* Mon May 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-19
- Fix bind_read_cache() interface to allow only read perms to caller domains - [speech-dispatcher.if] m4 macro names can not have - in them - Grant varnishlog_t access to varnishd_etc_t - Allow nrpe_t domain to read process state of systemd_logind_t - Allow mongod_t domain to connect on https port BZ(1711922) - Allow chronyc_t domain to create own tmpfiles and allow communicate send data over unix dgram sockets - Dontaudit spamd_update_t domain to read all domains states BZ(1711799) - Allow pcp_pmie_t domain to use sys_ptrace usernamespace cap BZ(1705871) - Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119) - Revert "Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119)" - Make boinc_var_lib_t mountpoint BZ(1711682) - Allow wireshark_t domain to create fifo temp files - All NetworkManager_ssh_t rules have to be in same optional block with ssh_basic_client_template(), fixing this bug in NetworkManager policy - Allow dbus chat between NetworkManager_t and NetworkManager_ssh_t domains. BZ(1677484) - Fix typo in gpg SELinux module - Update gpg policy to make ti working with confined users - Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t - Add dac_override capability to namespace_init_t domain - Label /usr/sbin/corosync-qdevice as cluster_exec_t - Allow NetworkManager_ssh_t domain to open communication channel with system dbus. BZ(1677484) - Label /usr/libexec/dnf-utils as debuginfo_exec_t - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on - Allow nrpe_t domain to be dbus cliennt - Add interface sssd_signull() - Build in parallel on Travis - Fix parallel build of the policy - Revert "Make able deply overcloud via neutron_t to label nsfs as fs_t" - Add interface systemd_logind_read_state() - Fix find commands in Makefiles - Allow systemd-timesyncd to read network state BZ(1694272) - Update userdomains to allow confined users to create gpg keys - Allow associate all filesystem_types with fs_t - Dontaudit syslogd_t using kill in unamespaces BZ(1711122) - Allow init_t to manage session_dbusd_tmp_t dirs - Allow systemd_gpt_generator_t to read/write to clearance - Allow su_domain_type to getattr to /dev/gpmctl - Update userdom_login_user_template() template to make working systemd user session for guest and xguest SELinux users
This commit is contained in:
		
							parent
							
								
									c134af44dc
								
							
						
					
					
