diff --git a/.gitignore b/.gitignore index cf68336..b565aff 100644 --- a/.gitignore +++ b/.gitignore @@ -399,3 +399,5 @@ serefpolicy* /selinux-policy-contrib-c55a896.tar.gz /selinux-policy-6a0cb45.tar.gz /selinux-policy-contrib-8ce79b2.tar.gz +/selinux-policy-contrib-c5a8fd2.tar.gz +/selinux-policy-3e6f5ff.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index 364a04f..e06cf2f 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 6a0cb453ba0dcbbc7e75fa04a6647936ccdb339a +%global commit0 3e6f5ff6a8472c461de91690fe49fe2f12f76066 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 8ce79b2c82b2d3e62bb4b22404e755bad7131c98 +%global commit1 c5a8fd2a369b81fa96880776dc723a4038af1c49 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.5 -Release: 2%{?dist} +Release: 3%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -787,6 +787,53 @@ exit 0 %endif %changelog +* Fri Sep 13 2019 Lukas Vrabec - 3.14.5-3 +- Add sys_ptrace capability to pcp_pmlogger_t domain BZ(1751816) +- Allow gssproxy_t domain read state of all processes on system +- Fix typo in cachefilesd module +- Allow cachefilesd_t domain to read/write cachefiles_device_t devices +- Remove setting label for /dev/cachefilesd char device from cachefilesd policy. This should be added in base policy +- Add sys_admin capability for keepalived_t labeled processes +- Allow user_mail_domain attribute to manage files labeled as etc_aliases_t. +- Create new type ipmievd_helper_t domain for loading kernel modules. +- Run stratisd service as stratisd_t +- Fix abrt_upload_watch_t in abrt policy +- Update keepalived policy +- Update cron_role, cron_admin_role and cron_unconfined_role to avoid *_t_t types +- Revert "Create admin_crontab_t and admin_crontab_tmp_t types" +- Revert "Update cron_role() template to accept third parameter with SELinux domain prefix" +- Allow amanda_t to manage its var lib files and read random_device_t +- Create admin_crontab_t and admin_crontab_tmp_t types +- Add setgid and setuid capabilities to keepalived_t domain +- Update cron_role() template to accept third parameter with SELinux domain prefix +- Allow psad_t domain to create tcp diag sockets BZ(1750324) +- Allow systemd to mount fwupd_cache_t BZ(1750288) +- Allow chronyc_t domain to append to all non_security files +- Update zebra SELinux policy to make it work also with frr service +- Allow rtkit_daemon_t domain set process nice value in user namespaces BZ(1750024) +- Dontaudit rhsmcertd_t to write to dirs labeled as lib_t BZ(1556763) +- Label /var/run/mysql as mysqld_var_run_t +- Allow chronyd_t domain to manage and create chronyd_tmp_t dirs,files,sock_file objects. +- Update timedatex policy to manage localization +- Allow sandbox_web_type domains to sys_ptrace and sys_chroot in user namespaces +- Update gnome_dontaudit_read_config +- Allow devicekit_var_lib_t dirs to be created by systemd during service startup. BZ(1748997) +- Allow systemd labeled as init_t domain to remount rootfs filesystem +- Add interface files_remount_rootfs() +- Dontaudit sys_admin capability for iptables_t SELinux domain +- Label /dev/cachefilesd as cachefiles_device_t +- Make stratisd policy active +- Allow userdomains to dbus chat with policykit daemon +- Update userdomains to pass correct parametes based on updates from cron_*_role interfaces +- New interface files_append_non_security_files() +- Label 2618/tcp and 2618/udp as priority_e_com_port_t +- Label 2616/tcp and 2616/udp as appswitch_emp_port_t +- Label 2615/tcp and 2615/udp as firepower_port_t +- Label 2610/tcp and 2610/udp as versa_tek_port_t +- Label 2613/tcp and 2613/udp as smntubootstrap_port_t +- Label 3784/tcp and 3784/udp as bfd_control_port_t +- Remove rule allowing all processes to stream connect to unconfined domains + * Wed Sep 04 2019 Lukas Vrabec - 3.14.5-2 - Allow zabbix_t domain to manage zabbix_var_lib_t sock files and connect to unix_stream_socket - Dontaudit sandbox web types to setattr lib_t dirs diff --git a/sources b/sources index f200472..2e5aa0c 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ -SHA512 (container-selinux.tgz) = aeb4861d2f79b35ee10c1ad12280ea8d84ee33546eff2321287de98102093e2e004f689557ec884af929cc71bdcb38c9cc2ecf00226433a44a6e52d1d11959b4 +SHA512 (selinux-policy-contrib-c5a8fd2.tar.gz) = 57fb899c9c7501272d9e773774b9c1dfae97274ddfcfa7698ac34c803722b51c1282bcc4b6aa35292d93ce3063395298ef3b794f191698d6b6e6b1968d376685 +SHA512 (selinux-policy-3e6f5ff.tar.gz) = a5f2bfd9f6a9ad4fb857f432b02cae4b259399d1d00a807d0403bd5c4d05a9ce1c23a522c5a71c21953005ee96988cbf6a0e49cc46ba5a3be4f65d5b39cb3f9b +SHA512 (container-selinux.tgz) = 632dfadfbe4f94867194f77ef5bcd8348b08288ab943091f1def637ad826dd1e3a88f998dd0cc154c860c6cc4a8281da6759fc484bcd133424a4a5dea75ed6f8 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 -SHA512 (selinux-policy-6a0cb45.tar.gz) = b0058489dffe2de2bebcb9f7b9a1bf6d143e5c6fa0ed50bd1fff1b52be052f5f958d0feb4b9bd82d763dd87d6979bd8a37a52f7be52bbf44f76a8bc90439c79e -SHA512 (selinux-policy-contrib-8ce79b2.tar.gz) = e36bb51c1bcb553a54a95a29cb6440b6f120c805d5fa34e324da181d45abc4c489db51b58296df73c45bc702a86eadbb13001c2e88efa590f18128fff6fe3e9e