From 6a3fec4b744832bd93e03d4e684dc5a5d32476e9 Mon Sep 17 00:00:00 2001 From: Zdenek Pytela Date: Apr 29 2020 09:21:16 +0000 Subject: * Wed Apr 29 2020 Zdenek Pytela - 3.14.6-13 - Update networkmanager_read_pid_files() to allow also list_dir_perms - Update policy for NetworkManager_ssh_t - Allow glusterd synchronize between master and slave - Allow spamc_t domain to read network state - Allow strongswan use tun/tap devices and keys - Allow systemd_userdbd_t domain logging to journal --- diff --git a/.gitignore b/.gitignore index 6d619ed..6b5e0c4 100644 --- a/.gitignore +++ b/.gitignore @@ -458,3 +458,5 @@ serefpolicy* /selinux-policy-50a6afe.tar.gz /selinux-policy-ad1d355.tar.gz /selinux-policy-contrib-6db7310.tar.gz +/selinux-policy-b583642.tar.gz +/selinux-policy-contrib-80860a3.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index 657abd5..cb66c9b 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 ad1d35503f55f535401daa0a59913aa559c38d44 +%global commit0 b5836428b2a73ac6fee5fc101a630ea79095a82f %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 6db7310a3b7385e07359a978a46c52d7ec22bedd +%global commit1 80860a357b13706296074de5e53362dd46887577 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.6 -Release: 12%{?dist} +Release: 13%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -774,6 +774,14 @@ exit 0 %endif %changelog +* Wed Apr 29 2020 Zdenek Pytela - 3.14.6-13 +- Update networkmanager_read_pid_files() to allow also list_dir_perms +- Update policy for NetworkManager_ssh_t +- Allow glusterd synchronize between master and slave +- Allow spamc_t domain to read network state +- Allow strongswan use tun/tap devices and keys +- Allow systemd_userdbd_t domain logging to journal + * Tue Apr 14 2020 Zdenek Pytela - 3.14.6-12 - Allow rngd create netlink_kobject_uevent_socket and read udev runtime files - Allow ssh-keygen create file in /var/lib/glusterd diff --git a/sources b/sources index 3e0d70e..e7a5baf 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ -SHA512 (selinux-policy-ad1d355.tar.gz) = c58b42b7b0a6c92f0efb3cd64c7c7dc4d8645dcc1a66e1af59a508ac22cbf777e82d7ecd69ba65eb0031470b7c8c6f8e55a3f0275da21da2f0b5ce2d5a394750 -SHA512 (selinux-policy-contrib-6db7310.tar.gz) = 805bffcdee4cdf870973419c22f04b9862873c68f73fede5c8360750719efb96c28a72e2bb5382e4a7b7df25a3dbd3997f740c4a6d194c00f9b1468afe6a3009 -SHA512 (container-selinux.tgz) = 551b7288daeb2742e6bdbf8ec31ae5ff5efc3223ef30776359ec3480a0d9a5b16174a0f74bbacd446c56f822b51c83c3b4ad7c74b2e843f2c698dcfacbf6a175 +SHA512 (selinux-policy-b583642.tar.gz) = 6ba0e3a86700485d5c83b2849601a1ccc2a53dde94ce394c6f756a6a58f3173ba7595f741da4b19febc90df6fb9efd627cfddc2fdbb9474b5a2446c1c1454c4b +SHA512 (selinux-policy-contrib-80860a3.tar.gz) = d42d86bb5b75d24fb59ac7312880da31535c4971b890636be42e63bc99ff74fc8e6b184cf3ab17cfd35d0f17c9e26f928015b15e4b0d3451b512223bf22ada11 +SHA512 (container-selinux.tgz) = ccc15935ad53f5c6e955c500f7c4612e0e6544ee41647dfef13208b55edf52af0a7f652d4ec56130dc944a84f398bf6f991d2baf9bc0fb37d80cd3bee9eac6c9 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4