From f69f4a323fe15e67bd79dac758417286c4e414a8 Mon Sep 17 00:00:00 2001 From: Zdenek Pytela Date: May 27 2022 19:08:08 +0000 Subject: * Fri May 27 2022 Zdenek Pytela - 37.3-1 - Allow nm-dispatcher custom plugin execute systemctl - Allow nm-dispatcher custom plugin dbus chat with nm - Allow nm-dispatcher custom plugin create and use udp socket - Allow nm-dispatcher custom plugin create and use netlink_route_socket - Use create_netlink_socket_perms in netlink_route_socket class permissions - Add support for nm-dispatcher sendmail scripts - Allow sslh net_admin capability - Allow insights-client manage gpg admin home content - Add the gpg_manage_admin_home_content() interface - Allow rhsmcertd create generic log files - Update logging_create_generic_logs() to use create_files_pattern() - Label /var/cache/insights with insights_client_cache_t - Allow insights-client search gconf homedir - Allow insights-client create and use unix_dgram_socket - Allow blueman execute its private memfd: files - Move the chown call into make-srpm.sh --- diff --git a/selinux-policy.spec b/selinux-policy.spec index 8718eee..847fd96 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit c1ceef9712d0ac2b4643a0d9187c737b3580cf73 +%global commit 2a051bc60695ca5b381b806acbf2e2af040c0158 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 37.2 +Version: 37.3 Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -813,6 +813,24 @@ exit 0 %endif %changelog +* Fri May 27 2022 Zdenek Pytela - 37.3-1 +- Allow nm-dispatcher custom plugin execute systemctl +- Allow nm-dispatcher custom plugin dbus chat with nm +- Allow nm-dispatcher custom plugin create and use udp socket +- Allow nm-dispatcher custom plugin create and use netlink_route_socket +- Use create_netlink_socket_perms in netlink_route_socket class permissions +- Add support for nm-dispatcher sendmail scripts +- Allow sslh net_admin capability +- Allow insights-client manage gpg admin home content +- Add the gpg_manage_admin_home_content() interface +- Allow rhsmcertd create generic log files +- Update logging_create_generic_logs() to use create_files_pattern() +- Label /var/cache/insights with insights_client_cache_t +- Allow insights-client search gconf homedir +- Allow insights-client create and use unix_dgram_socket +- Allow blueman execute its private memfd: files +- Move the chown call into make-srpm.sh + * Fri May 06 2022 Zdenek Pytela - 37.2-1 - Use the networkmanager_dispatcher_plugin attribute in allow rules - Make a custom nm-dispatcher plugin transition diff --git a/sources b/sources index 33f7fed..82b0f25 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-c1ceef9.tar.gz) = 840ec4642ba6c6be6c545823835b2c0a4d922781b128cae3284e3ec8d6ee8de4051e5b5e3c04b636868020aab150b59824b71466997a27d0976cef44ae0044b0 -SHA512 (container-selinux.tgz) = 4e17b4d5f54fb27cb0159bdea37df5f519b989b880831d49bb60be079c0896cf3810909bd72956868fe440ef3aefb8f740ffac8f53aa803a1a29e9a6fc331ee8 +SHA512 (selinux-policy-2a051bc.tar.gz) = 162c5f63765783160867c85bfb1f07c89c6be6b64ae227e3322a433fae644aebc7b8fc5d3fad2091b132af0d9c0da2f3d86cae1403ace2a1dda7c9681be53826 +SHA512 (container-selinux.tgz) = d54c20aa0f8f78a8f5300a7f35a72936d7c674a3fb99c0a1b751720219b98d64064acbcb7de8b1af9a4d245c473f26d23f3f83cda8361f05d8bd6ad7ff7f0439 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4