1280: fenced to create snmp lib dirs/files.- More fixes for sge polic
- 12c0: y.- Allow mozilla_plugin_t to execute any application.- Allow db
- 1300: us to read/write any open file descriptors to any non security f
- 1340: ile on the system that it inherits to that it can pass them to a
- 1380: nother domain.- Allow mongod to read system state information.-
- 13c0: Fix wrong type, we should dontaudit sys_admin for xdm_t not xse
- 1400: rver_t.- Allow polipo to manage polipo_cache dirs.- Add jabbar_c
- 1440: lient port to mozilla_plugin_t.- Cleanup procmail policy.- syste
- 1480: m bus will pass around open file descriptors on files that do no
- 14c0: t have labels on them.- Allow l2tpd_t to read system state.- All
- 1500: ow tuned to run ls /dev.- Allow sudo domains to read usr_t files
- 1540: .- Add label to machine-id .- Fix corecmd_read_bin_symlinks cut
- 1580: and paste error.- Fix pulseaudio port definition.- Add labeling
- 15c0: for condor_starter.- Allow chfn_t to creat user_tmp_files.- Allo
- 1600: w chfn_t to execute bin_t.- Allow prelink_cron_system_t to getpw
- 1640: calls.- Allow sudo domains to manage kerberos rcache files.- Al
- 1680: low user_mail_domains to work with courie.- Port definitions nec
- 16c0: essary for running jboss apps within openshift.- Add support fo
- 1700: r openstack-nova-metadata-api.- Add support for nova-console*.-
- 1740: Add support for openstack-nova-xvpvncproxy.- Fixes to make privs
- 1780: ep+SELinux working if we try to use chage to change passwd.- Fix
- 17c0: auth_role() interface.- Allow numad to read sysfs.- Allow matah
- 1800: ari-rpcd to execute shell.- Add label for ~/.spicec.- xdm is exe
- 1840: cuting lspci as root which is requesting a sys_admin priv but se
- 1880: ems to succeed without it.- Devicekit_disk wants to read the log
- 18c0: ind sessions file when writing a cd.- Add fixes for condor to ma
- 1900: ke condor jobs working correctly.- Change label of /var/log/rpmp
- 1940: kgs to cron_log_t.- Access requires to allow systemd-tmpfiles --
- 1980: create to work..- Fix obex to be a user application started by t
- 19c0: he session bus..- Add additional filename trans rules for kerber
- 1a00: os.- Fix /var/run/heartbeat labeling.- Allow apps that are manag
- 1a40: ing rcache to file trans correctly.- Allow openvpn to authentica
- 1a80: te against ldap server.- Containers need to listen to network st
- 1ac0: arting and stopping events.- Make systemd unit files less specif
- 1b00: ic.- Fix zarafa labeling.- Allow guest_t to fix labeling.- coren
- 1b40: et_tcp_bind_all_unreserved_ports(ssh_t) should be called with th
- 1b80: e user_tcp_server boolean.- add lxc_contexts.- Allow accountsd t
- 1bc0: o read /proc.- Allow restorecond to getattr on all file sytems.-
- 1c00: tmpwatch now calls getpw.- Allow apache daemon to transition to
- 1c40: pwauth domain.- Label content under /var/run/user/NAME/keyring*
- 1c80: as gkeyringd_tmp_t.- The obex socket seems to be a stream socke
- 1cc0: t.- dd label for /var/run/nologin.- Allow jetty running as httpd
- 1d00: _t to read hugetlbfs files.- Allow sys_nice and setsched for rhs
- 1d40: mcertd.- Dontaudit attempts by mozilla_plugin_t to bind to ssdp
- 1d80: ports.- Allow setfiles to append to xdm_tmp_t.- Add labeling for
- 1dc0: /export as a usr_t directory.- Add labels for .grl files create
- 1e00: d by gstreamer.- Add labeling for /usr/share/jetty/bin/jetty.sh.
- 1e40: - Add jetty policy which contains file type definitios.- Allow j
- 1e80: ockey to use its own fifo_file and make this the default for all
- 1ec0: domains.- Allow mozilla_plugins to use spice (vnc_port/couchdb)
- 1f00: .- asterisk wants to read the network state.- Blueman now uses /
- 1f40: var/lib/blueman- Add label for nodejs_debug.- Allow mozilla_plug
- 1f80: in_t to create ~/.pki directory and content.- Add clamscan_can_s
- 1fc0: can_system boolean.- Allow mysqld to read kernel network state.-
- 2000: Allow sshd to read/write condor lib files.- Allow sshd to read/
- 2040: write condor-startd tcp socket.- Fix description on httpd_gracef
- 2080: ul_shutdown.- Allow glance_registry to communicate with mysql.-
- 20c0: dbus_system_domain is using systemd to lauch applications.- add
- 2100: interfaces to allow domains to send kill signals to user mail ag
- 2140: ents.- Remove unnessary access for svirt_lxc domains, add privs
- 2180: for virtd_lxc_t.- Lots of new access required for secure contain
- 21c0: ers.- Corosync needs sys_admin capability.- ALlow colord to crea
- 2200: te shm.- .orc should be allowed to be created by any app that ca
- 2240: n create gstream home content, thumb_t to be specific.- Add bool
- 2280: ean to control whether or not mozilla plugins can create random
- 22c0: content in the users homedir.- Add new interface to allow domai
- 2300: ns to list msyql_db directories, needed for libra.- shutdown has
- 2340: to be allowed to delete etc_runtime_t.- Fail2ban needs to read
- 2380: /etc/passwd.- Allow ldconfig to create /var/cache/ldconfig.- Al
- 23c0: low tgtd to read hardware state information.- Allow collectd to
- 2400: create packet socket.- Allow chronyd to send signal to itself.-
- 2440: Allow collectd to read /dev/random.- Allow collectd to send sign
- 2480: al to itself.- firewalld needs to execute restorecon.- Allow res
- 24c0: torecon and other login domains to execute restorecon.- Allow lo
- 2500: grotate to getattr on systemd unit files.- Add support for tor s
- 2540: ystemd unit file.- Allow apmd to create /var/run/pm-utils with t
- 2580: he correct label.- Allow l2tpd to send sigkill to pppd.- Allow p
- 25c0: ppd to stream connect to l2tpd.- Add label for scripts in /etc/g
- 2600: dm/.- Allow systemd_logind_t to ignore mcs constraints on sigkil
- 2640: l.- Fix files_filetrans_system_conf_named_files() interface.- Ad
- 2680: d labels for /usr/share/wordpress/wp-includes/*.php.- Allow cobb
- 26c0: ler to get SELinux mode and booleans.- Add unconfined_execmem_ex
- 2700: ec_t as an alias to bin_t.- Allow fenced to read snmp var lib fi
- 2740: les, also allow it to read usr_t.- ontaudit access checks on all
- 2780: executables from mozilla_plugin.- Allow all user domains to set
- 27c0: exec, so that sshd will work properly if it call setexec(NULL) w
- 2800: hile running withing a user mode.- Allow systemd_tmpfiles_t to g
- 2840: etattr all pipes and sockets.- Allow glance-registry to send sys
- 2880: tem log messages.- semanage needs to manage mock lib files/dirs.
- 28c0: - Add policy for abrt-watch-log.- Add definitions for jboss_mess
- 2900: aging ports.- Allow systemd_tmpfiles to manage printer devices.-
- 2940: Allow oddjob to use nsswitch.- Fix labeling of log files for po
- 2980: stgresql.- Allow mozilla_plugin_t to execmem and execstack by de
- 29c0: fault.- Allow firewalld to execute shell.- Fix /etc/wicd content
- 2a00: files to get created with the correct label.- Allow mcelog to e
- 2a40: xec shell.- Add ~/.orc as a gstreamer_home_t.- /var/spool/postfi
- 2a80: x/lib64 should be labeled lib_t.- mpreaper should be able to lis
- 2ac0: t all file system labeled directories.- Add support for apache t
- 2b00: o use openstack.- Add labeling for /etc/zipl.conf and zipl binar
- 2b40: y.- Turn on allow_execstack and turn off telepathy transition fo
- 2b80: r final release.- More access required for virt_qmf_t.- Addition
- 2bc0: al assess required for systemd-logind to support multi-seat.- Al
- 2c00: low mozilla_plugin to setrlimit.- Revert changes to fuse file sy
- 2c40: stem to stop deadlock.- Allow condor domains to connect to ephem
- 2c80: eral ports.- More fixes for condor policy.- Allow keystone to st
- 2cc0: ream connect to mysqld.- Allow mozilla_plugin_t to read generic
- 2d00: USB device to support GPS devices.- Allow thum to file name tran
- 2d40: sition gstreamer home content.- Allow thum to read all non secur
- 2d80: ity files.- Allow glance_api_t to connect to ephemeral ports.- A
- 2dc0: llow nagios plugins to read /dev/urandom.- Allow syslogd to sear
- 2e00: ch postfix spool to support postfix chroot env.- Fix labeling fo
- 2e40: r /var/spool/postfix/dev.- Allow wdmd chown.- Label .esd_auth as
- 2e80: pulseaudio_home_t.- Have no idea why keyring tries to write to
- 2ec0: /run/user/dwalsh/dconf/user, but we can dontaudit for now.- Add
- 2f00: support for clamd+systemd.- Allow fresclam to execute systemctl
- 2f40: to handle clamd.- Change labeling for /usr/sbin/rpc.ypasswd.env.
