From 78bc21480875e33e7876a8748671cc5ec28fba36 Mon Sep 17 00:00:00 2001 From: Lukas Vrabec Date: Fri, 11 Jan 2019 12:46:15 +0100 Subject: [PATCH] * Fri Jan 11 2019 Lukas Vrabec - 3.14.3-16 - Allow sensord_t to execute own binary files - Allow pcp_pmlogger_t domain to getattr all filesystem BZ(1662432) - Allow virtd_lxc_t domains use BPF BZ(1662613) - Allow openvpn_t domain to read systemd state BZ(1661065) - Dontaudit ptrace all domains for blueman_t BZ(1653671) - Used correct renamed interface for imapd_t domain - Change label of /usr/libexec/lm_sensors/sensord-service-wrapper from lsmd_exec_t to sensord_exec_t BZ(1662922) - Allow hddtemp_t domain to read nvme block devices BZ(1663579) - Add dac_override capability to spamd_t domain BZ(1645667) - Allow pcp_pmlogger_t to mount tracefs_t filesystem BZ(1662983) - Allow pcp_pmlogger_t domain to read al sysctls BZ(1662441) - Specify recipients that will be notified about build CI results. - Allow saslauthd_t domain to mmap own pid files BZ(1653024) - Add dac_override capability for snapperd_t domain BZ(1619356) - Make kpatch_t domain application domain to allow users to execute kpatch in kpatch_t domain. - Add ipc_owner capability to pcp_pmcd_t domain BZ(1655282) - Update pulseaudio_stream_connect() to allow caller domain create stream sockets to cumminicate with pulseaudio - Allow pcp_pmlogger_t domain to send signals to rpm_script_t BZ(1651030) - Add new interface: rpm_script_signal() - Allow init_t domain to mmap init_var_lib_t files and dontaudit leaked fd. BZ(1651008) - Make workin: systemd-run --system --pty bash BZ(1647162) - Allow ipsec_t domain dbus chat with systemd_resolved_t BZ(1662443) - Allow staff_t to rw binfmt_misc_fs_t files BZ(1658975) - Specify recipients that will be notified about build CI results. - Label /usr/lib/systemd/user as systemd_unit_file_t BZ(1652814) - Allow sysadm_t,staff_t and unconfined_t domain to execute kpatch as kpatch_t domain - Add rules to allow systemd to mounton systemd_timedated_var_lib_t. - Allow x_userdomains to stream connect to pulseaudio BZ(1658286) --- .gitignore | 2 ++ selinux-policy.spec | 36 +++++++++++++++++++++++++++++++++--- sources | 6 +++--- 3 files changed, 38 insertions(+), 6 deletions(-) diff --git a/.gitignore b/.gitignore index 9ef9ae4e..d9528a67 100644 --- a/.gitignore +++ b/.gitignore @@ -327,3 +327,5 @@ serefpolicy* /selinux-policy-4cbc1ae.tar.gz /selinux-policy-contrib-a0e3869.tar.gz /selinux-policy-509e071.tar.gz +/selinux-policy-contrib-a265988.tar.gz +/selinux-policy-d0c5c81.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index affefc22..551bf363 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 509e071fb3ded4e982bdf7fdcdc8bbc8f7779172 +%global commit0 d0c5c811fee0a5de5571dab531babf6544b1def9 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 a0e386916f8bbd64918c3ab98267431e8a78bfe9 +%global commit1 a265988e553a6f76d712aff33e2def21c38628ab %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 15%{?dist} +Release: 16%{?dist} License: GPLv2+ Group: System Environment/Base Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz @@ -713,6 +713,36 @@ exit 0 %endif %changelog +* Fri Jan 11 