* Fri Jan 03 2025 Zdenek Pytela <zpytela@redhat.com> - 40.13.20-1
- Allow virtqemud domain transition on numad execution Resolves: RHEL-65789 - Support virt live migration using ssh Resolves: RHEL-53972 - Allow ssh_t read systemd config files Resolves: RHEL-53972 - Allow virtqemud permissions needed for live migration Resolves: RHEL-43217 - Allow virtqemud the getpgid process permission Resolves: RHEL-46357 - Allow virtqemud manage nfs dirs when virt_use_nfs boolean is on Resolves: RHEL-71068 - Allow virtqemud relabelfrom virt_log_t files Resolves: RHEL-48236 - Allow virtqemud relabel tun_socket Resolves: RHEL-71394 - Allow gnome-remote-desktop dbus chat with policykit Resolves: RHEL-35877 - Update ktlsh policy Resolves: RHEL-42672 - Confine the ktls service Resolves: RHEL-42672 - Allow request-key to read /etc/passwd Resolves: RHEL-71490 - Allow request-key to manage all domains' keys Resolves: RHEL-71490
This commit is contained in:
parent
046dc6f583
commit
e863f070bd
28
changelog
28
changelog
@ -1,3 +1,31 @@
|
||||
* Fri Jan 03 2025 Zdenek Pytela <zpytela@redhat.com> - 40.13.20-1
|
||||
- Allow virtqemud domain transition on numad execution
|
||||
Resolves: RHEL-65789
|
||||
- Support virt live migration using ssh
|
||||
Resolves: RHEL-53972
|
||||
- Allow ssh_t read systemd config files
|
||||
Resolves: RHEL-53972
|
||||
- Allow virtqemud permissions needed for live migration
|
||||
Resolves: RHEL-43217
|
||||
- Allow virtqemud the getpgid process permission
|
||||
Resolves: RHEL-46357
|
||||
- Allow virtqemud manage nfs dirs when virt_use_nfs boolean is on
|
||||
Resolves: RHEL-71068
|
||||
- Allow virtqemud relabelfrom virt_log_t files
|
||||
Resolves: RHEL-48236
|
||||
- Allow virtqemud relabel tun_socket
|
||||
Resolves: RHEL-71394
|
||||
- Allow gnome-remote-desktop dbus chat with policykit
|
||||
Resolves: RHEL-35877
|
||||
- Update ktlsh policy
|
||||
Resolves: RHEL-42672
|
||||
- Confine the ktls service
|
||||
Resolves: RHEL-42672
|
||||
- Allow request-key to read /etc/passwd
|
||||
Resolves: RHEL-71490
|
||||
- Allow request-key to manage all domains' keys
|
||||
Resolves: RHEL-71490
|
||||
|
||||
* Fri Dec 20 2024 Petr Lautrbach <lautrbach@redhat.com> - 40.13.19-2
|
||||
- Rebuild with SELinux Userspace 3.8
|
||||
|
||||
|
@ -5,7 +5,7 @@
|
||||
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit 14ba8a3b89d9bc28b698d366b52d747f477d9ca9
|
||||
%global commit c4b8bc4bbacc1304b42bdad98728a015a89ffa2e
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -17,8 +17,8 @@
|
||||
%define CHECKPOLICYVER 3.8
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 40.13.19
|
||||
Release: 2%{?dist}
|
||||
Version: 40.13.20
|
||||
Release: 1%{?dist}
|
||||
License: GPL-2.0-or-later
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
Source1: Makefile.devel
|
||||
|
4
sources
4
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (selinux-policy-14ba8a3.tar.gz) = 96810d7c027846b2954d849e205758c96236e13000408d4e58fe9c4f68daf69e1eee72f2c15efaacd64f9279f9bc95d79a745e8cfd45531fcf59643c992e2cee
|
||||
SHA512 (selinux-policy-c4b8bc4.tar.gz) = 5bf48c9ae3cb1d0bffc8bc407cdb6103d0419acf840ef3f893c7b8910a7e77f3c55518cb0b28dfec708cb351360b97075059d1e6101134cd898dd8ccafca37d5
|
||||
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
||||
SHA512 (container-selinux.tgz) = aab511b28245317f38a8ad35d200bd9b2aafe64979d69c36870550400306dee23a9b47217b4fe7f2b60128b2263f1ef2abec7beca22e588c0ec203cc8093fe8c
|
||||
SHA512 (container-selinux.tgz) = 70b61bf9979946b476a0b4468d612cb0183b1a788c0508655e80dfa411193fb76e53ce6dbf21ec1b699d9ae75bec9c54b504cd8351bb5c61a6ad56eff145cbf8
|
||||
|
Loading…
Reference in New Issue
Block a user