import selinux-policy-34.1.41-1.el9
This commit is contained in:
parent
ac95e7125b
commit
30844ae27f
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,2 +1,2 @@
|
||||
SOURCES/container-selinux.tgz
|
||||
SOURCES/selinux-policy-9dcf505.tar.gz
|
||||
SOURCES/selinux-policy-63e80c0.tar.gz
|
||||
|
@ -1,2 +1,2 @@
|
||||
ff295d4c0bb4af2a3972c810f93a7fb2c17fbf27 SOURCES/container-selinux.tgz
|
||||
be1161ae8772afa2747bf1cf58d59828934ba05a SOURCES/selinux-policy-9dcf505.tar.gz
|
||||
f41207ff670544c6b3c0bb578c47ed5f1977a173 SOURCES/container-selinux.tgz
|
||||
beca74c63ac29151f2b2dc1a3861cd7bafaefe63 SOURCES/selinux-policy-63e80c0.tar.gz
|
||||
|
@ -2670,3 +2670,24 @@ ica = module
|
||||
# insights_client
|
||||
#
|
||||
insights_client = module
|
||||
|
||||
# Layer: contrib
|
||||
# Module: stalld
|
||||
#
|
||||
# stalld
|
||||
#
|
||||
stalld = module
|
||||
|
||||
# Layer: contrib
|
||||
# Module: rhcd
|
||||
#
|
||||
# rhcd
|
||||
#
|
||||
rhcd = module
|
||||
|
||||
# Layer: contrib
|
||||
# Module: wireguard
|
||||
#
|
||||
# wireguard
|
||||
#
|
||||
wireguard = module
|
||||
|
@ -36,3 +36,4 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
# not in the sysadm_r.
|
||||
#
|
||||
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
|
@ -36,3 +36,5 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
# not in the sysadm_r.
|
||||
#
|
||||
gen_user(root, user, sysadm_r staff_r secadm_r auditadm_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
gen_user(guest_u, user, guest_r, s0, s0)
|
||||
gen_user(xguest_u, user, xguest_r, s0, s0)
|
||||
|
@ -36,3 +36,6 @@ gen_user(sysadm_u, user, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
# not in the sysadm_r.
|
||||
#
|
||||
gen_user(root, user, unconfined_r sysadm_r staff_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
gen_user(unconfined_u, user, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats)
|
||||
gen_user(guest_u, user, guest_r, s0, s0)
|
||||
gen_user(xguest_u, user, xguest_r, s0, s0)
|
||||
|
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit 9dcf505fec91d3cc2feae61d9b76726a98dd6b98
|
||||
%global commit 63e80c0f2e0d58ce6c28201dab17927594c4b5db
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -19,11 +19,11 @@
|
||||
%define BUILD_MLS 1
|
||||
%endif
|
||||
%define POLICYVER 33
|
||||
%define POLICYCOREUTILSVER 3.3-5
|
||||
%define POLICYCOREUTILSVER 3.4-1
|
||||
%define CHECKPOLICYVER 3.2
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 34.1.28
|
||||
Version: 34.1.41
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
@ -139,6 +139,7 @@ and some additional files.
|
||||
%dir %{_datadir}/selinux/devel
|
||||
%dir %{_datadir}/selinux/devel/include
|
||||
%{_datadir}/selinux/devel/include/*
|
||||
%exclude %{_usr}/share/selinux/devel/include/contrib/container.if
|
||||
%dir %{_datadir}/selinux/devel/html
|
||||
%{_datadir}/selinux/devel/html/*html
|
||||
%{_datadir}/selinux/devel/html/*css
|
||||
@ -584,7 +585,7 @@ fi
|
||||
exit 0
|
||||
|
||||
|
||||
%triggerin -- pcre
|
||||
%triggerin -- pcre2
|
||||
%{_sbindir}/selinuxenabled && %{_sbindir}/semodule -nB
|
||||
exit 0
|
||||
|
||||
@ -793,6 +794,283 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Aug 25 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.41-1
|
||||
- Allow unconfined domains to bpf all other domains
|
||||
Resolves: RHBZ#2112014
|
||||
- Allow stalld get and set scheduling policy of all domains.
|
||||
Resolves: rhbz#2105038
|
||||
- Allow unconfined_t transition to targetclid_home_t
|
||||
Resolves: RHBZ#2106360
|
||||
- Allow samba-bgqd to read a printer list
|
||||
Resolves: rhbz#2118977
|
||||
- Allow system_dbusd ioctl kernel with a unix stream sockets
|
||||
Resolves: rhbz#2085392
|
||||
- Allow chronyd bind UDP sockets to ptp_event ports.