- 2f80: .- Allow yppaswd_t to execute yppaswd_exec_t..- Allow yppaswd_t
- 2fc0: to read /etc/passwd.- Gnomekeyring socket has been moved to /run
- 3000: /user/USER/.- Allow samba-net to connect to ldap port.- Allow si
- 3040: gnal for vhostmd.- allow mozilla_plugin_t to read user_home_t so
- 3080: cket.- New access required for secure Linux Containers.- zfs now
- 30c0: supports xattrs.- Allow quantum to execute sudo and list sysfs.
- 3100: - Allow init to dbus chat with the firewalld.- Allow zebra to re
- 3140: ad /etc/passwd.- Allow svirt_t to create content in the users ho
- 3180: medir under ~/.libvirt.- Fix label on /var/lib/heartbeat.- Allow
- 31c0: systemd_logind_t to send kill signals to all processes started
- 3200: by a user.- Fuse now supports Xattr Support.- upowered needs to
- 3240: setsched on the kernel.- Allow mpd_t to manage log files.- Allow
- 3280: xdm_t to create /var/run/systemd/multi-session-x.- Add rules fo
- 32c0: r missedfont.log to be used by thumb.fc.- Additional access requ
- 3300: ired for virt_qmf_t.- Allow dhclient to dbus chat with the firew
- 3340: alld.- Add label for lvmetad.- Allow systemd_logind_t to remove
- 3380: userdomain sock_files.- Allow cups to execute usr_t files.- Fix
- 33c0: labeling on nvidia shared libraries.- wdmd_t needs access to sss
- 3400: d and /etc/passwd.- Add boolean to allow ftp servers to run in p
- 3440: assive mode.- Allow namepspace_init_t to relabelto/from a differ
- 3480: ent user system_u from the user the namespace_init running with.
- 34c0: - Fix using httpd_use_fusefs.- Allow chrome_sandbox_nacl to writ
- 3500: e inherited user tmp files as we allow it for chrome_sandbox.- R
- 3540: ename rdate port to time port, and allow gnomeclock to connect t
- 3580: o it.- We no longer need to transition to ldconfig from rpm, rpm
- 35c0: _script, or anaconda.- /etc/auto.* should be labeled bin_t.- Add
- 3600: httpd_use_fusefs boolean.- Add fixes for heartbeat.- Allow sshd
- 3640: _t to signal processes that it transitions to.- Add condor polic
- 3680: y.- Allow svirt to create monitors in ~/.libvirt.- Allow dovecot
- 36c0: to domtrans sendmail to handle sieve scripts.- Lot of fixes for
- 3700: cfengine.- /var/run/postmaster.* labeling is no longer needed.-
- 3740: Alllow drbdadmin to read /dev/urandom.- l2tpd_t seems to use pt
- 3780: mx.- group+ and passwd+ should be labeled as /etc/passwd.- Zaraf
- 37c0: a-indexer is a socket.- Ensure lastlog is labeled correctly.- Al
- 3800: low accountsd to read /proc data about gdm.- Add fixes for tuned
- 3840: .- Add bcfg2 fixes which were discovered during RHEL6 testing.-
- 3880: More fixes for gnome-keyring socket being moved.- Run semanage a
- 38c0: s a unconfined domain, and allow initrc_t to create tmpfs_t sym
- 3900: links on shutdown.- Fix description for files_dontaudit_read_sec
- 3940: urity_files() interface.- Add new policy and man page for bcfg2.
- 3980: - cgconfig needs to use getpw calls.- Allow domains that communi
- 39c0: cate with the keyring to use cache_home_t instead of gkeyringd_t
- 3a00: mpt.- gnome-keyring wants to create a directory in cache_home_t.
- 3a40: - sanlock calls getpw.- Add numad policy and numad man page.- Ad
- 3a80: d fixes for interface bugs discovered by SEWatch.- Add /tmp supp
- 3ac0: ort for squid.- Add fix for #799102. * change default labeli
- 3b00: ng for /var/run/slapd.* sockets.- Make thumb_t as userdom_home_r
- 3b40: eader.- label /var/lib/sss/mc same as pubconf, so getpw domains
- 3b80: can read it.- Allow smbspool running as cups_t to stream connect
- 3bc0: to nmbd.- accounts needs to be able to execute passwd on behalf
- 3c00: of users.- Allow systemd_tmpfiles_t to delete boot flags.- Allo
- 3c40: w dnssec_trigger to connect to apache ports.- Allow gnome keyrin
- 3c80: g to create sock_files in ~/.cache.- google_authenticator is usi
- 3cc0: ng .google_authenticator.- sandbox running from within firefox i
- 3d00: s exposing more leaks.- Dontaudit thumb to read/write /dev/card0
- 3d40: .- Dontaudit getattr on init_exec_t for gnomeclock_t.- Allow cer
- 3d80: tmonger to do a transition to certmonger_unconfined_t.- Allow dh
- 3dc0: cpc setsched which is caused by nmcli.- Add rpm_exec_t for /usr/
- 3e00: sbin/bcfg2.- system cronjobs are sending dbus messages to system
- 3e40: d_logind.- Thumnailers read /dev/urand.- Allow auditctl getcap.-
- 3e80: Allow vdagent to use libsystemd-login.- Allow abrt-dump-oops to
- 3ec0: search /etc/abrt.- Got these avc's while trying to print a boar
- 3f00: ding pass from firefox.- Devicekit is now putting the media dire
- 3f40: ctory under /run/media.- Allow thumbnailers to create content in
- 3f80: ~/.thumbails directory.- Add support for proL2TPd by Dominick G
- 3fc0: rift.- Allow all domains to call getcap.- wdmd seems to get a ra
- 13:00:16.899930 <= Recv data, 16384 bytes (0x4000)
- 0000: ndom chown capability check that it does not need.- Allow vhostm
- 0040: d to read kernel sysctls.- Allow chronyd to read unix.- Allow hp
- 0080: fax to read /etc/passwd.- Add support matahari vios-proxy-* apps
- 00c0: and add virtd_exec_t label for them.- Allow rpcd to read quota_
- 0100: db_t.- Update to man pages to match latest policy.- Fix bug in j
- 0140: ockey interface for sepolgen-ifgen.- Add initial svirt_prot_exec
- 0180: _t policy.- More fixes for systemd from Dan Walsh.- Add a new ty
- 01c0: pe for /etc/firewalld and allow firewalld to write to this direc
- 0200: tory.- Add definition for ~/Maildir, and allow mail deliver doma
- 0240: ins to write there.- Allow polipo to run from a cron job.- Allow
- 0280: rtkit to schedule wine processes.- Allow mozilla_plugin_t to ac
- 02c0: quire a bug, and allow it to transition gnome content in the hom
- 0300: e dir to the proper label.- Allow users domains to send signals
- 0340: to consolehelper domains.- More fixes for boinc policy.- Allow p
- 0380: olipo domain to create its own cache dir and pid file.- Add syst
- 03c0: emctl support to httpd domain.- Add systemctl support to polipo,
- 0400: allow NetworkManager to manage the service.- Add policy for joc
- 0440: key-backend.- Add support for motion daemon which is now covered
- 0480: by zoneminder policy.- Allow colord to read/write motion tmpfs.
