selinux-policy/sources
Zdenek Pytela 9359be591b * Fri May 17 2024 Zdenek Pytela <zpytela@redhat.com> - 40.19-1
- Allow postfix smtpd map aliases file
- Ensure dbus communication is allowed bidirectionally
- Label systemd configuration files with systemd_conf_t
- Label /run/systemd/machine with systemd_machined_var_run_t
- Allow systemd-hostnamed read the vsock device
- Allow sysadm execute dmidecode using sudo
- Allow sudodomain list files in /var
- Allow setroubleshootd get attributes of all sysctls
- Allow various services read and write z90crypt device
- Allow nfsidmap connect to systemd-homed
- Allow sandbox_x_client_t dbus chat with accountsd
- Allow system_cronjob_t dbus chat with avahi_t
- Allow staff_t the io_uring sqpoll permission
- Allow staff_t use the io_uring API
- Add support for secretmem anon inode
- Backport /var/run change related improvements
2024-05-18 22:13:10 +00:00

4 lines
487 B
Plaintext

SHA512 (selinux-policy-750db5a.tar.gz) = f6d0711b2789380c5daa05007f4408eff8e03f21b56791bd54228e14841a7898ff5836502d36743b754452409434fab6ce051f134b9b5fbaf777fc794c081ee0
SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4
SHA512 (container-selinux.tgz) = bc713e3461d31f85f3fe8ad8ca9813ce1742b0bf0f0eb8712633558140f65bd765c3ce744646234925c34b4c1413f555e66f5f38636ad5b5b7cc5f1967ab4488