						commit
						46a2445aaf
					
				
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -375,3 +375,5 @@ serefpolicy* | ||||
| /selinux-policy-62e78cf.tar.gz | ||||
| /selinux-policy-contrib-ebaeade.tar.gz | ||||
| /selinux-policy-78cbf0a.tar.gz | ||||
| /selinux-policy-contrib-efd9524.tar.gz | ||||
| /selinux-policy-50e97b7.tar.gz | ||||
|  | ||||
| @ -1,11 +1,11 @@ | ||||
| # github repo with selinux-policy base sources | ||||
| %global git0 https://github.com/fedora-selinux/selinux-policy | ||||
| %global commit0 78cbf0a9d74895e255a68ae92688fb6b5288f363 | ||||
| %global commit0 50e97b781ea7a501c06f8a86e94cbbdfe5a86720 | ||||
| %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) | ||||
| 
 | ||||
| # github repo with selinux-policy contrib sources | ||||
| %global git1 https://github.com/fedora-selinux/selinux-policy-contrib | ||||
| %global commit1 ebaeade60f7b8f2f0697fc0d6c2be7132c6bb531 | ||||
| %global commit1 efd95248a3e798cde8f7ed2e5667561add118588 | ||||
| %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) | ||||
| 
 | ||||
| %define distro redhat | ||||
| @ -29,7 +29,7 @@ | ||||
| Summary: SELinux policy configuration | ||||
| Name: selinux-policy | ||||
| Version: 3.14.4 | ||||
| Release: 18%{?dist} | ||||
| Release: 19%{?dist} | ||||
| License: GPLv2+ | ||||
| Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz | ||||
| Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz | ||||
| @ -787,6 +787,47 @@ exit 0 | ||||
| %endif | ||||
| 
 | ||||
| %changelog | ||||
| * Mon May 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-19 | ||||
| - Fix bind_read_cache() interface to allow only read perms to caller domains | ||||
| - [speech-dispatcher.if] m4 macro names can not have - in them | ||||
| - Grant varnishlog_t access to varnishd_etc_t | ||||
| - Allow nrpe_t domain to read process state of systemd_logind_t | ||||
| - Allow mongod_t domain to connect on https port BZ(1711922) | ||||
| - Allow chronyc_t domain to create own tmpfiles and allow communicate send data over unix dgram sockets | ||||
| - Dontaudit spamd_update_t domain to read all domains states BZ(1711799) | ||||
| - Allow pcp_pmie_t domain to use sys_ptrace usernamespace cap BZ(1705871) | ||||
| - Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119) | ||||
| - Revert "Allow userdomains to send data over dgram sockets to userdomains dbus services BZ(1710119)" | ||||
| - Make boinc_var_lib_t mountpoint BZ(1711682) | ||||
| - Allow wireshark_t domain to create fifo temp files | ||||
| - All NetworkManager_ssh_t rules have to be in same optional block with ssh_basic_client_template(), fixing this bug in NetworkManager policy | ||||
| - Allow dbus chat between NetworkManager_t and NetworkManager_ssh_t domains. BZ(1677484) | ||||
| - Fix typo in gpg SELinux module | ||||
| - Update gpg policy to make ti working with confined users | ||||
| - Add domain transition that systemd labeled as init_t can execute spamd_update_exec_t binary to run newly created process as spamd_update_t | ||||
| - Remove allow rule for virt_qemu_ga_t to write/append user_tmp_t files | ||||
| - Label /var/run/user/*/dbus-1 as session_dbusd_tmp_t | ||||
| - Add dac_override capability to namespace_init_t domain | ||||
| - Label /usr/sbin/corosync-qdevice as cluster_exec_t | ||||
| - Allow NetworkManager_ssh_t domain to open communication channel with system dbus. BZ(1677484) | ||||
| - Label /usr/libexec/dnf-utils as debuginfo_exec_t | ||||
| - Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on | ||||
| - Allow nrpe_t domain to be dbus cliennt | ||||
| - Add interface sssd_signull() | ||||
| - Build in parallel on Travis | ||||
| - Fix parallel build of the policy | ||||
| - Revert "Make able deply overcloud via neutron_t to label nsfs as fs_t" | ||||
| - Add interface systemd_logind_read_state() | ||||
| - Fix find commands in Makefiles | ||||
| - Allow systemd-timesyncd to read network state BZ(1694272) | ||||
| - Update userdomains to allow confined users to create gpg keys | ||||
| - Allow associate all filesystem_types with fs_t | ||||
| - Dontaudit syslogd_t using kill in unamespaces BZ(1711122) | ||||
| - Allow init_t to manage session_dbusd_tmp_t dirs | ||||
| - Allow systemd_gpt_generator_t to read/write to clearance | ||||
| - Allow su_domain_type to getattr to /dev/gpmctl | ||||
| - Update userdom_login_user_template() template to make working systemd user session for guest and xguest SELinux users | ||||
| 
 | ||||
| * Fri May 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-18 | ||||
| - Fix typo in gpg SELinux module | ||||
| - Update gpg policy to make ti working with confined users | ||||
|  | ||||
							
								
								
									
										6
									
								
								sources
									
									
									
									
									
								
							
							
						
						
									
										6
									
								
								sources
									
									
									
									
									
								
							| @ -1,4 +1,4 @@ | ||||
| SHA512 (selinux-policy-contrib-ebaeade.tar.gz) = f82aed1e88afe629509250be6f7a94fdc50edf1d57c321c0375e243836c1ef44cfbba4b8871330adac31e81197cbe5a7baeb500585166193af1d0d06afcc4c2e | ||||
| SHA512 (selinux-policy-78cbf0a.tar.gz) = 034614016fbc1d592b70f2c4cacf491f230752d7ecd79638e2992ce7ddd5062c5c27c5ea48cbc3c9fcc29f31609e950578d86444c2c11f4de8a91a2def80e416 | ||||
| SHA512 (container-selinux.tgz) = d4522b4eca9a2ea02cb84a69d155700c063f1121fbedabe3dde42d24541bf84b520440f8545c2c664999933c1ce64d529dab043940b718403d1212701e722b14 | ||||
| SHA512 (selinux-policy-contrib-efd9524.tar.gz) = 4ab58df002e0c604c98d86c9ece13597fd1ce181b2665df900a8a7b5076f6fe85a8ec0c7df59d15859e4fd91897405b902b9cf2ce14e4f9d3a0c3ac4ac2283a9 | ||||
| SHA512 (selinux-policy-50e97b7.tar.gz) = 519ef4dda2fb4f3e72f885043c893d54adccd6ca6edca6b87d3601fa79cfece787b8cfc1493aaa524d438132560007ef246e0427f1ad738e8af8aaa7b5c200f0 | ||||
| SHA512 (container-selinux.tgz) = 6bf3a9a88a7557a88953049900322ba6f0913e5e9c0ac56c1a184d49bf3a5e5bc2374ac49793f2a0faba3573a24edf8cbf21d526a10be67378c8d5f4a279eca1 | ||||
| SHA512 (macro-expander) = b4f26e7ed6c32b3d7b3f1244e549a0e68cb387ab5276c4f4e832a9a6b74b08bea2234e8064549d47d1b272dbd22ef0f7c6b94cd307cc31ab872f9b68206021b2 | ||||
|  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user