|
||||
Resolves: RHBZ#2118631
|
||||
- Update tor_bind_all_unreserved_ports interface
|
||||
Resolves: RHBZ#2089486
|
||||
- Remove permissive domain for rhcd_t
|
||||
Resolves: rhbz#2119351
|
||||
- Allow unconfined and sysadm users transition for /root/.gnupg
|
||||
Resolves: rhbz#2121125
|
||||
- Add gpg_filetrans_admin_home_content() interface
|
||||
Resolves: rhbz#2121125
|
||||
- Update rhcd policy for executing additional commands
|
||||
Resolves: rhbz#2119351
|
||||
- Update insights-client policy for additional commands execution
|
||||
Resolves: rhbz#2119507
|
||||
- Add rpm setattr db files macro
|
||||
Resolves: rhbz#2119507
|
||||
- Add userdom_view_all_users_keys() interface
|
||||
Resolves: rhbz#2119507
|
||||
- Allow gpg read and write generic pty type
|
||||
Resolves: rhbz#2119507
|
||||
- Allow chronyc read and write generic pty type
|
||||
Resolves: rhbz#2119507
|
||||
|
||||
* Wed Aug 10 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.40-1
|
||||
- Allow systemd-modules-load write to /dev/kmsg and send a message to syslogd
|
||||
Resolves: RHBZ#2088257
|
||||
- Allow systemd_hostnamed label /run/systemd/* as hostnamed_etc_t
|
||||
Resolves: RHBZ#1976684
|
||||
- Allow samba-bgqd get a printer list
|
||||
Resolves: rhbz#2112395
|
||||
- Allow networkmanager to signal unconfined process
|
||||
Resolves: RHBZ#2074414
|
||||
- Update NetworkManager-dispatcher policy
|
||||
Resolves: RHBZ#2101910
|
||||
- Allow openvswitch search tracefs dirs
|
||||
Resolves: rhbz#1988164
|
||||
- Allow openvswitch use its private tmpfs files and dirs
|
||||
Resolves: rhbz#1988164
|
||||
- Allow openvswitch fsetid capability
|
||||
Resolves: rhbz#1988164
|
||||
|
||||
* Tue Aug 02 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.39-1
|
||||
- Add support for systemd-network-generator
|
||||
Resolves: RHBZ#2111069
|
||||
- Allow systemd work with install_t unix stream sockets
|
||||
Resolves: rhbz#2111206
|
||||
- Allow sa-update to get init status and start systemd files
|
||||
Resolves: RHBZ#2061844
|
||||
|
||||
* Fri Jul 15 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.38-1
|
||||
- Allow some domains use sd_notify()
|
||||
Resolves: rhbz#2056565
|
||||
- Revert "Allow rabbitmq to use systemd notify"
|
||||
Resolves: rhbz#2056565
|
||||
- Update winbind_rpcd_t
|
||||
Resolves: rhbz#2102084
|
||||
- Update chronyd_pid_filetrans() to allow create dirs
|
||||
Resolves: rhbz#2101910
|
||||
- Allow keepalived read the contents of the sysfs filesystem
|
||||
Resolves: rhbz#2098130
|
||||
- Define LIBSEPOL version 3.4-1
|
||||
Resolves: rhbz#2095688
|
||||
|
||||
* Wed Jun 29 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.37-1
|
||||
- Allow targetclid read /var/target files
|
||||
Resolves: rhbz#2020169
|
||||
- Update samba-dcerpcd policy for kerberos usage 2
|
||||
Resolves: rhbz#2096521
|
||||
- Allow samba-dcerpcd work with sssd
|
||||
Resolves: rhbz#2096521
|
||||
- Allow stalld set scheduling policy of kernel threads
|
||||
Resolves: rhbz#2102224
|
||||
|
||||
* Tue Jun 28 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.36-1
|
||||
- Allow targetclid read generic SSL certificates (fixed)
|
||||
Resolves: rhbz#2020169
|
||||
- Fix file context pattern for /var/target
|
||||
Resolves: rhbz#2020169
|
||||
- Use insights_client_etc_t in insights_search_config()
|
||||
Resolves: rhbz#1965013
|
||||
|
||||
* Fri Jun 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.35-1
|
||||
-Add the corecmd_watch_bin_dirs() interface
|
||||
Resolves: rhbz#1965013
|
||||
- Update rhcd policy
|
||||
Resolves: rhbz#1965013
|
||||
- Allow rhcd search insights configuration directories
|
||||
Resolves: rhbz#1965013
|
||||
- Add the kernel_read_proc_files() interface
|
||||
Resolves: rhbz#1965013
|
||||
- Update insights_client_filetrans_named_content()
|
||||
Resolves: rhbz#2081425
|
||||
