From bac7993408c913d8057ea3e684de49e46473c726 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Wed, 26 Oct 2022 10:09:34 +0000 Subject: [PATCH] Auto sync2gitlab import of selinux-policy-3.14.3-110.el8.src.rpm --- .gitignore | 2 ++ selinux-policy.spec | 34 +++++++++++++++++++++++++++++++--- sources | 6 +++--- 3 files changed, 36 insertions(+), 6 deletions(-) diff --git a/.gitignore b/.gitignore index 898bab2d..e73e2d70 100644 --- a/.gitignore +++ b/.gitignore @@ -17,3 +17,5 @@ /selinux-policy-contrib-f71a764.tar.gz /selinux-policy-cc2eddb.tar.gz /selinux-policy-contrib-425f663.tar.gz +/selinux-policy-0d0cdeb.tar.gz +/selinux-policy-contrib-e792d43.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index 432ba02d..ea556764 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 cc2eddb61e0f14acf9b54f19cfb0d157b3f6025b +%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 425f6638e4f6a8b26439fa838a6ddc3e4a85e535 +%global commit1 e792d43860b96b60c4c17888670369702ee64eb2 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 109%{?dist} +Release: 110%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,34 @@ exit 0 %endif %changelog +* Thu Oct 20 2022 Zdenek Pytela - 3.14.3-110 +- Add the systemd_connectto_socket_proxyd_unix_sockets() interface +Resolves: rhbz#208441 +- Add the dev_map_vhost() interface +Resolves: rhbz#2122920 +- Allow init remount all file_type filesystems +Resolves: rhbz#2122239 +- added policy for systemd-socket-proxyd +Resolves: rhbz#2088441 +- Allow virt_domain map vhost devices +Resolves: rhbz#2122920 +- Allow virt domains to access xserver devices +Resolves: rhbz#2122920 +- Allow rotatelogs read httpd_log_t symlinks +Resolves: rhbz#2030633 +- Allow vlock search the contents of the /dev/pts directory +Resolves: rhbz#2122838 +- Allow system cronjobs dbus chat with setroubleshoot +Resolves: rhbz#2125008 +- Allow ptp4l_t name_bind ptp_event_port_t +Resolves: rhbz#2130168 +- Allow pcp_domain execute its private memfd: objects +Resolves: rhbz#2090711 +- Allow samba-dcerpcd use NSCD services over a unix stream socket +Resolves: rhbz#2121709 +- Allow insights-client manage samba var dirs +Resolves: rhbz#2132230 + * Wed Oct 12 2022 Zdenek Pytela - 3.14.3-109 - Add the files_map_read_etc_files() interface Resolves: rhbz#2132230 diff --git a/sources b/sources index a8f6909e..abe48fa1 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (container-selinux.tgz) = cd8811d4da2cc44df6b4c9300f2889dcdb195c7a4c00a1a5b5d121a3fe1cf510e2e45b11234ff9b9484de074e49bdd79ddab2b306386eb1fc53da27274f042be -SHA512 (selinux-policy-cc2eddb.tar.gz) = 88d334c013bad284c5fa22df16ae0f259068435cf800f805e210e5ba61a740223a345c05fd7f0eaf8440d0ba4340166368a0cd99717a0ec00f26a7ab57d43349 -SHA512 (selinux-policy-contrib-425f663.tar.gz) = d11d22f399bb641fa5c1b864f688b3f88ac80372b7ab090499b90039186d4c5f4a7597fc908018e3138960ea6bdd6d40517914f790aa7da47ec03903f231ec99 +SHA512 (container-selinux.tgz) = 33c882a9392490bdca6a111eebc3b0e624ac7a38beb3ce461586963ae6bf01f177dafc5d0ddb24bc0aaf2632af3da62f0b1d1f1dbcae72e863ddb4df74c6164c +SHA512 (selinux-policy-0d0cdeb.tar.gz) = 8bb03ee107a1d1909b8abb984a1f8dfbccfca5a92b2fa2f46a9cd8ca4249b13dfb6e7027c9124dc8e4229040338ddcaa110b45a45cbca8bb9152f9b566e826aa +SHA512 (selinux-policy-contrib-e792d43.tar.gz) = 2344432c1a4aa576d6ba184b56a95542e22214207bd95055bd0dc7f882c43e74aac45365102ea105e3802a9b966827527c5a52ad64ccd31328a26f0bfb515afc