- 04c0: - Allow vnstat to search through var_lib_t directories.- Stop tr
- 0500: ansitioning to quota_t, from init an sysadm_t.- Add svirt_lxc_fi
- 0540: le_t as a customizable type.- Add additional fixes for icmp nagi
- 0580: os plugin.- Allow cron jobs to open fifo_files from cron, since
- 05c0: service script opens /dev/stdin.- Add certmonger_unconfined_exec
- 0600: _t.- Make sure tap22 device is created with the correct label.-
- 0640: Allow staff users to read systemd unit files.- Merge in previous
- 0680: ly built policy.- Arpwatch needs to be able to start netlink soc
- 06c0: kets in order to start.- Allow cgred_t to sys_ptrace to look at
- 0700: other DAC Processes.- Back port some of the access that was allo
- 0740: wed in nsplugin_t.- Add definitiona for couchdb ports.- Allow na
- 0780: gios to use inherited users ttys.- Add git support for mock.- Al
- 07c0: low inetd to use rdate port.- Add own type for rdate port.- Allo
- 0800: w samba to act as a portmapper.- Dontaudit chrome_sandbox attemp
- 0840: ts to getattr on chr_files in /dev.- New fixes needed for samba4
- 0880: .- Allow apps that use lib_t to read lib_t symlinks.- Add policy
- 08c0: for nove-cert.- Add labeling for nova-openstack systemd unit f
- 0900: iles.- Add policy for keystoke.- Fix man pages fro domains.- Add
- 0940: man pages for SELinux users and roles.- Add storage_dev_filetra
- 0980: ns_named_fixed_disk() and use it for smartmon.- Add policy for m
- 09c0: atahari-rpcd.- nfsd executes mount command on restart.- Matahari
- 0a00: domains execute renice and setsched.- Dontaudit leaked tty in m
- 0a40: ozilla_plugin_config.- mailman is changing to a per instance nam
- 0a80: ing.- Add 7600 and 4447 as jboss_management ports.- Add fixes fo
- 0ac0: r nagios event handlers.- Label httpd.event as httpd_exec_t, it
- 0b00: is an apache daemon.- Add labeling for /var/spool/postfix/dev/lo
- 0b40: g.- NM reads sysctl.conf.- Iscsi log file context specification
- 0b80: fix.- Allow mozilla plugins to send dbus messages to user domai
- 0bc0: ns that transition to it.- Allow mysql to read the passwd file.-
- 0c00: Allow mozilla_plugin_t to create mozilla home dirs in user home
- 0c40: dir.- Allow deltacloud to read kernel sysctl.- Allow postgresql_
- 0c80: t to connectto itselfAllow postgresql_t to connectto itself.- Al
- 0cc0: low postgresql_t to connectto itself.- Add login_userdomain attr
- 0d00: ibute for users which can log in using terminal.- Allow sysadm_u
- 0d40: to reach system_r by default #784011.- Allow nagios plugins to
- 0d80: use inherited user terminals.- Razor labeling is not used no lon
- 0dc0: ger.- Add systemd support for matahari.- Add port_types to man p
- 0e00: age, move booleans to the top, fix some english.- Add support fo
- 0e40: r matahari-sysconfig-console.- Clean up matahari.fc.- Fix mataha
- 0e80: ri_admin() interfac.- Add labels for/etc/ssh/ssh_host_*.pub keys
- 0ec0: .- Allow ksysguardproces to send system log msgs.- Allow boinc
- 0f00: setpgid and signull.- Allow xdm_t to sys_ptrace to run pidof com
- 0f40: mand.- Allow smtpd_t to manage spool files/directories and symbo
- 0f80: lic links.- Add labeling for jetty.- Needed changes to get unbou
- 0fc0: nd/dnssec to work with openswan.- Add user_fonts_t alias xfs_tmp
- 1000: _t.- Since depmod now runs as insmod_t we need to write to kerne
- 1040: l_object_t.- Allow firewalld to dbus chat with networkmanager.-
- 1080: Allow qpidd to connect to matahari ports.- policykit needs to re
- 10c0: ad /proc for uses not owned by it.- Allow systemctl apps to conn
- 1100: ecto the init stream.- Turn on deny_ptrace boolean.- Remove pam_
- 1140: selinux.8 man page. There was a conflict..- Add proxy class and
- 1180: read access for gssd_proxy.- Separate out the sharing public con
- 11c0: tent booleans.- Allow certmonger to execute a script and send si
- 1200: gnals to apache and dirsrv to reload the certificate.- Add lab
- 1240: el transition for gstream-0.10 and 12.- Add booleans to allow rs
- 1280: ync to share nfs and cifs file sytems.- chrome_sandbox wants to
- 12c0: read the /proc/PID/exe file of the program that executed it.- Fi
- 1300: x filename transitions for cups files.- Allow denyhosts to read
- 1340: "unix".- Add file name transition for locale.conf.new.- Allow bo
- 1380: inc projects to gconf config files.- sssd needs to be able to in
- 13c0: crease the socket limit under certain loads.- sge_execd needs to
- 1400: read /etc/passwd.- Allow denyhost to check network state.- Netw
- 1440: orkManager needs to read sessions data.- Allow denyhost to check
- 1480: network state.- Allow xen to search virt images directories.- A
- 14c0: dd label for /dev/megaraid_sas_ioctl_node.- Add autogenerated ma
- 1500: n pages.- Allow boinc project to getattr on fs.- Allow init to e
- 1540: xecute initrc_state_t.- rhev-agent package was rename to ovirt-g
- 1580: uest-agent.- If initrc_t creates /etc/local.conf then we need to
- 15c0: make sure it is labeled correctly.- sytemd writes content to /r
- 1600: un/initramfs and executes it on shutdown.- kdump_t needs to read
- 1640: /etc/mtab, should be back ported to F16.- udev needs to load ke
- 1680: rnel modules in early system boot.- Need to add sys_ptrace back
- 16c0: in since reading any content in /proc can cause these accesses.-
- 1700: Add additional systemd interfaces which are needed fro *_admin
- 1740: interfaces.- Fix bind_admin() interface.- Allow firewalld to rea
- 1780: d urand.- Alias java, execmem_mono to bin_t to allow third parti
- 17c0: es.- Add label for kmod.- /etc/redhat-lsb contains binaries.- Ad
- 1800: d boolean to allow gitosis to send mail.- Add filename transitio
- 1840: n also for "event20".- Allow systemd_tmpfiles_t to delete all fi
- 1880: le types.- Allow collectd to ipc_lock.- make consoletype_exec op
- 18c0: tional, so we can remove consoletype policy.- remove unconfined_
- 1900: permisive.patch.- Allow openvpn_t to inherit user home content a
- 1940: nd tmp content.- Fix dnssec-trigger labeling.- Turn on obex poli
- 1980: cy for staff_t.- Pem files should not be secret.- Add lots of ru
- 19c0: les to fix AVC's when playing with containers.- Fix policy for d
- 1a00: nssec.- Label ask-passwd directories correctly for systemd.- ssh
- 1a40: d fixes seem to be causing unconfined domains to dyntrans to the
- 1a80: mselves.- fuse file system is now being mounted in /run/user.- s
- 1ac0: ystemd_logind is sending signals to processes that are dbus mess
- 1b00: aging with it.- Add support for winshadow port and allow iscsid
- 1b40: to connect to this port.- httpd should be allowed to bind to the
- 1b80: http_port_t udp socket.- zarafa_var_lib_t can be a lnk_file.- A
- 1bc0: couple of new .xsession-errors files.- Seems like user space an
- 1c00: d login programs need to read logind_sessions_files.- Devicekit
- 1c40: disk seems to be being launched by systemd.- Cleanup handling of
- 1c80: setfiles so most of rules in te file.- Correct port number for
- 1cc0: dnssec.- logcheck has the home dir set to its cache.- Add policy
- 1d00: for grindengine MPI jobs.- Add new sysadm_secadm.pp module..* c
- 1d40: ontains secadm definition for sysadm_t.- Move user_mail_domain a
- 1d80: ccess out of the interface into the te file.- Allow httpd_t to c
- 1dc0: reate httpd_var_lib_t directories as well as files.- Allow snmpd
- 1e00: to connect to the ricci_modcluster stream.- Allow firewalld to
- 1e40: read /etc/passwd.- Add auth_use_nsswitch for colord.- Allow smar
- 1e80: td to read network state.- smartdnotify needs to read /etc/group
- 1ec0: .- Allow gpg and gpg_agent to store sock_file in gpg_secret_t di
- 1f00: rectory.- lxdm startup scripts should be labeled bin_t, so confi
- 1f40: ned users will work.- mcstransd now creates a pid, needs back po
- 1f80: rt to F16.- qpidd should be allowed to connect to the amqp port.
- 1fc0: - Label devices 010-029 as usb devices.- ypserv packager says yp
- 2000: serv does not use tmp_t so removing selinux policy types.- Remov
- 2040: e all ptrace commands that I believe are caused by the kernel/ps
- 2080: avcs.- Add initial Obex policy.- Add logging_syslogd_use_tty bo
- 20c0: olean.- Add polipo_connect_all_unreserved bolean.- Allow zabbix
- 2100: to connect to ftp port.- Allow systemd-logind to be able to swit
- 2140: ch VTs.- Allow apache to communicate with memcached through a so
- 2180: ck_file.- Fix file_context.subs_dist for now to work with pre us
- 21c0: rmove.- More /usr move fixes.- Add zabbix_can_network boolean.-
- 2200: Add httpd_can_connect_zabbix boolean.- Prepare file context labe
- 2240: ling for usrmove functions.- Allow system cronjobs to read kerne
- 2280: l network state.- Add support for selinux_avcstat munin plugin.-
- 22c0: Treat hearbeat with corosync policy.- Allow corosync to read an
- 2300: d write to qpidd shared mem.- mozilla_plugin is trying to run p
- 2340: ulseaudio .- Fixes for new sshd patch for running priv sep domai
- 2380: ns as the users context.- Turn off dontaudit rules when turning
- 23c0: on allow_ypbind.- udev now reads /etc/modules.d directory.- Turn
- 2400: on deny_ptrace boolean for the Rawhide run, so we can test this
- 2440: out.- Cups exchanges dbus messages with init.- udisk2 needs to
- 2480: send syslog messages.- certwatch needs to read /etc/passwd.- Add
- 24c0: labeling for udisks2.- Allow fsadmin to communicate with the sy
- 2500: stemd process.- Treat Bip with bitlbee policy. * Bip is an
- 2540: IRC proxy.- Add port definition for interwise port.- Add support
- 2580: for ipa_memcached socket.- systemd_jounald needs to getattr on
- 25c0: all processes.- mdadmin fixes. * uses getpw.- amavisd calls
- 2600: getpwnam().- denyhosts calls getpwall().- Setup labeling of /var
- 2640: /rsa and /var/lib/rsa to allow login programs to write there.- b
- 2680: luetooth says they do not use /tmp and want to remove the type.-
- 26c0: Allow init to transition to colord.- Mongod needs to read /proc
- 2700: /sys/vm/zone_reclaim_mode.- Allow postfix_smtpd_t to connect to
- 2740: spamd.- Add boolean to allow ftp to connect to all ports > 1023.
