diff --git a/.gitignore b/.gitignore index 2c8f410..076559d 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-0d0cdeb.tar.gz -SOURCES/selinux-policy-contrib-e792d43.tar.gz +SOURCES/selinux-policy-contrib-ab25857.tar.gz +SOURCES/selinux-policy-f69f5fb.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index c3dc471..df2c38e 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -e1411242b32a49a25304222c69494e8260717d5f SOURCES/container-selinux.tgz -c03b757bcbbe87d2594ababc5e4f308e606eb5cb SOURCES/selinux-policy-0d0cdeb.tar.gz -ac5f3b3a42a97df721021ddf4636b295c7dd4c77 SOURCES/selinux-policy-contrib-e792d43.tar.gz +066551828329d6e9ef8d90c59c1189b349fcaac2 SOURCES/container-selinux.tgz +dd751906632af21c65978684ae2911c1e1bbdb18 SOURCES/selinux-policy-contrib-ab25857.tar.gz +f5117817ac06eb8eee7ed9f589166a89c4329ffd SOURCES/selinux-policy-f69f5fb.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index ea55676..76dfa16 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf +%global commit0 f69f5fbff260b71fa7c116d3253ae4f1d218dad4 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 e792d43860b96b60c4c17888670369702ee64eb2 +%global commit1 ab258574b9c3e3e3b0b4af6c5e50c2759b0daf3a %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 110%{?dist} +Release: 111%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,32 @@ exit 0 %endif %changelog +* Fri Nov 11 2022 Zdenek Pytela - 3.14.3-111 +- Add domain_unix_read_all_semaphores() interface +Resolves: rhbz#2141311 +- Allow iptables list cgroup directories +Resolves: rhbz#2134820 +- Allow systemd-hostnamed dbus chat with init scripts +Resolves: rhbz#2111632 +- Allow systemd to read symlinks in /var/lib +Resolves: rhbz#2118784 +- Allow insights-client domain transition on semanage execution +Resolves: rhbz#2141311 +- Allow insights-client create gluster log dir with a transition +Resolves: rhbz#2141311 +- Allow insights-client manage generic locks +Resolves: rhbz#2141311 +- Allow insights-client unix_read all domain semaphores +Resolves: rhbz#2141311 +- Allow winbind-rpcd use the terminal multiplexor +Resolves: rhbz#2107106 +- Allow mrtg send mails +Resolves: rhbz#2103675 +- Allow sssd dbus chat with system cronjobs +Resolves: rhbz#2132922 +- Allow postfix/smtp and postfix/virtual read kerberos key table +Resolves: rhbz#1983308 + * Thu Oct 20 2022 Zdenek Pytela - 3.14.3-110 - Add the systemd_connectto_socket_proxyd_unix_sockets() interface Resolves: rhbz#208441