* Wed Dec 15 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1.20-1
- Allow dnsmasq watch /etc/dnsmasq.d directories Resolves: rhbz#2029866 - Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t Resolves: rhbz#2029316 - Allow lldpd use an snmp subagent over a tcp socket Resolves: rhbz#2028561 - Allow smbcontrol use additional socket types Resolves: rhbz#2027751 - Add write permisson to userfaultfd_anon_inode_perms Resolves: rhbz#2027660 - Allow xdm_t watch generic directories in /lib Resolves: rhbz#1960010 - Allow xdm_t watch fonts directories Resolves: rhbz#1960010 - Label /dev/ngXnY and /dev/nvme-subsysX with fixed_disk_device_t Resolves: rhbz#2027994 - Add hwtracing_device_t type for hardware-level tracing and debugging Resolves: rhbz#2029392 - Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern() Resolves: rhbz#2028791 - Allow arpwatch get attributes of infiniband_device_t devices Resolves: rhbz#2028791 - Allow tcpdump and nmap get attributes of infiniband_device_t Resolves: rhbz#2028791
This commit is contained in:
parent
470eea63e8
commit
6bc3bd6ac4
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit 258e94568eef4d762621484372039ff994fa7f1d
|
||||
%global commit 0b4c1a7aa0be1129efd7e7749100734416a3a10d
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -23,7 +23,7 @@
|
||||
%define CHECKPOLICYVER 3.2
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 34.1.19
|
||||
Version: 34.1.20
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
@ -792,6 +792,32 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Wed Dec 15 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1.20-1
|
||||
- Allow dnsmasq watch /etc/dnsmasq.d directories
|
||||
Resolves: rhbz#2029866
|
||||
- Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t
|
||||
Resolves: rhbz#2029316
|
||||
- Allow lldpd use an snmp subagent over a tcp socket
|
||||
Resolves: rhbz#2028561
|
||||
- Allow smbcontrol use additional socket types
|
||||
Resolves: rhbz#2027751
|
||||
- Add write permisson to userfaultfd_anon_inode_perms
|
||||
Resolves: rhbz#2027660
|
||||
- Allow xdm_t watch generic directories in /lib
|
||||
Resolves: rhbz#1960010
|
||||
- Allow xdm_t watch fonts directories
|
||||
Resolves: rhbz#1960010
|
||||
- Label /dev/ngXnY and /dev/nvme-subsysX with fixed_disk_device_t
|
||||
Resolves: rhbz#2027994
|
||||
- Add hwtracing_device_t type for hardware-level tracing and debugging
|
||||
Resolves: rhbz#2029392
|
||||
- Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern()
|
||||
Resolves: rhbz#2028791
|
||||
- Allow arpwatch get attributes of infiniband_device_t devices
|
||||
Resolves: rhbz#2028791
|
||||
- Allow tcpdump and nmap get attributes of infiniband_device_t
|
||||
Resolves: rhbz#2028791
|
||||
|
||||
* Mon Nov 29 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1.19-1
|
||||
- Allow redis get attributes of filesystems with extended attributes
|
||||
Resolves: rhbz#2014611
|
||||
|
4
sources
4
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (selinux-policy-258e945.tar.gz) = 4aa307f2f27ea5ad60572e0ef21d10a9f7a87ff7d58fecd1a0a83440cd6597ba15ea3220772e1314069261ecfff3e1423df3bc6f0467031f7afe351e57fa894b
|
||||
SHA512 (selinux-policy-0b4c1a7.tar.gz) = be30e30973d5cdebe3089ab29af733ea0c3cd63dad925f55e10f585ccd62e3c70a257be1afaaba3897473e217544d8b1f4304f01a33f3203bcc16f0652c075c5
|
||||
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
||||
SHA512 (container-selinux.tgz) = da08cec3a87889a5596398c96cf650789b8b1e114b21326f5638cc45bd6885b31e5b94a46e53b8514ea3c1cda5f2935c0a020540395ce1619280998fbeee4c40
|
||||
SHA512 (container-selinux.tgz) = 3372653abf4de573861602bf8f1217a427df40937b1172ee6b3ac98ce2fc2a1f0c8bc4ffd7210cbc428da901d8832281bb7401dc49035a539d2388144f892646
|
||||
|
Loading…
Reference in New Issue
Block a user