diff --git a/.gitignore b/.gitignore index 1e4fce9..d75e5f2 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-8d1a96d.tar.gz -SOURCES/selinux-policy-contrib-f3211b5.tar.gz +SOURCES/selinux-policy-contrib-e3c03e4.tar.gz +SOURCES/selinux-policy-effdd23.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index 1174075..9ddbe72 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -06478bf63e74d423c31bb0c53edf719f7df63ddc SOURCES/container-selinux.tgz -832cd73e46beab5d8046c7b3a5754c645edd1634 SOURCES/selinux-policy-8d1a96d.tar.gz -eb1855b018df25e33ef7234048c32acc58d4df0b SOURCES/selinux-policy-contrib-f3211b5.tar.gz +01b31e9eb4c0533c3d3fd038491019bf5d3106b1 SOURCES/container-selinux.tgz +1e4cb4ec9efe860b79c3f808c2e924ba097e782d SOURCES/selinux-policy-contrib-e3c03e4.tar.gz +69e55f852e33da3fa5c0d70114c6f914fc045c12 SOURCES/selinux-policy-effdd23.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 186c4cd..3fc693a 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 8d1a96d5f0e72ebf7a3f5f5930db644af91e4abe +%global commit0 effdd23f8748163ce2be792f03a388847b14dcfd %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 f3211b540925d040fb1d21b4ff33ea65119169a6 +%global commit1 e3c03e4dc77565c5377765b4ec52c17197e4a1f4 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 56%{?dist} +Release: 57%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -715,6 +715,24 @@ exit 0 %endif %changelog +* Tue Nov 24 2020 Zdenek Pytela - 3.14.3-57 +- Allow dovecot bind to smtp ports +Resolves: rhbz#1881884 +- Change fetchmail temporary files path to /var/spool/mail +Resolves: rhbz#1853389 +- Set file context for symlinks in /etc/httpd to etc_t +Resolves: rhbz#1900650 +- Allow dnsmasq read public files +Resolves: rhbz#1782539 +- Fix range for unreserved ports +Resolves: rhbz#1794531 +- Introduce logging_syslogd_append_public_content tunable +Resolves: rhbz#1823672 +- Add files_search_non_security_dirs() interface +Resolves: rhbz#1823672 +- Add miscfiles_append_public_files() interface +Resolves: rhbz#1823672 + * Thu Nov 12 2020 Zdenek Pytela - 3.14.3-56 - Let keepalived bind a raw socket Resolves: rhbz#1895130