selinux-policy/sources
Lukas Vrabec 9b1e4d53d1
* Mon Oct 15 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.14.3-9
- Allow caller domains using cron_*_role to have entrypoint permission on system_cron_spool_t files BZ(1625645)
- Add interface cron_system_spool_entrypoint()
- Bolt added d-bus API for force-powering the thunderbolt controller, so system-dbusd needs acces to boltd pipes BZ(1637676)
- Add interfaces for boltd SELinux module
- Add dac_override capability to modemmanager_t domain BZ(1636608)
- Allow systemd to mount boltd_var_run_t dirs BZ(1636823)
- Label correctly /var/named/chroot*/dev/unrandom in bind chroot.
2018-10-15 17:44:05 +02:00

4 lines
510 B
Plaintext

SHA512 (selinux-policy-contrib-5252fe6.tar.gz) = 366636200668f30cf8520fb8fb2f4f6292d86b093fbe03c3414da24705ac40ab5e4f7943b484fbeba5f3def76fe1e2cf2b1160f56f7ad04d0aef3b6dd61cde74
SHA512 (selinux-policy-2d39d24.tar.gz) = 0b25543fa70599a6086336fa90edf69acda23d7c5df861a88b5733e7c14947e5f05a178e7f8fb5ebc8da9c90c1a45a746265c9ced677f4887c5267252d0e59b4
SHA512 (container-selinux.tgz) = b24c37183ad16f64eb5b3b50a4e4293a17b94571dd7bfb365f219127dde35e4235d7c3f885fb25cb7e12e8e836e1f48a8b854b8acf22a1856617a5b9ca8423d2