* Thu Jun 29 2023 Nikola Knazekova <nknazeko@redhat.com> - 38.1.16-1
- Remove permissive from fdo Resolves: rhbz#2026795 - Add the qatlib module Resolves: rhbz#2080443 - Add the fdo module Resolves: rhbz#2026795 - Add the booth module to modules.conf Resolves: rhbz#2128833 - Add policy for FIDO Device Onboard Resolves: rhbz#2026795 - Create policy for qatlib Resolves: rhbz#2080443 - Add policy for boothd Resolves: rhbz#2128833 - Add list_dir_perms to kerberos_read_keytab Resolves: rhbz#2112729 - Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t Resolves: rhbz#2209973 - Allow collectd_t read network state symlinks Resolves: rhbz#2209650 - Revert "Allow collectd_t read proc_net link files" Resolves: rhbz#2209650 - Allow insights-client execmem Resolves: rhbz#2207894 - Label udf tools with fsadm_exec_t Resolves: rhbz#2039774
This commit is contained in:
parent
ca4271f5cc
commit
1e0560a070
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit fe2a2f5e8e3fbf00a0804e65c2fb20dbe6ff9be1
|
||||
%global commit 66a4b6ef3da654ad50046c79a87871fbd2f1a359
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -23,7 +23,7 @@
|
||||
%define CHECKPOLICYVER 3.2
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 38.1.15
|
||||
Version: 38.1.16
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
@ -809,6 +809,34 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Jun 29 2023 Nikola Knazekova <nknazeko@redhat.com> - 38.1.16-1
|
||||
- Remove permissive from fdo
|
||||
Resolves: rhbz#2026795
|
||||
- Add the qatlib module
|
||||
Resolves: rhbz#2080443
|
||||
- Add the fdo module
|
||||
Resolves: rhbz#2026795
|
||||
- Add the booth module to modules.conf
|
||||
Resolves: rhbz#2128833
|
||||
- Add policy for FIDO Device Onboard
|
||||
Resolves: rhbz#2026795
|
||||
- Create policy for qatlib
|
||||
Resolves: rhbz#2080443
|
||||
- Add policy for boothd
|
||||
Resolves: rhbz#2128833
|
||||
- Add list_dir_perms to kerberos_read_keytab
|
||||
Resolves: rhbz#2112729
|
||||
- Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t
|
||||
Resolves: rhbz#2209973
|
||||
- Allow collectd_t read network state symlinks
|
||||
Resolves: rhbz#2209650
|
||||
- Revert "Allow collectd_t read proc_net link files"
|
||||
Resolves: rhbz#2209650
|
||||
- Allow insights-client execmem
|
||||
Resolves: rhbz#2207894
|
||||
- Label udf tools with fsadm_exec_t
|
||||
Resolves: rhbz#2039774
|
||||
|
||||
* Thu Jun 15 2023 Zdenek Pytela <zpytela@redhat.com> - 38.1.15-1
|
||||
- Add fs_delete_pstore_files() interface
|
||||
Resolves: rhbz#2181565
|
||||
|
4
sources
4
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (selinux-policy-fe2a2f5.tar.gz) = 12240a169137af610b4f53574b43a7c6b91ed71a2dde8c1fea5b5eae56262b97f497352247a84ccddcb3ee7e3bdc054413a5f41110978a20daf693cd7320b6d9
|
||||
SHA512 (selinux-policy-66a4b6e.tar.gz) = 797e746ccd271fe531a91b2639aed06447fb2720267dadba225989d81634b1fb7b2a4e78262612a41b6073f6e0eca358b8c274adc33630cd3f0db1390cd57767
|
||||
SHA512 (container-selinux.tgz) = dbe1f633933a48fb3a4344ad7f52f9cc5c828ca11f11be63710204fa5d8d32587b06c9d97b077a8812377938146dab236c227d0c0bb7b26c96d08ac7dc0974e5
|
||||
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
||||
SHA512 (container-selinux.tgz) = 321834ea1ab793e1724d8f3e0deb13285159ab77f6e3221f4b0f0bb5f764c35903804b87e000f67830fe5dd2f4dd23bc33688189a2f8e0893e5112ec8f95d1ab
|
||||
|
Loading…
Reference in New Issue
Block a user