import selinux-policy-34.1.43-1.el9_1.1
This commit is contained in:
parent
edb05e924a
commit
4bffbbb0dc
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,2 +1,2 @@
|
||||
SOURCES/container-selinux.tgz
|
||||
SOURCES/selinux-policy-23a8268.tar.gz
|
||||
SOURCES/selinux-policy-cd12132.tar.gz
|
||||
|
@ -1,2 +1,2 @@
|
||||
2404b329e467495ccb771593ba306eb043932ffa SOURCES/container-selinux.tgz
|
||||
6329655722127a03a53c33d3c02f72df4246e718 SOURCES/selinux-policy-23a8268.tar.gz
|
||||
d0aca979f362bc05881a734928a1fa223f6c8ec0 SOURCES/container-selinux.tgz
|
||||
acd5572c0a5c94147bc1746b9ad6dac18f4c8bef SOURCES/selinux-policy-cd12132.tar.gz
|
||||
|
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit 23a8268b99a25d662dda2ccbcf41d71e1d028fe9
|
||||
%global commit cd12132eaba9e20fd05aa30f4aa201a39607feab
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -24,7 +24,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 34.1.43
|
||||
Release: 1%{?dist}
|
||||
Release: 1%{?dist}.1
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
Source1: modules-targeted-base.conf
|
||||
@ -794,6 +794,46 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Fri Jan 06 2023 Nikola Knazekova <nknazeko@redhat.com> - 34.1.43-1.1
|
||||
- Add domain_unix_read_all_semaphores() interface
|
||||
Resolves: rhbz#2136760
|
||||
- Allow rhcd compute selinux access vector
|
||||
Resolves: rhbz#2136760
|
||||
- Add file context entries for insights-client and rhc
|
||||
Resolves: rhbz#2136760
|
||||
- Revert "Allow insights-client run lpr and allow the proper role"
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client dbus chat with various services
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client tcp connect to various ports
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client run lpr and allow the proper role
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client work with pcp and manage user config files
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client dbus chat with abrt
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights client communicate with cupsd, mysqld, openvswitch, redis
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights client read raw memory devices
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client domain transition on semanage execution
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client create gluster log dir with a transition
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client manage generic locks
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client unix_read all domain semaphores
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client manage samba var dirs
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client send null signal to rpm and system cronjob
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client connect to postgresql with a unix socket
|
||||
Resolves: rhbz#2136760
|
||||
- Allow insights-client domtrans on unix_chkpwd execution
|
||||
Resolves: rhbz#2136760
|
||||
|
||||
* Thu Sep 08 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.43-1
|
||||
- Update rhcd policy for executing additional commands 5
|
||||
Resolves: rhbz#2119351
|
||||
|
Loading…
Reference in New Issue
Block a user