commit: 20b5a7c3306cd2c08c705f87f66caaf705494457
Author: Chris PeBenito <pebenito <AT> ieee <DOT> org>
AuthorDate: Tue Feb 2 18:58:24 2021 +0000
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Feb 6 21:15:09 2021 +0000
URL:
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=20b5a7c3
various: Module version bump.
Signed-off-by: Chris PeBenito <pebenito <AT> ieee.org>
Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
policy/modules/admin/apt.te | 2 +-
policy/modules/admin/bootloader.te | 2 +-
policy/modules/admin/logrotate.te | 2 +-
policy/modules/apps/games.te | 2 +-
policy/modules/apps/mplayer.te | 2 +-
policy/modules/services/dbus.te | 2 +-
policy/modules/services/ssh.te | 2 +-
policy/modules/system/authlogin.te | 2 +-
policy/modules/system/locallogin.te | 2 +-
policy/modules/system/systemd.te | 4 ++--
10 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/policy/modules/admin/apt.te b/policy/modules/admin/apt.te
index 8e5f72b7..e4bfcae7 100644
--- a/policy/modules/admin/apt.te
+++ b/policy/modules/admin/apt.te
@@ -1,4 +1,4 @@
-policy_module(apt, 1.15.0)
+policy_module(apt, 1.15.1)
########################################
#
diff --git a/policy/modules/admin/bootloader.te
b/policy/modules/admin/bootloader.te
index cbaf65cd..e2848169 100644
--- a/policy/modules/admin/bootloader.te
+++ b/policy/modules/admin/bootloader.te
@@ -1,4 +1,4 @@
-policy_module(bootloader, 1.21.1)
+policy_module(bootloader, 1.21.2)
########################################
#
diff --git a/policy/modules/admin/logrotate.te
b/policy/modules/admin/logrotate.te
index c13f0a73..563237b6 100644
--- a/policy/modules/admin/logrotate.te
+++ b/policy/modules/admin/logrotate.te
@@ -1,4 +1,4 @@
-policy_module(logrotate, 1.24.0)
+policy_module(logrotate, 1.24.1)
########################################
#
diff --git a/policy/modules/apps/games.te b/policy/modules/apps/games.te
index c66b382b..59eaf328 100644
--- a/policy/modules/apps/games.te
+++ b/policy/modules/apps/games.te
@@ -1,4 +1,4 @@
-policy_module(games, 2.7.1)
+policy_module(games, 2.7.2)
########################################
#
diff --git a/policy/modules/apps/mplayer.te b/policy/modules/apps/mplayer.te
index d885b0b8..c0f38ca8 100644
--- a/policy/modules/apps/mplayer.te
+++ b/policy/modules/apps/mplayer.te
@@ -1,4 +1,4 @@
-policy_module(mplayer, 2.10.0)
+policy_module(mplayer, 2.10.1)
########################################
#
diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te
index cbbbd45b..1f1b33c1 100644
--- a/policy/modules/services/dbus.te
+++ b/policy/modules/services/dbus.te
@@ -1,4 +1,4 @@
-policy_module(dbus, 1.29.5)
+policy_module(dbus, 1.29.6)
gen_require(`
class dbus all_dbus_perms;
diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
index c5749682..21109ae6 100644
--- a/policy/modules/services/ssh.te
+++ b/policy/modules/services/ssh.te
@@ -1,4 +1,4 @@
-policy_module(ssh, 2.14.3)
+policy_module(ssh, 2.14.4)
########################################
#
diff --git a/policy/modules/system/authlogin.te
b/policy/modules/system/authlogin.te
index f5da5048..7fcacf32 100644
--- a/policy/modules/system/authlogin.te
+++ b/policy/modules/system/authlogin.te
@@ -1,4 +1,4 @@
-policy_module(authlogin, 2.17.6)
+policy_module(authlogin, 2.17.7)
########################################
#
diff --git a/policy/modules/system/locallogin.te
b/policy/modules/system/locallogin.te
index ed004fb8..c55f4c3c 100644
--- a/policy/modules/system/locallogin.te
+++ b/policy/modules/system/locallogin.te
@@ -1,4 +1,4 @@
-policy_module(locallogin, 1.21.2)
+policy_module(locallogin, 1.21.3)
########################################
#
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index 9ef509dc..abf62148 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -1,4 +1,4 @@
-policy_module(systemd, 1.10.11)
+policy_module(systemd, 1.10.12)
#########################################
#
@@ -731,7 +731,7 @@ allow systemd_machined_t self:process setfscreate;
allow systemd_machined_t self:unix_dgram_socket { connected_socket_perms
connect };
term_create_pty(systemd_machined_t, systemd_machined_devpts_t)
-allow systemd_machined_t systemd_machined_devpts_t:chr_file manage_file_perms;
+allow systemd_machined_t systemd_machined_devpts_t:chr_file
manage_chr_file_perms;
manage_files_pattern(systemd_machined_t, systemd_machined_runtime_t,
systemd_machined_runtime_t)
allow systemd_machined_t systemd_machined_runtime_t:lnk_file
manage_lnk_file_perms;