- 2780: - Allow sendmain to write to inherited dovecot tmp files.- setro
- 27c0: ubleshoot needs to be able to execute rpm to see what version of
- 2800: packages.- Merge systemd patch.- systemd-tmpfiles wants to rela
- 2840: bel /sys/devices/system/cpu/online.- Allow deltacloudd dac_overr
- 2880: ide, setuid, setgid caps.- Allow aisexec to execute shell.- Add
- 28c0: use_nfs_home_dirs boolean for ssh-keygen.- Fixes to make rawhid
- 2900: e boot in enforcing mode with latest systemd changes.- Add label
- 2940: ing for /var/run/systemd/journal/syslog.- libvirt sends signals
- 2980: to ifconfig.- Allow domains that read logind session files to li
- 29c0: st them.- Fixed destined form libvirt-sandbox.- Allow apps that
- 2a00: list sysfs to also read sympolicy links in this filesystem.- Add
- 2a40: ubac_constrained rules for chrome_sandbox.- Need interface to a
- 2a80: llow domains to use tmpfs_t files created by the kernel, used by
- 2ac0: libra.- Allow postgresql to be executed by the caller.- Standar
- 2b00: dize interfaces of daemons .- Add new labeling for mm-handler.-
- 2b40: Allow all matahari domains to read network state and etc_runtime
- 2b80: _t files.- New fix for seunshare, requires seunshare_domains to
- 2bc0: be able to mounton /.- Allow systemctl running as logrotate_t to
- 2c00: connect to private systemd socket.- Allow tmpwatch to read memi
- 2c40: nfo.- Allow rpc.svcgssd to read supported_krb5_enctype.- Allow z
- 2c80: arafa domains to read /dev/random and /dev/urandom.- Allow snmpd
- 2cc0: to read dev_snmp6.- Allow procmail to talk with cyrus.- Add fix
- 2d00: es for check_disk and check_nagios plugins.- default trans rules
- 2d40: for Rawhide policy.- Make sure sound_devices controlC* are lab
- 2d80: eled correctly on creation.- sssd now needs sys_admin.- Allow sn
- 2dc0: mp to read all proc_type.- Allow to setup users homedir with quo
- 2e00: ta.group.- Add httpd_can_connect_ldap() interface.- apcupsd_t ne
- 2e40: eds to use seriel ports connected to usb devices.- Kde puts proc
- 2e80: mail mail directory under ~/.local/share.- nfsd_t can trigger sy
- 2ec0: s_rawio on tests that involve too many mountpoints, dontaudit fo
- 2f00: r now.- Add labeling for /sbin/iscsiuio.- Add label for /var/lib
- 2f40: /iscan/interpreter.- Dont audit writes to leaked file descriptor
- 2f80: s or redirected output for nacl.- NetworkManager needs to write
- 2fc0: to /sys/class/net/ib*/mode.- Allow abrt to request the kernel t
- 3000: o load a module.- Make sure mozilla content is labeled correctly
- 3040: .- Allow tgtd to read system state.- More fixes for boinc. * al
- 3080: low to resolve dns name. * re-write boinc policy to use boinc_d
- 30c0: omain attribute.- Allow munin services plugins to use NSCD servi
- 3100: ces.- Allow mozilla_plugin_t to manage mozilla_home_t.- Allow ss
- 3140: h derived domain to execute ssh-keygen in the ssh_keygen_t domai
- 3180: n.- Add label for tumblerd.- Fixes for xguest package.- Fixes re
- 31c0: lated to /bin, /sbin.- Allow abrt to getattr on blk files.- Add
- 3200: type for rhev-agent log file.- Fix labeling for /dev/dmfm.- Don
- 3240: taudit wicd leaking.- Allow systemd_logind_t to look at process
- 3280: info of apps that exchange dbus messages with it.- Label /etc/lo
- 32c0: cale.conf correctly.- Allow user_mail_t to read /dev/random.- Al
- 3300: low postfix-smtpd to read MIMEDefang.- Add label for /var/log/su
- 3340: php.log.- Allow swat_t to connect and read/write nmbd_t sock_fil
- 3380: e.- Allow systemd-tmpfiles to setattr for /run/user/gdm/dconf.-
- 33c0: Allow systemd-tmpfiles to change user identity in object context
- 3400: s.- More fixes for rhev_agentd_t consolehelper policy.- Use fs_u
- 3440: se_xattr for squashf.- Fix procs_type interface.- Dovecot has a
- 3480: new fifo_file /var/run/dovecot/stats-mail.- Dovecot has a new f
- 34c0: ifo_file /var/run/stats-mail.- Colord does not need to connect t
- 3500: o network.- Allow system_cronjob to dbus chat with NetworkManage
- 3540: r.- Puppet manages content, want to make sure it labels everythi
- 3580: ng correctly.- Change port 9050 to tor_socks_port_t and then all
- 35c0: ow openvpn to connect to it.- Allow all postfix domains to use t
- 3600: he fifo_file.- Allow sshd_t to getattr on all file systems in or
- 3640: der to generate avc on nfs_t.- Allow apmd_t to read grub.cfg.- L
- 3680: et firewallgui read the selinux config.- Allow systemd-tmpfiles
- 36c0: to delete content in /root that has been moved to /tmp.- Fix dev
- 3700: icekit_manage_pid_files() interface.- Allow squid to check the n
- 3740: etwork state.- Dontaudit colord getattr on file systems.- Allow
- 3780: ping domains to read zabbix_tmp_t files.- Allow mcelog_t to crea
- 37c0: te dir and file in /var/run and label it correctly.- Allow dbus
- 3800: to manage fusefs.- Mount needs to read process state when mounti
- 3840: ng gluster file systems.- Allow collectd-web to read collectd li
- 3880: b files.- Allow daemons and system processes started by init to
- 38c0: read/write the unix_stream_socket passed in from as stdin/stdout
- 3900: /stderr.- Allow colord to get the attributes of tmpfs filesystem
- 3940: .- Add sanlock_use_nfs and sanlock_use_samba booleans.- Add bin_
- 3980: t label for /usr/lib/virtualbox/VBoxManage.- Add ssh_dontaudit_s
- 39c0: earch_home_dir.- Changes to allow namespace_init_t to work.- Add
- 3a00: interface to allow exec of mongod, add port definition for mong
- 3a40: od port, 27017.- Label .kde/share/apps/networkmanagement/certifi
- 3a80: cates/ as home_cert_t.- Allow spamd and clamd to steam connect t
- 3ac0: o each other.- Add policy label for passwd.OLD.- More fixes for
- 3b00: postfix and postfix maildro.- Add ftp support for mozilla plugin
- 3b40: s.- Useradd now needs to manage policy since it calls libsemanag
- 3b80: e.- Fix devicekit_manage_log_files() interface.- Allow colord to
- 3bc0: execute ifconfig.- Allow accountsd to read /sys.- Allow mysqld-
- 3c00: safe to execute shell.- Allow openct to stream connect to pcscd.
- 3c40: - Add label for /var/run/nm-dns-dnsmasq\.conf.- Allow networkman
- 3c80: ager to chat with virtd_t.- Pulseaudio changes.- Merge patches.-
- 3cc0: Merge patches back into git repository..- Remove allow_execmem
- 3d00: boolean and replace with deny_execmem boolean.- Turn back on all
- 3d40: ow_execmem boolean.- Add more MCS fixes to make sandbox working.
