diff --git a/.gitignore b/.gitignore index 47fda6f..dbaa3cc 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-b422cb9.tar.gz -SOURCES/selinux-policy-contrib-5fa0471.tar.gz +SOURCES/selinux-policy-48e6bd1.tar.gz +SOURCES/selinux-policy-contrib-64f9284.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index efce996..4f0b760 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -c0b044a86a0e15563d7fe89e29e9a561225d04d1 SOURCES/container-selinux.tgz -8134360c1345ffa270e1e74547a483e11c2eb5d7 SOURCES/selinux-policy-b422cb9.tar.gz -de04b70b22842d36b95fa2df21ef538dede5e749 SOURCES/selinux-policy-contrib-5fa0471.tar.gz +7861115fabe379f0a365e06caad014a257053acd SOURCES/container-selinux.tgz +a4874ef1ad40b411afbf8f7b60cb5743c25f9dfc SOURCES/selinux-policy-48e6bd1.tar.gz +6fa7fbf2c20d63c28739da34c2548335f8bfcae5 SOURCES/selinux-policy-contrib-64f9284.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 28cc7f9..823640b 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 b422cb99c935d1409cccb7448fdad92ff08cb0a6 +%global commit0 48e6bd17b23e4dc87167a0060965fe8e0fadae4f %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 5fa0471a9428d7dbd65139e3f85e66e81f4aa27c +%global commit1 64f9284bc5c3b2ad3e9e56fac9f2daf8da75b58f %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 77%{?dist} +Release: 78%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -715,6 +715,24 @@ exit 0 %endif %changelog +* Wed Aug 25 2021 Zdenek Pytela - 3.14.3-78 +- Label /usr/bin/Xwayland with xserver_exec_t +Resolves: rhbz#1984584 +- Label /usr/libexec/gdm-runtime-config with xdm_exec_t +Resolves: rhbz#1984584 +- Allow D-bus communication between avahi and sosreport +Resolves: rhbz#1916397 +- Allow lldpad send to kdumpctl over a unix dgram socket +Resolves: rhbz#1979121 +- Revert "Allow lldpad send to kdump over a unix dgram socket" +Resolves: rhbz#1979121 +- Allow chronyc respond to a user chronyd instance +Resolves: rhbz#1993104 +- Allow ptp4l respond to pmc +Resolves: rhbz#1993104 +- Allow lldpad send to unconfined_t over a unix dgram socket +Resolves: rhbz#1993270 + * Thu Aug 12 2021 Zdenek Pytela - 3.14.3-77 - Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory" Resolves: rhbz#1887739