* Tue May 04 2021 Zdenek Pytela <zpytela@redhat.com> - 34.5-1
- Grant execmem to varnishlog_t - We no longer need signull for varnishlog_t - Add map permission to varnishd_read_lib_files - Allow systemd-sleep tlp_filetrans_named_content() - Allow systemd-sleep execute generic programs - Allow systemd-sleep execute shell - Allow to sendmail read/write kerberos host rcache files - Allow freshclam get attributes of cgroup filesystems - Fix context of /run/systemd/timesync - Allow udev create /run/gdm with proper type - Allow chronyc socket file transition in user temp directory - Allow virtlogd_t to create virt_var_lockd_t dir - Allow pluto IKEv2 / ESP over TCP
This commit is contained in:
parent
2b76eb3833
commit
b900d641f6
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit 8a1746df03519636f179cc7bcc58029118822a8f
|
||||
%global commit e1e1381cb68157a427405fcef50fd081ba1aae4d
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -23,7 +23,7 @@
|
||||
%define CHECKPOLICYVER 3.2
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 34.4
|
||||
Version: 34.5
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
@ -796,6 +796,22 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Tue May 04 2021 Zdenek Pytela <zpytela@redhat.com> - 34.5-1
|
||||
- Grant execmem to varnishlog_t
|
||||
- We no longer need signull for varnishlog_t
|
||||
- Add map permission to varnishd_read_lib_files
|
||||
- Allow systemd-sleep tlp_filetrans_named_content()
|
||||
- Allow systemd-sleep execute generic programs
|
||||
- Allow systemd-sleep execute shell
|
||||
- Allow to sendmail read/write kerberos host rcache files
|
||||
- Allow freshclam get attributes of cgroup filesystems
|
||||
- Fix context of /run/systemd/timesync
|
||||
- Allow udev create /run/gdm with proper type
|
||||
- Allow chronyc socket file transition in user temp directory
|
||||
- Allow virtlogd_t to create virt_var_lockd_t dir
|
||||
- Allow pluto IKEv2 / ESP over TCP
|
||||
|
||||
|
||||
* Tue Apr 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.4-1
|
||||
- Allow domain create anonymous inodes
|
||||
- Add anon_inode class to the policy
|
||||
|
4
sources
4
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (selinux-policy-8a1746d.tar.gz) = cd17c3daf14cd86ea919e97979889a5111d720e7cc64336d1ff16846cda07b62a1834fd7b18b9ba50aa7f0fb4ec199ec86b2cc278175168266510a750453ce49
|
||||
SHA512 (container-selinux.tgz) = 7853f0e7012d1317eb8c0180ca15d8943013e712ee094e22919001b819f8d115adc601fd6ba50d5e17d90232573615319abdcc6407c0687f94be5300339044dc
|
||||
SHA512 (selinux-policy-e1e1381.tar.gz) = 431972ca6d63c4b59cd0a0f21f2e88ca2fe14cef7a11a2aee819c81afff5323ac96ace779a7e61f811c5aec840bdda68ae0a80c887074a982bdc647d713474f6
|
||||
SHA512 (container-selinux.tgz) = 656e5f112f5e6e2cb66bf39fa4d3fddc865a90afc6432fbb8eaf39f1ca6bb3510b676e340927db3d7777acac7ebea4238609f49da79843807046443f60f3f7bc
|
||||
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
||||
|
Loading…
Reference in New Issue
Block a user