- 3d80: - Make faillog MLS trusted to make sudo_$1_t working.- Allow san
- 3dc0: dbox_web_client_t to read passwd_file_t.- Add .mailrc file conte
- 3e00: xt.- Remove execheap from openoffice domain.- Allow chrome_sandb
- 3e40: ox_nacl_t to read cpu_info.- Allow virtd to relabel generic usb
- 3e80: which is need if USB device.- Fixes for virt.if interfaces to co
- 3ec0: nsider chr_file as image file type.- Remove Open Office policy.-
- 3f00: Remove execmem policy.- MCS fixes.- quota fixes.- Remove transi
- 3f40: tions to consoletype.- Make nvidia* to be labeled correctly.- Fi
- 3f80: x abrt_manage_cache() interface.- Make filetrans rules optional
- 3fc0: so base policy will build.- Dontaudit chkpwd_t access to inherit
- 13:00:16.909114 <= Recv data, 16384 bytes (0x4000)
- 0000: ed TTYS.- Make sure postfix content gets created with the correc
- 0040: t label.- Allow gnomeclock to read cgroup.- Fixes for cloudform
- 0080: policy.- Check in fixed for Chrome nacl support.- Begin removin
- 00c0: g qemu_t domain, we really no longer need this domain. .- syste
- 0100: md_passwd needs dac_overide to communicate with users TTY's.- Al
- 0140: low svirt_lxc domains to send kill signals within their containe
- 0180: r.- Remove qemu.pp again without causing a crash.- Remove qemu.p
- 01c0: p, everything should use svirt_t or stay in its current domain.-
- 0200: Allow policykit to talk to the systemd via dbus.- Move chrome_s
- 0240: andbox_nacl_t to permissive domains.- Additional rules for chrom
- 0280: e_sandbox_nacl.- Change bootstrap name to nacl.- Chrome still ne
- 02c0: eds execmem.- Missing role for chrome_sandbox_bootstrap.- Add bo
- 0300: olean to remove execmem and execstack from virtual machines.- Do
- 0340: ntaudit xdm_t doing an access_check on etc_t directories.- Allow
- 0380: named to connect to dirsrv by default.- add ldapmap1_0 as a krb
- 03c0: 5_host_rcache_t file.- Google chrome developers asked me to add
- 0400: bootstrap policy for nacl stuff.- Allow rhev_agentd_t to getattr
- 0440: on mountpoints.- Postfix_smtpd_t needs access to milters and cl
- 0480: eanup seems to read/write postfix_smtpd_t unix_stream_sockets.-
- 04c0: Fixes for cloudform policies which need to connect to random por
- 0500: ts.- Make sure if an admin creates modules content it creates th
- 0540: em with the correct label.- Add port 8953 as a dns port used by
- 0580: unbound.- Fix file name transition for alsa and confined users.-
- 05c0: Turn on mock_t and thumb_t for unconfined domains.- Policy upda
- 0600: te should not modify local contexts.- Remove ada policy.- Remove
- 0640: tzdata policy.- Add labeling for udev.- Add cloudform policy.-
- 0680: Fixes for bootloader policy.- Add policies for nova openstack.-
- 06c0: Add fixes for nova-stack policy.- Allow svirt_lxc_domain to chr_
- 0700: file and blk_file devices if they are in the domain.- Allow init
- 0740: process to setrlimit on itself.- Take away transition rules for
- 0780: users executing ssh-keygen.- Allow setroubleshoot_fixit_t to re
- 07c0: ad /dev/urand.- Allow sshd to relbale tunnel sockets.- Allow fai
- 0800: l2ban domtrans to shorewall in the same way as with iptables.- A
- 0840: dd support for lnk files in the /var/lib/sssd directory.- Allow
- 0880: system mail to connect to courier-authdaemon over an unix stream
- 08c0: socket.- Add passwd_file_t for /etc/ptmptmp.- Dontaudit access
- 0900: checks for all executables, gnome-shell is doing access(EXEC, X_
- 0940: OK).- Make corosync to be able to relabelto cluster lib fies.- A
- 0980: llow samba domains to search /var/run/nmbd.- Allow dirsrv to use
- 09c0: pam.- Allow thumb to call getuid.- chrome less likely to get mm
- 0a00: ap_zero bug so removing dontaudit.- gimp help-browser has built
- 0a40: in javascript.- Best guess is that devices named /dev/bsr4096 sh
- 0a80: ould be labeled as cpu_device_t.- Re-write glance policy.- Move
- 0ac0: dontaudit sys_ptrace line from permissive.te to domain.te.- Remo
- 0b00: ve policy for hal, it no longer exists.- Don't check md5 size or
- 0b40: mtime on certain config files.- Remove allow_ptrace and replace
- 0b80: it with deny_ptrace, which will remove all .ptrace from the sys
- 0bc0: tem.- Remove 2000 dontaudit rules between confined domains on tr
- 0c00: ansition.and replace with single.dontaudit domain domain:process
- 0c40: { noatsecure siginh rlimitinh } ;.- Fixes for bootloader policy
- 0c80: .- $1_gkeyringd_t needs to read $HOME/%USER/.local/share/keystor
- 0cc0: e.- Allow nsplugin to read /usr/share/config.- Allow sa-update t
- 0d00: o update rules.- Add use_fusefs_home_dirs for chroot ssh option.
- 0d40: - Fixes for grub2.- Update systemd_exec_systemctl() interface.-
- 0d80: Allow gpg to read the mail spool.- More fixes for sa-update runn
- 0dc0: ing out of cron job.- Allow ipsec_mgmt_t to read hardware state
- 0e00: information.- Allow pptp_t to connect to unreserved_port_t.- Don
- 0e40: taudit getattr on initctl in /dev from chfn.- Dontaudit getattr
- 0e80: on kernel_core from chfn.- Add systemd_list_unit_dirs to systemd
- 0ec0: _exec_systemctl call.- Fixes for collectd policy.- CHange sysadm
- 0f00: _t to create content as user_tmp_t under /tmp.- Shrink size of p
- 0f40: olicy through use of attributes for userdomain and apache.- Allo
- 0f80: w virsh to read xenstored pid file.- Backport corenetwork fixes
- 0fc0: from upstream.- Do not audit attempts by thumb to search config_
- 1000: home_t dirs (~/.config).- label ~/.cache/telepathy/logger telepa
- 1040: thy_logger_cache_home_t.- allow thumb to read generic data home
- 1080: files (mime.type).- Allow nmbd to manage sock file in /var/run/n
- 10c0: mbd.- ricci_modservice send syslog msgs.- Stop transitioning fro
- 1100: m unconfined_t to ldconfig_t, but make sure /etc/ld.so.cache is
- 1140: labeled correctly.- Allow systemd_logind_t to manage /run/USER/d
- 1180: conf/user.- Fix missing patch from F16.- Allow logrotate setuid
- 11c0: and setgid since logrotate is supposed to do it.- Fixes for thum
- 1200: b policy by grift.- Add new nfsd ports.- Added fix to allow conf
- 1240: ined apps to execmod on chrome.- Add labeling for additional vds
- 1280: m directories.- Allow Exim and Dovecot SASL.- Add label for /var
- 12c0: /run/nmbd.- Add fixes to make virsh and xen working together.- C
- 1300: olord executes ls.- /var/spool/cron is now labeled as user_cron
- 1340: _spool_t.- Stop complaining about leaked file descriptors during
- 1380: install.- Remove java and mono module and merge into execmem.-
- 13c0: Fixes for thumb policy and passwd_file_t.- Fixes caused by the l
- 1400: abeling of /etc/passwd.- Add thumb.patch to transition unconfine
- 1440: d_t to thumb_t for Rawhide.- Add support for Clustered Samba com
- 1480: mands.- Allow ricci_modrpm_t to send log msgs.- move permissive
- 14c0: virt_qmf_t from virt.te to permissivedomains.te.- Allow ssh_t to
- 1500: use kernel keyrings.- Add policy for libvirt-qmf and more fixes
- 1540: for linux containers.- Initial Polipo.- Sanlock needs to run ra
- 1580: nged in order to kill svirt processes.- Allow smbcontrol to stre
- 15c0: am connect to ctdbd.- Add label for /etc/passwd.- Change unconfi
- 1600: ned_domains to permissive for Rawhide.- Add definition for the e
- 1640: phemeral_ports.- Make mta_role() active.- Allow asterisk to conn
- 1680: ect to jabber client port.- Allow procmail to read utmp.- Add NI
- 16c0: S support for systemd_logind_t.- Allow systemd_logind_t to manag
- 1700: e /run/user/$USER/dconf dir which is labeled as config_home_t.-
- 1740: Fix systemd_manage_unit_dirs() interface.- Allow ssh_t to manage
- 1780: directories passed into it.- init needs to be able to create an
- 17c0: d delete unit file directories.- Fix typo in apache_exec_sys_scr
- 1800: ipt.- Add ability for logrotate to transition to awstat domain.-
- 1840: Change screen to use screen_domain attribute and allow screen_d
- 1880: omains to read all process domain state.- Add SELinux support fo
- 18c0: r ssh pre-auth net process in F17.- Add logging_syslogd_can_send
- 1900: mail boolean.- Add definition for ephemeral ports.- Define user_
- 1940: tty_device_t as a customizable_type.- Needs to require a new ver
- 1980: sion of checkpolicy.- Interface fixes.- Allow sanlock to manage
- 19c0: virt lib files.- Add virt_use_sanlock booelan.- ksmtuned is tryi
- 1a00: ng to resolve uids.- Make sure .gvfs is labeled user_home_t in t
- 1a40: he users home directory.- Sanlock sends kill signals and needs t
- 1a80: he kill capability.- Allow mockbuild to work on nfs homedirs.- F
- 1ac0: ix kerberos_manage_host_rcache() interface.- Allow exim to read
- 1b00: system state.- Allow systemd-tmpfiles to set the correct labels
- 1b40: on /var/run, /tmp and other files.- We want any file type that i
- 1b80: s created in /tmp by a process running as initrc_t to be labeled
- 1bc0: initrc_tmp_t.- Allow collectd to read hardware state informati
- 1c00: on.- Add loop_control_device_t.- Allow mdadm to request kernel t
- 1c40: o load module.- Allow domains that start other domains via syste
- 1c80: mctl to search unit dir.- systemd_tmpfilses, needs to list any f
- 1cc0: ile systems mounted on /tmp.- No one can explain why radius is l
- 1d00: isting the contents of /tmp, so we will dontaudit.- If I can man
- 1d40: age etc_runtime files, I should be able to read the links.- Dont
- 1d80: audit hostname writing to mock library chr_files.- Have gdm_t se
- 1dc0: tup labeling correctly in users home dir.- Label content unde /v
- 1e00: ar/run/user/NAME/dconf as config_home_t.- Allow sa-update to exe
- 1e40: cute shell.- Make ssh-keygen working with fips_enabled.- Make mo
- 1e80: ck work for staff_t user.- Tighten security on mock_t.- removing
- 1ec0: unconfined_notrans_t no longer necessary.- Clean up handling of
- 1f00: secure_mode_insmod and secure_mode_policyload.- Remove unconfin
- 1f40: ed_mount_t.- Add exim_exec_t label for /usr/sbin/exim_tidydb.- C
- 1f80: all init_dontaudit_rw_stream_socket() interface in mta policy.-
- 1fc0: sssd need to search /var/cache/krb5rcache directory.- Allow coro
- 2000: sync to relabel own tmp files.- Allow zarafa domains to send sys
- 2040: tem log messages.- Allow ssh to do tunneling.- Allow initrc scri
- 2080: pts to sendto init_t unix_stream_socket.- Changes to make sure d
- 20c0: msmasq and virt directories are labeled correctly.- Changes need
- 2100: ed to allow sysadm_t to manage systemd unit files.- init is pass
- 2140: ing file descriptors to dbus and on to system daemons.- Allow su
- 2180: login additional access Reported by dgrift and Jeremy Miller.- S
- 21c0: teve Grubb believes that wireshark does not need this access.- F
- 2200: ix /var/run/initramfs to stop restorecon from looking at.- pki n
- 2240: eeds another port.- Add more labels for cluster scripts.- Allow
- 2280: apps that manage cgroup_files to manage cgroup link files.- Fix
- 22c0: label on nfs-utils scripts directories.- Allow gatherd to read /
- 2300: dev/rand and /dev/urand.- pki needs another port.- Add more labe
- 2340: ls for cluster scripts.- Fix label on nfs-utils scripts director
- 2380: ies.- Fixes for cluster.- Allow gatherd to read /dev/rand and /d
- 23c0: ev/urand.- abrt leaks fifo files.- Add glance policy.- Allow mda
- 2400: dm setsched.- /var/run/initramfs should not be relabeled with a
- 2440: restorecon run.- memcache can be setup to override sys_resource.
