diff --git a/selinux-policy.spec b/selinux-policy.spec index c00009b8..c5f20c30 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 89e50df97376e5160134fb156f56d2a87434fc09 +%global commit 78565ea1be135c521d6578abdf10151f0517a88a %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 34.1.34 +Version: 34.1.35 Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -794,6 +794,65 @@ exit 0 %endif %changelog +* Fri Jun 24 2022 Zdenek Pytela - 34.1.35-1 +-Add the corecmd_watch_bin_dirs() interface +Resolves: rhbz#1965013 +- Update rhcd policy +Resolves: rhbz#1965013 +- Allow rhcd search insights configuration directories +Resolves: rhbz#1965013 +- Add the kernel_read_proc_files() interface +Resolves: rhbz#1965013 +- Update insights_client_filetrans_named_content() +Resolves: rhbz#2081425 +- Allow transition to insights_client named content +Resolves: rhbz#2081425 +- Add the insights_client_filetrans_named_content() interface +Resolves: rhbz#2081425 +- Update policy for insights-client to run additional commands 3 +Resolves: rhbz#2081425 +- Allow insights-client execute its private memfd: objects +Resolves: rhbz#2081425 +- Update policy for insights-client to run additional commands 2 +Resolves: rhbz#2081425 +- Use insights_client_tmp_t instead of insights_client_var_tmp_t +Resolves: rhbz#2081425 +- Change space indentation to tab in insights-client +Resolves: rhbz#2081425 +- Use socket permissions sets in insights-client +Resolves: rhbz#2081425 +- Update policy for insights-client to run additional commands +Resolves: rhbz#2081425 +- Allow init_t to rw insights_client unnamed pipe +Resolves: rhbz#2081425 +- Fix insights client +Resolves: rhbz#2081425 +- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling +Resolves: rhbz#2081425 +- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t +Resolves: rhbz#2081425 +- Allow stalld get scheduling policy of kernel threads +Resolves: rhbz#2096776 +- Update samba-dcerpcd policy for kerberos usage +Resolves: rhbz#2096521 +- Allow winbind_rpcd_t connect to self over a unix_stream_socket +Resolves: rhbz#2096255 +- Allow dlm_controld send a null signal to a cluster daemon +Resolves: rhbz#2095884 +- Allow dhclient manage pid files used by chronyd +The chronyd_manage_pid_files() interface was added. +- Resolves: rhbz#2094155 +Allow install_t nnp_domtrans to setfiles_mac_t +- Resolves: rhbz#2073010 +- Allow rabbitmq to use systemd notify +Resolves: rhbz#2056565 +- Allow ksmctl create hardware state information files +Resolves: rhbz#2021131 +- Label /var/target with targetd_var_t +Resolves: rhbz#2020169 +- Allow targetclid read generic SSL certificates +Resolves: rhbz#2020169 + * Thu Jun 09 2022 Zdenek Pytela - 34.1.34-1 - Allow stalld setsched and sys_nice Resolves: rhbz#2092864 diff --git a/sources b/sources index 42ee9611..22944d62 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-89e50df.tar.gz) = 77f75082c6cdcee4a28715084d56e46c72a671ffb1d8217d84d9e1f734617506c469bc058f00d4d52e3f2f875a6684e16875995a348bb0d7574fbd31aa0125d8 -SHA512 (container-selinux.tgz) = cf575a101a57e5038e15d69d2946ab409396c6df0944b00f1af10e43404f547c5bcd0444bbd33e6a61367a88ca3b33237940b10f342e9d33925d8de584fafc5d +SHA512 (selinux-policy-78565ea.tar.gz) = 089c18addfdcb29d9455552807c9f810518941bf85f530afb8375d1379941225ae9d49c9ad86863a5a1ce065af1fb4daa0e6574c27d748215b146599d08a6b5a SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 +SHA512 (container-selinux.tgz) = fd8db85b8e11b547a6a6204f3c63734e28f09e8893436fc4e3eb2a6e4c2a19e310e627a65ab5bc7eb2658170a9e4fc0d80ae7d6f7902944e519e985f7fd2f024