import selinux-policy-34.1.22-1.el9
This commit is contained in:
parent
df436d0ce3
commit
aa60c4739e
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,2 +1,2 @@
|
|||||||
SOURCES/container-selinux.tgz
|
SOURCES/container-selinux.tgz
|
||||||
SOURCES/selinux-policy-0b4c1a7.tar.gz
|
SOURCES/selinux-policy-141c3fd.tar.gz
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
223e05c2904e656cd85ad50bf98f2a4294f5e361 SOURCES/container-selinux.tgz
|
76b98420bd78a14b2421e1f14680b6bfe60fcfdf SOURCES/container-selinux.tgz
|
||||||
c6ce6f465910d0376926a7fa36a54b50dd193619 SOURCES/selinux-policy-0b4c1a7.tar.gz
|
fc88dd3c49d79e37c37b32014241fa85b457daa4 SOURCES/selinux-policy-141c3fd.tar.gz
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# github repo with selinux-policy sources
|
# github repo with selinux-policy sources
|
||||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||||
%global commit 0b4c1a7aa0be1129efd7e7749100734416a3a10d
|
%global commit 141c3fde08c02097e0b6fa179a33cc17371e9a22
|
||||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||||
|
|
||||||
%define distro redhat
|
%define distro redhat
|
||||||
@ -23,7 +23,7 @@
|
|||||||
%define CHECKPOLICYVER 3.2
|
%define CHECKPOLICYVER 3.2
|
||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 34.1.20
|
Version: 34.1.22
|
||||||
Release: 1%{?dist}
|
Release: 1%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||||
@ -792,6 +792,44 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Jan 11 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.22-1
|
||||||
|
- Allow sshd read filesystem sysctl files
|
||||||
|
Resolves: rhbz#2036585
|
||||||
|
- Revert "Allow sshd read sysctl files"
|
||||||
|
Resolves: rhbz#2036585
|
||||||
|
|
||||||
|
* Mon Jan 10 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.21-1
|
||||||
|
- Remove the lockdown class from the policy
|
||||||
|
Resolves: rhbz#2017848
|
||||||
|
- Revert "define lockdown class and access"
|
||||||
|
Resolves: rhbz#2017848
|
||||||
|
- Allow gssproxy access to various system files.
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow gssproxy read, write, and map ica tmpfs files
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow gssproxy read and write z90crypt device
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow sssd_kcm read and write z90crypt device
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow abrt_domain read and write z90crypt device
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow NetworkManager read and write z90crypt device
|
||||||
|
Resolves: rhbz#2026974
|
||||||
|
- Allow smbcontrol read the network state information
|
||||||
|
Resolves: rhbz#2038157
|
||||||
|
- Allow virt_domain map vhost devices
|
||||||
|
Resolves: rhbz#2035702
|
||||||
|
- Allow fcoemon request the kernel to load a module
|
||||||
|
Resolves: rhbz#2034463
|
||||||
|
- Allow lldpd connect to snmpd with a unix domain stream socket
|
||||||
|
Resolves: rhbz#2033315
|
||||||
|
- Allow ModemManager create a qipcrtr socket
|
||||||
|
Resolves: rhbz#2036582
|
||||||
|
- Allow ModemManager request to load a kernel module
|
||||||
|
Resolves: rhbz#2036582
|
||||||
|
- Allow sshd read sysctl files
|
||||||
|
Resolves: rhbz#2036585
|
||||||
|
|
||||||
* Wed Dec 15 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1.20-1
|
* Wed Dec 15 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1.20-1
|
||||||
- Allow dnsmasq watch /etc/dnsmasq.d directories
|
- Allow dnsmasq watch /etc/dnsmasq.d directories
|
||||||
Resolves: rhbz#2029866
|
Resolves: rhbz#2029866
|
||||||
|
Loading…
Reference in New Issue
Block a user