- 2480: - Allow httpd_t to read tetex data.- Allow systemd_tmpfiles to d
- 24c0: elete kernel modules left in /tmp directory..- Allow Postfix to
- 2500: deliver to Dovecot LMTP socket.- Ignore bogus sys_module for lld
- 2540: pad.- Allow chrony and gpsd to send dgrams, gpsd needs to write
- 2580: to the real time clock.- systemd_logind_t sets the attributes on
- 25c0: usb devices.- Allow hddtemp_t to read etc_t files.- Add permiss
- 2600: ivedomains module.- Move all permissive domains calls to permiss
- 2640: ivedomain.te.- Allow pegasis to send kill signals to other UIDs.
- 2680: - Allow insmod_t to use fds leaked from devicekit.- dontaudit ge
- 26c0: tattr between insmod_t and init_t unix_stream_sockets.- Change s
- 2700: ysctl unit file interfaces to use systemctl.- Add support for ch
- 2740: ronyd unit file.- Allow mozilla_plugin to read gnome_usr_config.
- 2780: - Add policy for new gpsd.- Allow cups to create kerberos rhost
- 27c0: cache files.- Add authlogin_filetrans_named_content, to unconfin
- 2800: ed_t to make sure shadow and other log files get labeled correct
- 2840: ly.- Make users_extra and seusers.final into config(noreplace) s
- 2880: o semanage users and login does not get overwritten.- Add policy
- 28c0: for sa-update being run out of cron jobs.- Add create perms to
- 2900: postgresql_manage_db.- ntpd using a gps has to be able to read/w
- 2940: rite generic tty_device_t.- If you disable unconfined and unconf
- 2980: ineduser, rpm needs more privs to manage /dev.- fix spec file.-
- 29c0: Remove qemu_domtrans_unconfined() interface.- Make passenger wor
- 2a00: king together with puppet.- Add init_dontaudit_rw_stream_socket
- 2a40: interface.- Fixes for wordpress.- Turn on allow_domain_fd_use bo
- 2a80: olean on F16.- Allow syslog to manage all log files.- Add use_fu
- 2ac0: sefs_home_dirs boolean for chrome.- Make vdagent working with co
- 2b00: nfined users.- Add abrt_handle_event_t domain for ABRT event scr
- 2b40: ipts.- Labeled /usr/sbin/rhnreg_ks as rpm_exec_t and added chang
- 2b80: es related to this change.- Allow httpd_git_script_t to read pas
- 2bc0: swd data.- Allow openvpn to set its process priority when the ni
- 2c00: ce parameter is used.- livecd fixes.- spec file fixes.- fetchmai
- 2c40: l can use kerberos.- ksmtuned reads in shell programs.- gnome_sy
- 2c80: stemctl_t reads the process state of ntp.- dnsmasq_t asks the ke
- 2cc0: rnel to load multiple kernel modules.- Add rules for domains exe
- 2d00: cuting systemctl.- Bogus text within fc file.- Add cfengine poli
- 2d40: cy.- Add abrt_domain attribute.- Allow corosync to manage cluste
- 2d80: r lib files.- Allow corosync to connect to the system DBUS.- Add
- 2dc0: sblim, uuidd policies.- Allow kernel_t dyntrasition to init_t.-
- 2e00: init_t need setexec.- More fixes of rules which cause an explos
- 2e40: ion in rules by Dan Walsh.- Allow rcsmcertd to perform DNS name
- 2e80: resolution.- Add dirsrvadmin_unconfined_script_t domain type for
- 2ec0: 389-ds admin scripts.- Allow tmux to run as screen.- New policy
- 2f00: for collectd.- Allow gkeyring_t to interact with all user apps.
- 2f40: - Add rules to allow firstboot to run on machines with the uncon
- 2f80: fined.pp module removed.- Allow systemd_logind to send dbus mess
- 2fc0: ages with users.- allow accountsd to read wtmp file.- Allow dhcp
- 3000: d to get and set capabilities.- Fix oracledb_port definition.- A
- 3040: llow mount to mounton the selinux file system.- Allow users to l
- 3080: ist /var directories.- systemd fixes.- Add initial policy for ab
- 30c0: rt_dump_oops_t.- xtables-multi wants to getattr of the proc fs.-
- 3100: Smoltclient is connecting to abrt.- Dontaudit leaked file descr
- 3140: iptors to postdrop.- Allow abrt_dump_oops to look at kernel sysc
- 3180: tls.- Abrt_dump_oops_t reads kernel ring buffer.- Allow mysqld t
- 31c0: o request the kernel to load modules.- systemd-login needs fowne
- 3200: r.- Allow postfix_cleanup_t to searh maildrop.- Initial systemd_
- 3240: logind policy.- Add policy for systemd_logger and additional pro
- 3280: ivs for systemd_logind.- More fixes for systemd policies.- Allow
- 32c0: setsched for virsh.- Systemd needs to impersonate cups, which m
- 3300: eans it needs to create tcp_sockets in cups_t domain, as well as
- 3340: manage spool directories.- iptables: the various /sbin/ip6?tabl
- 3380: es.* are now symlinks for./sbin/xtables-multi.- A lot of users a
- 33c0: re running yum -y update while in /root which is causing ldconfi
- 3400: g to list the contents, adding dontaudit.- Allow colord to inter
- 3440: act with the users through the tmpfs file system.- Since we chan
- 3480: ged the label on deferred, we need to allow postfix_qmgr_t to be
- 34c0: able to create maildrop_t files.- Add label for /var/log/mcelog
- 3500: .- Allow asterisk to read /dev/random if it uses TLS.- Allow col
- 3540: ord to read ini files which are labeled as bin_t.- Allow dirsrva
- 3580: dmin sys_resource and setrlimit to use ulimit.- Systemd needs to
- 35c0: be able to create sock_files for every label in /var/run direct
- 3600: ory, cupsd being the first. .- Also lists /var and /var/spool d
- 3640: irectories.- Add openl2tpd to l2tpd policy.- qpidd is reading th
- 3680: e sysfs file.- Change usbmuxd_t to dontaudit attempts to read ch
- 36c0: r_file.- Add mysld_safe_exec_t for libra domains to be able to s
- 3700: tart private mysql domains.- Allow pppd to search /var/lock dir.
- 3740: - Add rhsmcertd policy.- Update to upstream.- More fixes. * htt
- 3780: p://git.fedorahosted.org/git/?p=selinux-policy.git.- Fix spec fi
- 37c0: le to not report Verify errors.- Add dspam policy.- Add lldpad p
- 3800: olicy.- dovecot auth wants to search statfs #713555.- Allow syst
- 3840: emd passwd apps to read init fifo_file.- Allow prelink to use in
- 3880: herited terminals.- Run cherokee in the httpd_t domain.- Allow m
- 38c0: cs constraints on node connections.- Implement pyicqt policy.- F
- 3900: ixes for zarafa policy.- Allow cobblerd to send syslog messages.
- 3940: - Add policy.26 to the payload.- Remove olpc stuff.- Remove poli
- 3980: cygentool.- Fixes for zabbix.- init script needs to be able to m
- 39c0: anage sanlock_var_run_....- Allow sandlock and wdmd to create /v
- 3a00: ar/run directories... .- mixclip.so has been compiled correctly.