- Allow transition to insights_client named content
|
||||
Resolves: rhbz#2081425
|
||||
- Add the insights_client_filetrans_named_content() interface
|
||||
Resolves: rhbz#2081425
|
||||
- Update policy for insights-client to run additional commands 3
|
||||
Resolves: rhbz#2081425
|
||||
- Allow insights-client execute its private memfd: objects
|
||||
Resolves: rhbz#2081425
|
||||
- Update policy for insights-client to run additional commands 2
|
||||
Resolves: rhbz#2081425
|
||||
- Use insights_client_tmp_t instead of insights_client_var_tmp_t
|
||||
Resolves: rhbz#2081425
|
||||
- Change space indentation to tab in insights-client
|
||||
Resolves: rhbz#2081425
|
||||
- Use socket permissions sets in insights-client
|
||||
Resolves: rhbz#2081425
|
||||
- Update policy for insights-client to run additional commands
|
||||
Resolves: rhbz#2081425
|
||||
- Allow init_t to rw insights_client unnamed pipe
|
||||
Resolves: rhbz#2081425
|
||||
- Fix insights client
|
||||
Resolves: rhbz#2081425
|
||||
- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling
|
||||
Resolves: rhbz#2081425
|
||||
- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t
|
||||
Resolves: rhbz#2081425
|
||||
- Allow stalld get scheduling policy of kernel threads
|
||||
Resolves: rhbz#2096776
|
||||
- Update samba-dcerpcd policy for kerberos usage
|
||||
Resolves: rhbz#2096521
|
||||
- Allow winbind_rpcd_t connect to self over a unix_stream_socket
|
||||
Resolves: rhbz#2096255
|
||||
- Allow dlm_controld send a null signal to a cluster daemon
|
||||
Resolves: rhbz#2095884
|
||||
- Allow dhclient manage pid files used by chronyd
|
||||
The chronyd_manage_pid_files() interface was added.
|
||||
- Resolves: rhbz#2094155
|
||||
Allow install_t nnp_domtrans to setfiles_mac_t
|
||||
- Resolves: rhbz#2073010
|
||||
- Allow rabbitmq to use systemd notify
|
||||
Resolves: rhbz#2056565
|
||||
- Allow ksmctl create hardware state information files
|
||||
Resolves: rhbz#2021131
|
||||
- Label /var/target with targetd_var_t
|
||||
Resolves: rhbz#2020169
|
||||
- Allow targetclid read generic SSL certificates
|
||||
Resolves: rhbz#2020169
|
||||
|
||||
* Thu Jun 09 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.34-1
|
||||
- Allow stalld setsched and sys_nice
|
||||
Resolves: rhbz#2092864
|
||||
- Allow rhsmcertd to create cache file in /var/cache/cloud-what
|
||||
Resolves: rhbz#2092333
|
||||
- Update policy for samba-dcerpcd
|
||||
Resolves: rhbz#2083509
|
||||
- Add support for samba-dcerpcd
|
||||
Resolves: rhbz#2083509
|
||||
- Allow rabbitmq to access its private memfd: objects
|
||||
Resolves: rhbz#2056565
|
||||
- Confine targetcli
|
||||
Resolves: rhbz#2020169
|
||||
- Add policy for wireguard
|
||||
Resolves: 1964862
|
||||
- Label /var/cache/insights with insights_client_cache_t
|
||||
Resolves: rhbz#2062136
|
||||
- Allow ctdbd nlmsg_read on netlink_tcpdiag_socket
|
||||
Resolves: rhbz#2094489
|
||||
- Allow auditd_t noatsecure for a transition to audisp_remote_t
|
||||
Resolves: rhbz#2081907
|
||||
|
||||
* Fri May 27 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.33-1
|
||||
- Allow insights-client manage gpg admin home content
|
||||
Resolves: rhbz#2062136
|
||||
- Add the gpg_manage_admin_home_content() interface
|
||||
Resolves: rhbz#2062136
|
||||
- Add rhcd policy
|
||||
Resolves: bz#1965013
|
||||
- Allow svirt connectto virtlogd
|
||||
Resolves: rhbz#2000881
|
||||
- Add ksm service to ksmtuned
|
||||
Resolves: rhbz#2021131
|
||||
- Allow nm-privhelper setsched permission and send system logs
|
||||
Resolves: rhbz#2053639
|
||||
- Update the policy for systemd-journal-upload
|
||||
Resolves: rhbz#2085369
|
||||
- Allow systemd-journal-upload watch logs and journal
|
||||
Resolves: rhbz#2085369
|
||||
- Create a policy for systemd-journal-upload
|
||||
Resolves: rhbz#2085369
|
||||
- Allow insights-client create and use unix_dgram_socket
