From 66163acd0f446414f3483f983920bd22f331f0ee Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Sat, 2 Jul 2022 00:14:29 +0000 Subject: [PATCH] Auto sync2gitlab import of selinux-policy-3.14.3-104.el8.src.rpm --- .gitignore | 2 ++ selinux-policy.spec | 70 +++++++++++++++++++++++++++++++++++++++++++-- sources | 6 ++-- 3 files changed, 72 insertions(+), 6 deletions(-) diff --git a/.gitignore b/.gitignore index fd114894..fdea16a2 100644 --- a/.gitignore +++ b/.gitignore @@ -7,3 +7,5 @@ /selinux-policy-contrib-da7635b.tar.gz /selinux-policy-contrib-b92279d.tar.gz /selinux-policy-f97682b.tar.gz +/selinux-policy-contrib-cd13e4d.tar.gz +/selinux-policy-e0a8ee2.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index 0cae2bbe..ba00ff75 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 f97682b8264c69161490df4cc7d12f03fa7f700b +%global commit0 e0a8ee21365132c1f4668c975670621c889c5e35 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 b92279d8e140758a2f2fbcd85bd4731fee44f194 +%global commit1 cd13e4d375d95fcb472eec6692f7b1b372f4e804 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 100%{?dist} +Release: 104%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,70 @@ exit 0 %endif %changelog +* Tue Jun 28 2022 Zdenek Pytela - 3.14.3-104 +- Update samba-dcerpcd policy for kerberos usage 2 +Resolves: rhbz#2096825 + +* Mon Jun 27 2022 Zdenek Pytela - 3.14.3-103 +- Allow domain read usermodehelper state information +Resolves: rhbz#2083504 +- Remove all kernel_read_usermodehelper_state() interface calls +Resolves: rhbz#2083504 +- Allow samba-dcerpcd work with sssd +Resolves: rhbz#2096825 +- Allow winbind_rpcd_t connect to self over a unix_stream_socket +Resolves: rhbz#2096825 +- Update samba-dcerpcd policy for kerberos usage +Resolves: rhbz#2096825 +- Allow keepalived read the contents of the sysfs filesystem +Resolves: rhbz#2098189 +- Update policy for samba-dcerpcd +Resolves: rhbz#2083504 +- Remove all kernel_read_usermodehelper_state() interface calls 2/2 +Resolves: rhbz#2083504 +- Update insights_client_filetrans_named_content() +Resolves: rhbz#2091117 + +* Wed Jun 22 2022 Zdenek Pytela - 3.14.3-102 +- Allow transition to insights_client named content +Resolves: rhbz#2091117 +- Add the insights_client_filetrans_named_content() interface +Resolves: rhbz#2091117 +- Update policy for insights-client to run additional commands 3 +Resolves: rhbz#2091117 + +* Fri Jun 17 2022 Zdenek Pytela - 3.14.3-101 +- Add the init_status_config_transient_files() interface +Resolves: rhbz#2091117 +- Allow init_t to rw insights_client unnamed pipe +Resolves: rhbz#2091117 +- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling +Resolves: rhbz#2091117 +- Allow insights-client get status of the systemd transient scripts +Resolves: rhbz#2091117 +- Allow insights-client execute its private memfd: objects +Resolves: rhbz#2091117 +- Update policy for insights-client to run additional commands 2 +Resolves: rhbz#2091117 +- Do not call systemd_userdbd_stream_connect() for insights-client +Resolves: rhbz#2091117 +- Use insights_client_tmp_t instead of insights_client_var_tmp_t +Resolves: rhbz#2091117 +- Change space indentation to tab in insights-client +Resolves: rhbz#2091117 +- Use socket permissions sets in insights-client +Resolves: rhbz#2091117 +- Update policy for insights-client to run additional commands +Resolves: rhbz#2091117 +- Change rpm_setattr_db_files() to use a pattern +Resolves: rhbz#2091117 +- Add rpm setattr db files macro +Resolves: rhbz#2091117 +- Fix insights client +Resolves: rhbz#2091117 +- Do not let system_cronjob_t create redhat-access-insights.log with var_log_t +Resolves: rhbz#2091117 + * Tue Jun 07 2022 Zdenek Pytela - 3.14.3-100 - Update logging_create_generic_logs() to use create_files_pattern() Resolves: rhbz#2081907 diff --git a/sources b/sources index 362437bf..f642916f 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (container-selinux.tgz) = 816f9ad8246db0c2434994bf49436384a4e2f616e1cc4fe40d8bae48c7d3017620cc6d322f68b80e4185288f88d439c76ef453a5ac0e8679d8a01c07e7c604b0 -SHA512 (selinux-policy-contrib-b92279d.tar.gz) = 111fe20064442d3f0b303d02211a00c527dbec3799e1a853ba89262a6b2676bd3588d5eb00bf458b83cd1e79863385b0fbedea3b7cd532f7e4cb91be464a6194 -SHA512 (selinux-policy-f97682b.tar.gz) = 02f6ead886bf8078a8a32620453cf16f62c6f81d22037b33a1f2ebd95f5ae8b30dc468451d605a2ad09e071c6b7809e445d361b4266232e0e3269f4b4f8c65d7 +SHA512 (container-selinux.tgz) = 34490ac22c515c5fd6bae8eb24e4e1044ac09f8dccdf8e338c9bbf2d5f04795723ef8cf5e30ae6990c15248068a5d2f36afca662a11681f04ece9f420375f86d +SHA512 (selinux-policy-contrib-cd13e4d.tar.gz) = 1c0069c19dc8e299a578d326eae8c5f83700de1957b41a9d71d99a22333c7b7e5bd05ac01689448ce6feebc8bd9bb538bc1db87928722e59ebd6a1c797aaec22 +SHA512 (selinux-policy-e0a8ee2.tar.gz) = 1e5ab4577d4a47a418473a7be453737310651413b18ae264101f5294f8e5182fd3afe145bd46e39659857aaacc9f1407c2be168621a23df70352ae234a3e96cd