- 3a40: - Fix passenger policy module name.- Add mailscanner policy from
- 3a80: dgrift.- Allow chrome to optionally be transitioned to.- Zabbix
- 3ac0: needs these rules when starting the zabbix_server_mysql.- Imple
- 3b00: ment a type for freedesktop openicc standard (~/.local/share/icc
- 3b40: ).- Allow system_dbusd_t to read inherited icc_data_home_t files
- 3b80: ..- Allow colord_t to read icc_data_home_t content. #706975.- La
- 3bc0: bel stuff under /usr/lib/debug as if it was labeled under /.- Fi
- 3c00: xes for sanlock policy.- Fixes for colord policy.- Other fixes..
- 3c40: * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log.-
- 3c80: Add rhev policy module to modules-targeted.conf.- Lot of fixes..
- 3cc0: * http://git.fedorahosted.org/git/?p=selinux-policy.git;a=log.-
- 3d00: Allow logrotate to execute systemctl.- Allow nsplugin_t to getat
- 3d40: tr on gpmctl.- Fix dev_getattr_all_chr_files() interface.- Allow
- 3d80: shorewall to use inherited terms.- Allow userhelper to getattr
- 3dc0: all chr_file devices.- sandbox domains should be able to getattr
- 3e00: and dontaudit search of sysctl_kernel_t.- Fix labeling for ABRT
- 3e40: Retrace Server.- Dontaudit sys_module for ifconfig.- Make telep
- 3e80: athy and gkeyringd daemon working with confined users.- colord w
- 3ec0: ants to read files in users homedir.- Remote login should be cre
- 3f00: ating user_tmp_t not its own tmp files.- Fix label for /usr/shar
- 3f40: e/munin/plugins/munin_* plugins.- Add support for zarafa-indexer
- 3f80: .- Fix boolean description.- Allow colord to getattr on /proc/sc
- 3fc0: si/scsi.- Add label for /lib/upstart/init.- Colord needs to list
- 13:00:16.918015 <= Recv data, 12520 bytes (0x30e8)
- 0000: /mnt.- Forard port changes from F15 for telepathy.- NetworkMana
- 0040: ger should be allowed to use /dev/rfkill.- Fix dontaudit message
- 0080: s to say Domain to not audit.- Allow telepathy domains to read/w
- 00c0: rite gnome_cache files.- Allow telepathy domains to call getpw.-
- 0100: Fixes for colord and vnstatd policy.- Allow init_t getcap and s
- 0140: etcap.- Allow namespace_init_t to use nsswitch.- aisexec will ex
- 0180: ecute corosync.- colord tries to read files off noxattr file sys
- 01c0: tems.- Allow init_t getcap and setcap.- Add support for ABRT ret
- 0200: race server.- Allow user_t and staff_t access to generic scsi to
- 0240: handle locally plugged in scanners.- Allow telepath_msn_t to re
- 0280: ad /proc/PARENT/cmdline.- ftpd needs kill capability.- Allow tel
- 02c0: epath_msn_t to connect to sip port.- keyring daemon does not wor
- 0300: k on nfs homedirs.- Allow $1_sudo_t to read default SELinux cont
- 0340: ext.- Add label for tgtd sock file in /var/run/.- Add apache_exe
- 0380: c_rotatelogs interface.- allow all zaraha domains to signal them
- 03c0: selves, server writes to /tmp.- Allow syslog to read the process
- 0400: state.- Add label for /usr/lib/chromium-browser/chrome.- Remove
- 0440: the telepathy transition from unconfined_t.- Dontaudit sandbox
- 0480: domains trying to mounton sandbox_file_t, this is caused by fuse
- 04c0: mounts.- Allow initrc_t domain to manage abrt pid files.- Add s
- 0500: upport for AEOLUS project.- Virt_admin should be allowed to mana
- 0540: ge images and processes.- Allow plymountd to send signals to ini
- 0580: t.- Change labeling of fping6.- Add filename transitions.- Fixes
- 05c0: for zarafa policy.- Add support for AEOLUS project.- Change lab
- 0600: eling of fping6.- Allow plymountd to send signals to init.- Allo
- 0640: w initrc_t domain to manage abrt pid files.- Virt_admin should b
- 0680: e allowed to manage images and processes.- xdm_t needs getsessio
- 06c0: n for switch user .- Every app that used to exec init is now exe
- 0700: cing systemdctl .- Allow squid to manage krb5_host_rcache_t file
- 0740: s .- Allow foghorn to connect to agentx port - Fixes for colord
- 0780: policy.- Add Dan's patch to remove 64 bit variants.- Allow color
- 07c0: d to use unix_dgram_socket .- Allow apps that search pids to rea
- 0800: d /var/run if it is a lnk_file .- iscsid_t creates its own direc
- 0840: tory .- Allow init to list var_lock_t dir .- apm needs to verify
- 0880: user accounts auth_use_nsswitch.- Add labeling for systemd unit
- 08c0: files.- Allow gnomeclok to enable ntpd service using systemctl
- 0900: - systemd_systemctl_t domain was added.- Add label for matahari-
- 0940: broker.pid file.- We want to remove untrustedmcsprocess from abi
- 0980: lity to read /proc/pid.- Fixes for matahari policy.- Allow syste
- 09c0: m_tmpfiles_t to delete user_home_t files in the /tmp dir.- Allow
- 0a00: sshd to transition to sysadm_t if ssh_sysadm_login is turned on
- 0a40: .- Fix typo.- Add /var/run/lock /var/lock definition to file_con
- 0a80: texts.subs.- nslcd_t is looking for kerberos cc files.- SSH_USE_
- 0ac0: STRONG_RNG is 1 which requires /dev/random.- Fix auth_rw_faillog
- 0b00: definition.- Allow sysadm_t to set attributes on fixed disks.-
- 0b40: allow user domains to execute lsof and look at application socke
- 0b80: ts.- prelink_cron job calls telinit -u if init is rewritten.- Fi
- 0bc0: xes to run qemu_t from staff_t.- Fix label for /var/run/udev to
- 0c00: udev_var_run_t.- Mock needs to be able to read network state.- A
- 0c40: dd file_contexts.subs to handle /run and /run/lock.- Add other f
- 0c80: ixes relating to /run changes from F15 policy.- Allow $1_sudo_t
- 0cc0: and $1_su_t open access to user terminals.- Allow initrc_t to us
- 0d00: e generic terminals.- Make Makefile/Rules.modular run sepolgen-i
- 0d40: fgen during build to check if files for bugs.-systemd is going t
- 0d80: o be useing /run and /run/lock for early bootup files..- Fix som
- 0dc0: e comments in rlogin.if.- Add policy for KDE backlighthelper.- s
- 0e00: ssd needs to read ~/.k5login in nfs, cifs or fusefs file systems
- 0e40: .- sssd wants to read .k5login file in users homedir.- setrouble
- 0e80: shoot reads executables to see if they have TEXTREL.- Add /var/s
- 0ec0: pool/audit support for new version of audit.- Remove kerberos_co
- 0f00: nnect_524() interface calling.- Combine kerberos_master_port_t a
- 0f40: nd kerberos_port_t.- systemd has setup /dev/kmsg as stderr for a
- 0f80: pps it executes.- Need these access so that init can impersonate
- 0fc0: sockets on unix_dgram_socket.- Remove some unconfined domains.-
- 1000: Remove permissive domains.- Add policy-term.patch from Dan.- Fi
- 1040: x multiple specification for boot.log.- devicekit leaks file des
- 1080: criptors to setfiles_t.- Change all all_nodes to generic_node an
- 10c0: d all_if to generic_if.- Should not use deprecated interface.- S
- 1100: witch from using all_nodes to generic_node and from all_if to ge
- 1140: neric_if.- Add support for xfce4-notifyd.- Fix file context to s
- 1180: how several labels as SystemHigh.- seunshare needs to be able to
- 11c0: mounton nfs/cifs/fusefs homedirs.- Add etc_runtime_t label for
- 1200: /etc/securetty.- Fixes to allow xdm_t to start gkeyringd_USERTYP
- 1240: E_t directly.- login.krb needs to be able to write user_tmp_t.-
- 1280: dirsrv needs to bind to port 7390 for dogtag.- Fix a bug in gpg
- 12c0: policy.- gpg sends audit messages.- Allow qpid to manage matahar
- 1300: i files.- Initial policy for matahari.- Add dev_read_watchdog.-
- 1340: Allow clamd to connect clamd port.- Add support for kcmdatetimeh
- 1380: elper.- Allow shutdown to setrlimit and sys_nice.- Allow systemd
- 13c0: _passwd to talk to /dev/log before udev or syslog is running.- P
- 1400: urge chr_file and blk files on /tmp.- Fixes for pads.- Fixes for
- 1440: piranha-pulse.- gpg_t needs to be able to encyprt anything owne
- 1480: d by the user.- mozilla_plugin_tmp_t needs to be treated as user
- 14c0: tmp files.- More dontaudits of writes from readahead.- Dontaudi
- 1500: t readahead_t file_type:dir write, to cover up kernel bug.- syst
- 1540: emd_tmpfiles needs to relabel faillog directory as well as the f
- 1580: ile.- Allow hostname and consoletype to r/w inherited initrc_tmp
- 15c0: _t files handline hostname >> /tmp/myhost.- Add policykit fixes
- 1600: from Tim Waugh.- dontaudit sandbox domains sandbox_file_t:dir mo
- 1640: unton.- Add new dontaudit rules for sysadm_dbusd_t.- Change labe
- 1680: l for /var/run/faillock..* other fixes which relate with this ch
- 16c0: ange.- Update to upstream.- Fixes for telepathy.- Add port defit
- 1700: ion for ssdp port.- add policy for /bin/systemd-notify from Dan.
