From 491bb86202d902647ef30148207bb502f994a5bd Mon Sep 17 00:00:00 2001 From: Zdenek Pytela Date: Aug 27 2020 06:58:40 +0000 Subject: * Mon Aug 24 2020 Zdenek Pytela - 3.14.6-25 - Allow certmonger fowner capability - The nfsdcld service is now confined by SELinux - Change transitions for ~/.config/Yubico - Allow all users to connect to systemd-userdbd with a unix socket - Add file context for ~/.config/Yubico - Allow syslogd_t domain to read/write tmpfs systemd-bootchart files - Allow login_pgm attribute to get attributes in proc_t - Allow passwd to get attributes in proc_t - Revert "Allow passwd to get attributes in proc_t" - Revert "Allow login_pgm attribute to get attributes in proc_t" - Allow login_pgm attribute to get attributes in proc_t - Allow passwd to get attributes in proc_t - Allow traceroute_t and ping_t to bind generic nodes. - Create macro corenet_icmp_bind_generic_node() - Allow unconfined_t to node_bind icmp_sockets in node_t domain --- diff --git a/.gitignore b/.gitignore index 86e8d19..450db77 100644 --- a/.gitignore +++ b/.gitignore @@ -478,3 +478,6 @@ serefpolicy* /selinux-policy-217d493.tar.gz /selinux-policy-contrib-9b7cf70.tar.gz /selinux-policy-6fe2056.tar.gz +/selinux-policy-contrib-7c37fde.tar.gz +/selinux-policy-5e99183.tar.gz +/selinux-policy-099ea7b.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index dcf0d7b..0a94ae3 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 6fe205674f9cd1face5e2cf1aeb90d265ef89ba8 +%global commit0 099ea7b7bd113cac657f98d406c77839cce98859 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 9b7cf700494669ec9b27e59abe53beae09a8c7c7 +%global commit1 7c37fdec5dbf351cd55491174ae06c983e4e72bc %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.6 -Release: 24%{?dist} +Release: 25%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -784,6 +784,23 @@ exit 0 %endif %changelog +* Mon Aug 24 2020 Zdenek Pytela - 3.14.6-25 +- Allow certmonger fowner capability +- The nfsdcld service is now confined by SELinux +- Change transitions for ~/.config/Yubico +- Allow all users to connect to systemd-userdbd with a unix socket +- Add file context for ~/.config/Yubico +- Allow syslogd_t domain to read/write tmpfs systemd-bootchart files +- Allow login_pgm attribute to get attributes in proc_t +- Allow passwd to get attributes in proc_t +- Revert "Allow passwd to get attributes in proc_t" +- Revert "Allow login_pgm attribute to get attributes in proc_t" +- Allow login_pgm attribute to get attributes in proc_t +- Allow passwd to get attributes in proc_t +- Allow traceroute_t and ping_t to bind generic nodes. +- Create macro corenet_icmp_bind_generic_node() +- Allow unconfined_t to node_bind icmp_sockets in node_t domain + * Thu Aug 13 2020 Zdenek Pytela - 3.14.6-24 - Add ipa_helper_noatsecure() interface unconditionally - Conditionally allow nagios_plugin_domain dbus chat with init diff --git a/sources b/sources index dc0836c..e905a03 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ -SHA512 (selinux-policy-contrib-9b7cf70.tar.gz) = ba053dedf48c9fa5199f7ede41f12959680de910ebf7f7c8d8a9259eef59d89c5dca3e4b52aff96ea6c6b2ddfdda7ba0f64c1483d7f86da83ee9f439c16de5f6 -SHA512 (selinux-policy-6fe2056.tar.gz) = d9ec5664bd5fc99244c4c91bb7fb68f8a67f88b250dc6ec3f018328fe89a796c60d096edd57fca0239d668c98c567367e015aa2e7785792dc0891c783c130d7f -SHA512 (container-selinux.tgz) = db901e9d5ca68a5f771437852d1ab2f5463df945ec9673f3e1ce18cb081aa60544d89e3357f33407aa18196fc1f8b4c554a0690a6bfd0017ff75216c84a19a59 +SHA512 (selinux-policy-contrib-7c37fde.tar.gz) = 481ce52174972d455de8559c51cb3eb4f74f5a990412dbdd4d69f158bb465c2cc6342e13e24f4047f33d4f2e7c79f7f0123f0520dd9a6af524f0a3666d649b9e +SHA512 (selinux-policy-099ea7b.tar.gz) = 0fe2b0aaad88b1ffca83bb8b1e19a781860e854ab7630a38a4656c531d1b035ce695f67468cf34c49e21cc39a17fbabfa0c14cfb3fddf215626aaefd45890aca +SHA512 (container-selinux.tgz) = 667a09b3f37706727eb8992b9d57d767e6d6643cf1f495339934cb36d8d30272c193fa7cfbffe9df50b0cef7dd6883e7df1750970ee41c2db1d891bf75d73d34 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4