* Thu Jan 26 2023 Nikola Knazekova <nknazeko@redhat.com> - 38.1.5-1
- Reuse tmpfs_t also for the ramfs filesystem Resolves: rhbz#2160391 - Allow systemd-resolved watch tmpfs directories Resolves: rhbz#2160391 - Allow hostname_t to read network sysctls. Resolves: rhbz#2161958 - Allow ModemManager all permissions for netlink route socket Resolves: rhbz#2149560 - Allow unconfined user filetransition for sudo log files Resolves: rhbz#2160388 - Allow sudodomain use sudo.log as a logfile Resolves: rhbz#2160388 - Allow nm-cloud-setup dispatcher plugin restart nm services Resolves: rhbz#2154414 - Allow wg to send msg to kernel, write to syslog and dbus connections Resolves: rhbz#2149452 - Allow rshim bpf cap2 and read sssd public files Resolves: rhbz#2080439 - Allow svirt request the kernel to load a module Resolves: rhbz#2144735 - Rebase selinux-policy to the latest one in rawhide Resolves: rhbz#2014606
This commit is contained in:
parent
c4ce76dfb1
commit
f7cdf9eba8
@ -1,6 +1,6 @@
|
||||
# github repo with selinux-policy sources
|
||||
%global giturl https://github.com/fedora-selinux/selinux-policy
|
||||
%global commit aa4d1f8b2e0e4ac4415edb1470cc280b840b5c31
|
||||
%global commit 7601b6da8c814c637e06f3485e982d95a83e07f1
|
||||
%global shortcommit %(c=%{commit}; echo ${c:0:7})
|
||||
|
||||
%define distro redhat
|
||||
@ -23,7 +23,7 @@
|
||||
%define CHECKPOLICYVER 3.2
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 38.1.4
|
||||
Version: 38.1.5
|
||||
Release: 1%{?dist}
|
||||
License: GPLv2+
|
||||
Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz
|
||||
@ -808,6 +808,30 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Jan 26 2023 Nikola Knazekova <nknazeko@redhat.com> - 38.1.5-1
|
||||
- Reuse tmpfs_t also for the ramfs filesystem
|
||||
Resolves: rhbz#2160391
|
||||
- Allow systemd-resolved watch tmpfs directories
|
||||
Resolves: rhbz#2160391
|
||||
- Allow hostname_t to read network sysctls.
|
||||
Resolves: rhbz#2161958
|
||||
- Allow ModemManager all permissions for netlink route socket
|
||||
Resolves: rhbz#2149560
|
||||
- Allow unconfined user filetransition for sudo log files
|
||||
Resolves: rhbz#2160388
|
||||
- Allow sudodomain use sudo.log as a logfile
|
||||
Resolves: rhbz#2160388
|
||||
- Allow nm-cloud-setup dispatcher plugin restart nm services
|
||||
Resolves: rhbz#2154414
|
||||
- Allow wg to send msg to kernel, write to syslog and dbus connections
|
||||
Resolves: rhbz#2149452
|
||||
- Allow rshim bpf cap2 and read sssd public files
|
||||
Resolves: rhbz#2080439
|
||||
- Allow svirt request the kernel to load a module
|
||||
Resolves: rhbz#2144735
|
||||
- Rebase selinux-policy to the latest one in rawhide
|
||||
Resolves: rhbz#2014606
|
||||
|
||||
* Thu Jan 12 2023 Nikola Knazekova <nknazeko@redhat.com> - 38.1.4-1
|
||||
- Add lpr_roles to system_r roles
|
||||
Resolves: rhbz#2152150
|
||||
|
4
sources
4
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (selinux-policy-aa4d1f8.tar.gz) = b84e9dc563c5b367832b9877d7bab6fd72af776c74d8e71d365730c9f5724931b7319f99e3b62f99b8d69e058f6502dbffb747f241f354b24c92bdadc860365f
|
||||
SHA512 (container-selinux.tgz) = 2acf0e7ae6aade6c0845e0cb430ecc7924d15546ff27fcb3c40128d96626196afafcc7822735fd2186dab17e68e771ddf8deefd180c5c0d1a84ed91a7dc04b86
|
||||
SHA512 (selinux-policy-7601b6d.tar.gz) = 875c7ed5eb0fb14120f36d53286977e5fd8325cfdde9e4781abad47ed4785123ec85ee8b4f25a5a271d983c0842b9bf2cc088550c8baa78777eefb7c7064a90c
|
||||
SHA512 (container-selinux.tgz) = fc6b51dd22a6e7726abb448e76f69c48941d0efb53a4fa8389e7b43f2d3a5836d2c09bc7fcd2a11d6f6ff7cfe46023f0119585fa22c36276f93e7e1965fda660
|
||||
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
|
||||
|
Loading…
Reference in New Issue
Block a user