- 1740: - Mount command requires users read mount_var_run_t.- colord nee
- 1780: ds to read konject_uevent_socket.- User domains connect to the g
- 17c0: keyring socket.- Add colord policy and allow user_t and staff_t
- 1800: to dbus chat with it.- Add lvm_exec_t label for kpartx.- Dontaud
- 1840: it reading the mail_spool_t link from sandbox -X.- systemd is cr
- 1880: eating sockets in avahi_var_run and system_dbusd_var_run.- gpg_t
- 18c0: needs to talk to gnome-keyring.- nscd wants to read /usr/tmp->/
- 1900: var/tmp to generate randomziation in unixchkpwd.- enforce MCS la
- 1940: beling on nodes.- Allow arpwatch to read meminfo.- Allow gnomecl
- 1980: ock to send itself signals.- init relabels /dev/.udev files on b
- 19c0: oot.- gkeyringd has to transition back to staff_t when it runs c
- 1a00: ommands in bin_t or shell_exec_t.- nautilus checks access on /me
- 1a40: dia directory before mounting usb sticks, dontaudit access_check
- 1a80: on mnt_t.- dnsmasq can run as a dbus service, needs acquire ser
- 1ac0: vice.- mysql_admin should be allowed to connect to mysql servic
- 1b00: e.- virt creates monitor sockets in the users home dir.- Allow u
- 1b40: sbhid-ups to read hardware state information.- systemd-tmpfiles
- 1b80: has moved.- Allo cgroup to sys_tty_config.- For some reason prel
- 1bc0: ink is attempting to read gconf settings.- Add allow_daemons_use
- 1c00: _tcp_wrapper boolean.- Add label for ~/.cache/wocky to make tele
- 1c40: pathy work in enforcing mode.- Add label for char devices /dev/d
- 1c80: asd*.- Fix for apache_role.- Allow amavis to talk to nslcd.- all
- 1cc0: ow all sandbox to read selinux poilcy config files.- Allow clust
- 1d00: er domains to use the system bus and send each other dbus messag
- 1d40: es.- Update to upstream.- Rebuilt for https://fedoraproject.org/
- 1d80: wiki/Fedora_15_Mass_Rebuild.- Update to ref policy.- cgred needs
- 1dc0: chown capability.- Add /dev/crash crash_dev_t.- systemd-readahe
- 1e00: ad wants to use fanotify which means readahead_t needs sys_admin
- 1e40: capability.- New labeling for postfmulti #675654.- dontaudit xd
- 1e80: m_t listing noxattr file systems.- dovecot-auth needs to be able
- 1ec0: to connect to mysqld via the network as well as locally.- shutd
- 1f00: own is passed stdout to a xdm_log_t file.- smartd creates a fixe
- 1f40: d disk device.- dovecot_etc_t contains a lnk_file that domains n
- 1f80: eed to read.- mount needs to be able to read etc_runtim_t:lnk_fi
- 1fc0: le since in rawhide this is a link created at boot.- syslog_t ne
- 2000: eds syslog capability.- dirsrv needs to be able to create /var/l
- 2040: ib/snmp.- Fix labeling for dirsrv.- Fix for dirsrv policy missin
- 2080: g manage_dirs_pattern.- corosync needs to delete clvm_tmpfs_t fi
- 20c0: les.- qdiskd needs to list hugetlbfs.- Move setsched to sandbox_
- 2100: x_domain, so firefox can run without network access.- Allow hddt
- 2140: emp to read removable devices.- Adding syslog and read_policy pe
- 2180: rmissions to policy..* syslog...Allow unconfined, sysadm_t, seca
- 21c0: dm_t, logadm_t..* read_policy...allow unconfined, sysadm_t, seca
- 2200: dm_t, staff_t on Targeted...allow sysadm_t (optionally), secadm_
- 2240: t on MLS.- mdadm application will write into /sys/.../uevent whe
- 2280: never arrays are.assembled or disassembled..- Add tcsd policy.-
- 22c0: ricci_modclusterd_t needs to bind to rpc ports 500-1023.- Allow
- 2300: dbus to use setrlimit to increase resoueces.- Mozilla_plugin is
- 2340: leaking to sandbox.- Allow confined users to connect to lircd o
- 2380: ver unix domain stream socket which allow to use remote control.
- 23c0: - Allow awstats to read squid logs.- seunshare needs to manage t
- 2400: mp_t.- apcupsd cgi scripts have a new directory.- Fix xserver_do
- 2440: ntaudit_read_xdm_pid.- Change oracle_port_t to oracledb_port_t t
- 2480: o prevent conflict with satellite.- Allow dovecot_deliver_t to r
- 24c0: ead/write postfix_master_t:fifo_file. ..* These fifo_file is pas
- 2500: sed from postfix_master_t to postfix_local_t to dovecot_deliver_
- 2540: t.- Allow readahead to manage readahead pid dirs.- Allow readahe
- 2580: ad to read all mcs levels.- Allow mozilla_plugin_t to use nfs or
- 25c0: samba homedirs.- Allow nagios plugin to read /proc/meminfo.- Fi
- 2600: x for mozilla_plugin.- Allow samba_net_t to create /etc/keytab.-
- 2640: pppd_t setting up vpns needs to run unix_chkpwd, setsched its p
- 2680: rocess and write wtmp_t.- nslcd can read user credentials.- Allo
- 26c0: w nsplugin to delete mozilla_plugin_tmpfs_t.- abrt tries to crea
- 2700: te dir in rpm_var_lib_t.- virt relabels fifo_files.- sshd needs
- 2740: to manage content in fusefs homedir.- mock manages link files in
- 2780: cache dir.- nslcd needs setsched and to read /usr/tmp.- Invalid
- 27c0: call in likewise policy ends up creating a bogus role.- Cannon
- 2800: puts content into /var/lib/bjlib that cups needs to be able to w
- 2840: rite.- Allow screen to create screen_home_t in /root.- dirsrv se
- 2880: nds syslog messages.- pinentry reads stuff in .kde directory.- A
- 28c0: dd labels for .kde directory in homedir.- Treat irpinit, iprupda
- 2900: te, iprdump services with raid policy.- NetworkManager wants to
- 2940: read consolekit_var_run_t.- Allow readahead to create /dev/.syst
- 2980: emd/readahead.- Remove permissive domains.- Allow newrole to run
- 29c0: namespace_init.- Add sepgsql_contexts file.- Update to upstream
- 2a00: .- Add oracle ports and allow apache to connect to them if the c
- 2a40: onnect_db boolean is turned on.- Add puppetmaster_use_db boolean
- 2a80: .- Fixes for zarafa policy.- Fixes for gnomeclock poliy.- Fix sy
- 2ac0: stemd-tmpfiles to use auth_use_nsswitch.- gnomeclock executes a
- 2b00: shell.- Update for screen policy to handle pipe in homedir.- Fix
- 2b40: es for polyinstatiated homedir.- Fixes for namespace policy and
- 2b80: other fixes related to polyinstantiation.- Add namespace policy.
- 2bc0: - Allow dovecot-deliver transition to sendmail which is needed b
- 2c00: y sieve scripts.- Fixes for init, psad policy which relate with
- 2c40: confined users.- Do not audit bootloader attempts to read device
- 2c80: kit pid files.- Allow nagios service plugins to read /proc.- Add
- 2cc0: firewalld policy.- Allow vmware_host to read samba config.- Ker
- 2d00: nel wants to read /proc Fix duplicate grub def in cobbler.- Chro
- 2d40: ny sends mail, executes shell, uses fifo_file and reads /proc.-
- 2d80: devicekitdisk getattr all file systems.- sambd daemon writes wtm
- 2dc0: p file.- libvirt transitions to dmidecode.- Add initial policy f
- 2e00: or system-setup-keyboard which is now daemon.- Label /var/lock/s
- 2e40: ubsys/shorewall as shorewall_lock_t.- Allow users to communicate
- 2e80: with the gpg_agent_t.- Dontaudit mozilla_plugin_t using the inh
- 2ec0: erited terminal.- Allow sambagui to read files in /usr.- webaliz
- 2f00: er manages squid log files.- Allow unconfined domains to bind po
- 2f40: rts to raw_ip_sockets.- Allow abrt to manage rpm logs when runni
- 2f80: ng yum.- Need labels for /var/run/bittlebee.- Label .ssh under a
- 2fc0: manda.- Remove unused genrequires for virt_domain_template.- All
- 3000: ow virt_domain to use fd inherited from virtd_t.- Allow iptables
- 3040: to read shorewall config.- Gnome apps list config_home_t.- mpd
- 3080: creates lnk files in homedir.- apache leaks write to mail apps o
- 30c0: n tmp files.- /var/stockmaniac/templates
- 84 413k 84 347k 0 0 34580 0 0:00:12 0:00:10 0:00:02 0^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement