* Tue Aug 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-30
- cockpit: Allow cockpit-session to read cockpit-tls state - Allow zebrat_t domain to read state of NetworkManager_t processes BZ(1739983) - Allow named_t domain to read/write samba_var_t files BZ(1738794) - Dontaudit abrt_t domain to read root_t files - Allow ipa_dnskey_t domain to read kerberos keytab - Allow mongod_t domain to read cgroup_t files BZ(1739357) - Update ibacm_t policy - Allow systemd to relabel all files on system. - Revert "Add new boolean systemd_can_relabel" - Allow xdm_t domain to read kernel sysctl BZ(1740385) - Add sys_admin capability for xdm_t in user namespace. BZ(1740386) - Allow dbus communications with resolved for DNS lookups - Add new boolean systemd_can_relabel - Allow auditd_t domain to create auditd_tmp_t temporary files and dirs in /tmp or /var/tmp - Label '/var/usrlocal/(.*/)?sbin(/.*)?' as bin_t - Update systemd_dontaudit_read_unit_files() interface to dontaudit alos listing dirs - Run lvmdbusd service as lvm_t
This commit is contained in:
		
							parent
							
								
									6e1369286b
								
							
						
					
					
						commit
						bee0c094a4
					
				
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -394,3 +394,5 @@ serefpolicy* | |||||||
| /selinux-policy-contrib-b7144a2.tar.gz | /selinux-policy-contrib-b7144a2.tar.gz | ||||||
| /selinux-policy-cd63aff.tar.gz | /selinux-policy-cd63aff.tar.gz | ||||||
| /selinux-policy-contrib-e563a8d.tar.gz | /selinux-policy-contrib-e563a8d.tar.gz | ||||||
|  | /selinux-policy-contrib-4396848.tar.gz | ||||||
|  | /selinux-policy-b313a79.tar.gz | ||||||
|  | |||||||
| @ -1,11 +1,11 @@ | |||||||
| # github repo with selinux-policy base sources | # github repo with selinux-policy base sources | ||||||
| %global git0 https://github.com/fedora-selinux/selinux-policy | %global git0 https://github.com/fedora-selinux/selinux-policy | ||||||
| %global commit0 cd63aff25446f708713cd6f9f65001e2b35b3427 | %global commit0 b313a79dbfd2fba545e00f31aa53d29c6f2b2722 | ||||||
| %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) | %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) | ||||||
| 
 | 
 | ||||||
| # github repo with selinux-policy contrib sources | # github repo with selinux-policy contrib sources | ||||||
| %global git1 https://github.com/fedora-selinux/selinux-policy-contrib | %global git1 https://github.com/fedora-selinux/selinux-policy-contrib | ||||||
| %global commit1 e563a8d1d64f11841d6e5f7cca6ecddbdb9a0123 | %global commit1 43968483ee1c505dea7ec17dd1789cc1b6fcb831 | ||||||
| %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) | %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) | ||||||
| 
 | 
 | ||||||
| %define distro redhat | %define distro redhat | ||||||
| @ -29,7 +29,7 @@ | |||||||
| Summary: SELinux policy configuration | Summary: SELinux policy configuration | ||||||
| Name: selinux-policy | Name: selinux-policy | ||||||
| Version: 3.14.4 | Version: 3.14.4 | ||||||
| Release: 29%{?dist} | Release: 30%{?dist} | ||||||
| License: GPLv2+ | License: GPLv2+ | ||||||
| Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz | Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz | ||||||
| Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz | Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz | ||||||
| @ -787,6 +787,25 @@ exit 0 | |||||||
| %endif | %endif | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Tue Aug 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-30 | ||||||
|  | - cockpit: Allow cockpit-session to read cockpit-tls state | ||||||
|  | - Allow zebrat_t domain to read state of NetworkManager_t processes BZ(1739983) | ||||||
|  | - Allow named_t domain to read/write samba_var_t files BZ(1738794) | ||||||
|  | - Dontaudit abrt_t domain to read root_t files | ||||||
|  | - Allow ipa_dnskey_t domain to read kerberos keytab | ||||||
|  | - Allow mongod_t domain to read cgroup_t files BZ(1739357) | ||||||
|  | - Update ibacm_t policy | ||||||
|  | - Allow systemd to relabel all files on system. | ||||||
|  | - Revert "Add new boolean systemd_can_relabel" | ||||||
|  | - Allow xdm_t domain to read kernel sysctl BZ(1740385) | ||||||
|  | - Add sys_admin capability for xdm_t in user namespace. BZ(1740386) | ||||||
|  | - Allow dbus communications with resolved for DNS lookups | ||||||
|  | - Add new boolean systemd_can_relabel | ||||||
|  | - Allow auditd_t domain to create auditd_tmp_t temporary files and dirs in /tmp or /var/tmp | ||||||
|  | - Label '/var/usrlocal/(.*/)?sbin(/.*)?' as bin_t | ||||||
|  | - Update systemd_dontaudit_read_unit_files() interface to dontaudit alos listing dirs | ||||||
|  | - Run lvmdbusd service as lvm_t | ||||||
|  | 
 | ||||||
| * Wed Aug 07 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-29 | * Wed Aug 07 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-29 | ||||||
| - Allow dlm_controld_t domain setgid capability | - Allow dlm_controld_t domain setgid capability | ||||||
| - Fix SELinux modules not installing in chroots. | - Fix SELinux modules not installing in chroots. | ||||||
|  | |||||||
							
								
								
									
										6
									
								
								sources
									
									
									
									
									
								
							
							
						
						
									
										6
									
								
								sources
									
									
									
									
									
								
							| @ -1,4 +1,4 @@ | |||||||
| SHA512 (selinux-policy-cd63aff.tar.gz) = a6b92f5800371c1726f0c8f386f3352f564c52c9ed4a5ecde09a6141fabc657ca44020c34a13c9cd592ec3411c462ced80d74ad77a8403dcad08eec3cdc02136 | SHA512 (selinux-policy-contrib-4396848.tar.gz) = 97d5d9f9e59bf607e9170a2ff12b9d33ea8892178be4ea1a202a08fcedb7e1df5d78443cd79e4b544a8f6a67f5783e516f2c85de9f4e56f93753cfe21887639e | ||||||
| SHA512 (selinux-policy-contrib-e563a8d.tar.gz) = 5eb6bdc884b13e94a7a0b91a8e496ffa1a731a87e1362ff571e748129d95f9abd8ed39ff9d1453e062a2a7e78ee36978ce0734fd3e58155b8147e7048ff4107e | SHA512 (selinux-policy-b313a79.tar.gz) = eadcceeb207448aa38a3826e3dc444602abfc42c67543ae5a58c2379f78b209fe578bd50101e628d99a02282ba9d473dee3126462f172b68b2c39b889dd8062c | ||||||
|  | SHA512 (container-selinux.tgz) = 3d4989bcf7a96d7efc64eed149b259d0ad17d405c5aa0c553b04d5de5c956aa290b87b32846a629017528dcb10223e3de1e0f51f810b3d1199356d1b245cabc7 | ||||||
| SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 | SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 | ||||||
| SHA512 (container-selinux.tgz) = b7c4030cc1d3f07c6cfe9ab6cf1b50c571301531866a7e1d44061cff777230acf9bfadbe11929baf4f8a7da74a0ad0f46139fcb0d6039cf1435915f4aab59592 |  | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user