summaryrefslogtreecommitdiff
path: root/packaging
diff options
context:
space:
mode:
authorElena, Reshetova <elena.reshetova@intel.com>2012-06-29 15:39:36 +0300
committerElena, Reshetova <elena.reshetova@intel.com>2012-07-10 11:10:11 +0300
commitd38ce083f4a97f2a10071566274c341c0914257b (patch)
tree6fdf29b4285a2267d6a11eb7f78c0bb05c3e0421 /packaging
parentf573430403c3937a73a874da8a724c94d0f650f3 (diff)
downloadrpm-d38ce083f4a97f2a10071566274c341c0914257b.tar.gz
rpm-d38ce083f4a97f2a10071566274c341c0914257b.tar.bz2
rpm-d38ce083f4a97f2a10071566274c341c0914257b.zip
Fixing bugs PTSEC-22 (dbus configuration file generation), PTSEC-24 (smack rules handing lon update)
Diffstat (limited to 'packaging')
-rw-r--r--packaging/rpm.changes4
-rw-r--r--packaging/security_4.9.1.patch21
2 files changed, 14 insertions, 11 deletions
diff --git a/packaging/rpm.changes b/packaging/rpm.changes
index 1688d90..3017b14 100644
--- a/packaging/rpm.changes
+++ b/packaging/rpm.changes
@@ -1,3 +1,7 @@
+* Fri Jul 10 2012 Elena Reshetova <elena.reshetova@intel.com> - 4.9.0
+- Fixing rpm-security-plugin bug PTSEC-22: dbus manifest is not generated correctly
+- Fixing rpm-security-plugin bug PTSEC-24: package upgrade removes the file from /etc/smack/accesses.d
+
* Wed Jul 04 2012 Anas Nashif <anas.nashif@intel.com> 6bf3412
- remove auto dependencies
diff --git a/packaging/security_4.9.1.patch b/packaging/security_4.9.1.patch
index 86c943c..2a51c9b 100644
--- a/packaging/security_4.9.1.patch
+++ b/packaging/security_4.9.1.patch
@@ -1570,7 +1570,7 @@ index 0000000..c99a5e8
+ msmCancelPackage(ctx->mfx->name);
+ goto fail;
+ }
-+ }
++ }
+ if (ctx->mfx->define) {
+ if (ctx->mfx->define->name)
+ smackLabel = 1;
@@ -1581,7 +1581,7 @@ index 0000000..c99a5e8
+ msmCancelPackage(ctx->mfx->name);
+ goto fail;
+ }
-+ }
++ }
+ if (ctx->mfx->request) {
+ if (ctx->mfx->request->ac_domain)
+ smackLabel = 1;
@@ -1797,16 +1797,16 @@ index 0000000..c99a5e8
+
+ if (ctx->mfx->sw_source) {
+ if (rpmteDependsOn(ctx->te)) {
-+ rpmlog(RPMLOG_INFO, "upgrading %s manifest data\n",
++ rpmlog(RPMLOG_INFO, "upgrading %s manifest data\n",
+ rpmteN(ctx->te));
+ } else {
-+ rpmlog(RPMLOG_INFO, "removing %s manifest data\n",
++ rpmlog(RPMLOG_INFO, "removing %s manifest data\n",
+ rpmteN(ctx->te));
++ if (ctx->mfx->define || ctx->mfx->provides || ctx->mfx->sw_sources) {
++ msmRemoveRules(ctx->smack_accesses, ctx->mfx, SmackEnabled);
++ }
++ msmRemoveConfig(ctx->mfx);
+ }
-+ if (ctx->mfx->define || ctx->mfx->provides || ctx->mfx->sw_sources) {
-+ msmRemoveRules(ctx->smack_accesses, ctx->mfx, SmackEnabled);
-+ }
-+ msmRemoveConfig(ctx->mfx);
+ }
+
+ }
@@ -4076,7 +4076,7 @@ new file mode 100644
index 0000000..c0850f0
--- /dev/null
+++ b/security/msmxattr.c
-@@ -0,0 +1,1296 @@
+@@ -0,0 +1,1295 @@
+/*
+ * This file is part of MSM security plugin
+ * Greatly based on the code of MSSF security plugin
@@ -4860,8 +4860,8 @@ index 0000000..c0850f0
+ }
+ if (session) msmSetupDBusConfig(package, session, -1);
+ if (system) msmSetupDBusConfig(package, system, -1);
++ session = system = NULL;
+ }
-+
+ return 0;
+
+}
@@ -4916,7 +4916,6 @@ index 0000000..c0850f0
+ rpmlog(RPMLOG_ERR, "Failed to setup define with empty name\n");
+ return -1;
+ }
-+
+ /* need to check if domain hasn't been already defined by other package */
+
+ HASH_FIND(hh, all_ac_domains, mfx->define->name, strlen(mfx->define->name), defined_ac_domain);