|
||||
Resolves: rhbz#2087765
|
||||
- Allow insights-client search gconf homedir
|
||||
Resolves: rhbz#2087765
|
||||
|
||||
* Wed May 11 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.32-1
|
||||
- Dontaudit guest attempts to dbus chat with systemd domains
|
||||
Resolves: rhbz#2062740
|
||||
- Dontaudit guest attempts to dbus chat with system bus types
|
||||
Resolves: rhbz#2062740
|
||||
- Fix users for SELinux userspace 3.4
|
||||
Resolves: rhbz#2079290
|
||||
- Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
|
||||
Resolves: rhbz#2076681
|
||||
- Allow systemd-sleep get removable devices attributes
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep tlp_filetrans_named_content()
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep execute generic programs
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep execute shell
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep transition to sysstat_t
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep transition to tlp_t
|
||||
Resolves: rhbz#2082404
|
||||
- Allow systemd-sleep transition to unconfined_service_t on bin_t executables
|
||||
Resolves: rhbz#2082404
|
||||
- allow systemd-sleep to set timer for suspend-then-hibernate
|
||||
Resolves: rhbz#2082404
|
||||
- Add default fc specifications for patterns in /opt
|
||||
Resolves: rhbz#2081059
|
||||
- Use a named transition in systemd_hwdb_manage_config()
|
||||
Resolves: rhbz#2061725
|
||||
|
||||
* Wed May 04 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.31-2
|
||||
- Remove "v" from the package version
|
||||
|
||||
* Mon May 02 2022 Nikola Knazekova <nknazeko@redhat.com> - v34.1.31-1
|
||||
- Label /var/run/machine-id as machineid_t
|
||||
Resolves: rhbz#2061680
|
||||
- Allow insights-client create_socket_perms for tcp/udp sockets
|
||||
Resolves: rhbz#2077377
|
||||
- Allow insights-client read rhnsd config files
|
||||
Resolves: rhbz#2077377
|
||||
- Allow rngd drop privileges via setuid/setgid/setcap
|
||||
Resolves: rhbz#2076642
|
||||
- Allow tmpreaper the sys_ptrace userns capability
|
||||
Resolves: rhbz#2062823
|
||||
- Add stalld to modules.conf
|
||||
Resolves: rhbz#2042614
|
||||
- New policy for stalld
|
||||
Resolves: rhbz#2042614
|
||||
- Label new utility of NetworkManager nm-priv-helper
|
||||
Resolves: rhbz#2053639
|
||||
- Exclude container.if from selinux-policy-devel
|
||||
Resolves: rhbz#1861968
|
||||
|
||||
* Tue Apr 19 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.30-2
|
||||
- Update source branches to build a new package for RHEL 9.1.0
|
||||
|
||||
* Tue Apr 12 2022 Nikola Knazekova <nknazeko@redhat.com> - 34.1.30-1
|
||||
- Allow administrative users the bpf capability
|
||||
Resolves: RHBZ#2070982
|
||||
- Allow NetworkManager talk with unconfined user over unix domain dgram socket
|
||||
Resolves: rhbz#2064688
|
||||
- Allow hostapd talk with unconfined user over unix domain dgram socket
|
||||
Resolves: rhbz#2064688
|
||||
- Allow fprintd read and write hardware state information
|
||||
Resolves: rhbz#2062911
|
||||
- Allow fenced read kerberos key tables
|
||||
Resolves: RHBZ#2060722
|
||||
- Allow init watch and watch_reads user ttys
|
||||
Resolves: rhbz#2060289
|
||||
- Allow systemd watch and watch_reads console devices
|
||||
Resolves: rhbz#2060289
|
||||
- Allow nmap create and use rdma socket
|
||||
Resolves: RHBZ#2059603
|
||||
|
||||
* Thu Mar 31 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.29-1
|
||||
- Allow qemu-kvm create and use netlink rdma sockets
|
||||
Resolves: rhbz#2063612
|
||||
- Label corosync-cfgtool with cluster_exec_t
|
||||
Resolves: rhbz#2061277
|
||||
|
||||
* Thu Mar 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.28-1
|
||||
- Allow logrotate a domain transition to cluster administrative domain
|
||||
Resolves: rhbz#2061277
|
||||
|
Loading…
Reference in New Issue
Block a user