2019 Lukas Vrabec - 3.14.3-16 +- Allow sensord_t to execute own binary files +- Allow pcp_pmlogger_t domain to getattr all filesystem BZ(1662432) +- Allow virtd_lxc_t domains use BPF BZ(1662613) +- Allow openvpn_t domain to read systemd state BZ(1661065) +- Dontaudit ptrace all domains for blueman_t BZ(1653671) +- Used correct renamed interface for imapd_t domain +- Change label of /usr/libexec/lm_sensors/sensord-service-wrapper from lsmd_exec_t to sensord_exec_t BZ(1662922) +- Allow hddtemp_t domain to read nvme block devices BZ(1663579) +- Add dac_override capability to spamd_t domain BZ(1645667) +- Allow pcp_pmlogger_t to mount tracefs_t filesystem BZ(1662983) +- Allow pcp_pmlogger_t domain to read al sysctls BZ(1662441) +- Specify recipients that will be notified about build CI results. +- Allow saslauthd_t domain to mmap own pid files BZ(1653024) +- Add dac_override capability for snapperd_t domain BZ(1619356) +- Make kpatch_t domain application domain to allow users to execute kpatch in kpatch_t domain. +- Add ipc_owner capability to pcp_pmcd_t domain BZ(1655282) +- Update pulseaudio_stream_connect() to allow caller domain create stream sockets to cumminicate with pulseaudio +- Allow pcp_pmlogger_t domain to send signals to rpm_script_t BZ(1651030) +- Add new interface: rpm_script_signal() +- Allow init_t domain to mmap init_var_lib_t files and dontaudit leaked fd. BZ(1651008) +- Make workin: systemd-run --system --pty bash BZ(1647162) +- Allow ipsec_t domain dbus chat with systemd_resolved_t BZ(1662443) +- Allow staff_t to rw binfmt_misc_fs_t files BZ(1658975) +- Specify recipients that will be notified about build CI results. +- Label /usr/lib/systemd/user as systemd_unit_file_t BZ(1652814) +- Allow sysadm_t,staff_t and unconfined_t domain to execute kpatch as kpatch_t domain +- Add rules to allow systemd to mounton systemd_timedated_var_lib_t. +- Allow x_userdomains to stream connect to pulseaudio BZ(1658286) + * Sun Dec 16 2018 Lukas Vrabec - 3.14.3-15 - Add macro-expander script to selinux-policy-devel package diff --git a/sources b/sources index 814e5e92..d47a65c9 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-contrib-a0e3869.tar.gz) = ba019a31f71790b65f07fad44ffcab0d50d1b4a4086ea7f3b756d67895aac1b6e0d01514f192bc07c9ede1f35fe7b2ab28b7d3a159255e305d8c08e65d393427 -SHA512 (selinux-policy-509e071.tar.gz) = cd4c1411aa74c43491d4482d537aa25b3dd670afef72e6da927e515cdb7ed66515f6d700c9bd02167f03faec3034733b6f61a82e58ba0a8ec2a85e14d33be3e2 -SHA512 (container-selinux.tgz) = 1e5c84f12624082b371cf56228ea17a39c4ba55689ca65d85498b51e5762129fe34099061ef42d052577a64ae89d8abd60e15bc81878db251155438202ee0165 +SHA512 (selinux-policy-contrib-a265988.tar.gz) = 04916bc9e470fcf7e7963da3cad1f4daf4a283faba50273cbae2cdd12d31625e7ee70e2ae74059322ac1e1bd51b0044c74420468236315861f3bf40639a39069 +SHA512 (selinux-policy-d0c5c81.tar.gz) = 9aa59356512b05b56d6e096c82c3cd86b358b822e081221506917a9ff7395a9a1fee287086ba0bd13ffb97b1d259f24dd2a6962d2f6555c938ca7682ee5c91ee +SHA512 (container-selinux.tgz) = 923051387ab6b3ffc94d2ff6ed63b25cd69ce6dca5a2180f6e0cf883a36d2487046629a82e8276d3d79ab55018064617b6fd0dfc8b468b3103d0360efdd7f24b