From 5046539cb304ce88c7bc3b8ea6823220657037ca Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Oct 26 2022 10:08:44 +0000 Subject: import selinux-policy-3.14.3-110.el8 --- diff --git a/.gitignore b/.gitignore index 6322080..2c8f410 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-cc2eddb.tar.gz -SOURCES/selinux-policy-contrib-425f663.tar.gz +SOURCES/selinux-policy-0d0cdeb.tar.gz +SOURCES/selinux-policy-contrib-e792d43.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index 3bbdbf6..c3dc471 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -95220354bd89f8c0623f31873b33007620425091 SOURCES/container-selinux.tgz -822cb1f2d37032a6556891bbf749a652f2f8428a SOURCES/selinux-policy-cc2eddb.tar.gz -c3dbbf00ada862eaf2171a59963aef458ea908a0 SOURCES/selinux-policy-contrib-425f663.tar.gz +e1411242b32a49a25304222c69494e8260717d5f SOURCES/container-selinux.tgz +c03b757bcbbe87d2594ababc5e4f308e606eb5cb SOURCES/selinux-policy-0d0cdeb.tar.gz +ac5f3b3a42a97df721021ddf4636b295c7dd4c77 SOURCES/selinux-policy-contrib-e792d43.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 432ba02..ea55676 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 cc2eddb61e0f14acf9b54f19cfb0d157b3f6025b +%global commit0 0d0cdebcd0a3f596318d298842d0d1c10ae646cf %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 425f6638e4f6a8b26439fa838a6ddc3e4a85e535 +%global commit1 e792d43860b96b60c4c17888670369702ee64eb2 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 109%{?dist} +Release: 110%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,34 @@ exit 0 %endif %changelog +* Thu Oct 20 2022 Zdenek Pytela - 3.14.3-110 +- Add the systemd_connectto_socket_proxyd_unix_sockets() interface +Resolves: rhbz#208441 +- Add the dev_map_vhost() interface +Resolves: rhbz#2122920 +- Allow init remount all file_type filesystems +Resolves: rhbz#2122239 +- added policy for systemd-socket-proxyd +Resolves: rhbz#2088441 +- Allow virt_domain map vhost devices +Resolves: rhbz#2122920 +- Allow virt domains to access xserver devices +Resolves: rhbz#2122920 +- Allow rotatelogs read httpd_log_t symlinks +Resolves: rhbz#2030633 +- Allow vlock search the contents of the /dev/pts directory +Resolves: rhbz#2122838 +- Allow system cronjobs dbus chat with setroubleshoot +Resolves: rhbz#2125008 +- Allow ptp4l_t name_bind ptp_event_port_t +Resolves: rhbz#2130168 +- Allow pcp_domain execute its private memfd: objects +Resolves: rhbz#2090711 +- Allow samba-dcerpcd use NSCD services over a unix stream socket +Resolves: rhbz#2121709 +- Allow insights-client manage samba var dirs +Resolves: rhbz#2132230 + * Wed Oct 12 2022 Zdenek Pytela - 3.14.3-109 - Add the files_map_read_etc_files() interface Resolves: rhbz#2132230