From 4bbbba4fda6b1ec2288b1dd0a5e2cedbf4ba177e Mon Sep 17 00:00:00 2001 From: Zdenek Pytela Date: Dec 10 2021 17:04:24 +0000 Subject: * Fri Dec 10 2021 Zdenek Pytela - 35.7-1 - Allow systemd read unlabeled symbolic links - Label abrt-action-generate-backtrace with abrt_handle_event_exec_t - Allow dnsmasq watch /etc/dnsmasq.d directories - Allow rhsmcertd get attributes of tmpfs_t filesystems - Allow lldpd use an snmp subagent over a tcp socket - Allow xdm watch generic directories in /var/lib - Allow login_userdomain open/read/map system journal - Allow sysadm_t connect to cluster domains over a unix stream socket - Allow sysadm_t read/write pkcs shared memory segments - Allow sysadm_t connect to sanlock over a unix stream socket - Allow sysadm_t dbus chat with sssd - Allow sysadm_t set attributes on character device nodes - Allow sysadm_t read and write watchdog devices - Allow smbcontrol use additional socket types - Allow cloud-init dbus chat with systemd-logind - Allow svnserve send mail from the system - Update userdom_exec_user_tmp_files() with an entrypoint rule - Allow sudodomain send a null signal to sshd processes --- diff --git a/selinux-policy.spec b/selinux-policy.spec index af3c8b8..8b82c27 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 6a6fff9f00a02723d3a9c58e892e12a527df8efa +%global commit 07b06a7f6cb1f41b92de5d29d21ac89c4d362457 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 35.6 +Version: 35.7 Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -808,6 +808,26 @@ exit 0 %endif %changelog +* Fri Dec 10 2021 Zdenek Pytela - 35.7-1 +- Allow systemd read unlabeled symbolic links +- Label abrt-action-generate-backtrace with abrt_handle_event_exec_t +- Allow dnsmasq watch /etc/dnsmasq.d directories +- Allow rhsmcertd get attributes of tmpfs_t filesystems +- Allow lldpd use an snmp subagent over a tcp socket +- Allow xdm watch generic directories in /var/lib +- Allow login_userdomain open/read/map system journal +- Allow sysadm_t connect to cluster domains over a unix stream socket +- Allow sysadm_t read/write pkcs shared memory segments +- Allow sysadm_t connect to sanlock over a unix stream socket +- Allow sysadm_t dbus chat with sssd +- Allow sysadm_t set attributes on character device nodes +- Allow sysadm_t read and write watchdog devices +- Allow smbcontrol use additional socket types +- Allow cloud-init dbus chat with systemd-logind +- Allow svnserve send mail from the system +- Update userdom_exec_user_tmp_files() with an entrypoint rule +- Allow sudodomain send a null signal to sshd processes + * Fri Nov 19 2021 Zdenek Pytela - 35.6-1 - Allow PID 1 and dbus-broker IPC with a systemd user session - Allow rpmdb read generic SSL certificates diff --git a/sources b/sources index 387d827..7883fd1 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-6a6fff9.tar.gz) = 38513820fa6d0f4ae333e00603b7aaefe19b060cc332d1a97b16a8903f9ee1843899d871ec075f7551dc5a1a3dbb2a9f7fc5162c32e1fb48560ce7d1bb250f0c -SHA512 (container-selinux.tgz) = 0f203fe39e2b277a3fcb1f10e428795e085393f1d6fc121ce5dd5d9529e61ec405258e2900beded296072f1678893efe53c35b4c92a430d4ee8e9b378262bbb4 +SHA512 (selinux-policy-07b06a7.tar.gz) = 1d22662676b47b0b603fb10cfed5490a935108048119ee558f7969d262a879d6c1f2c9edd848901b5d3275381f852d529ee23008fc3e3b78871f1cd60977a317 +SHA512 (container-selinux.tgz) = 1fb86e0e99fbc097c2dc4d84827121d4abd9f622b921c8f39e6c4f6ea58c12ffeff78f7b7cad460111b446821613a34281289c2f55549ec89152d49280fb4783 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4