diff --git a/.gitignore b/.gitignore index 89a2be8..252408f 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ SOURCES/container-selinux.tgz -SOURCES/selinux-policy-b04459e.tar.gz -SOURCES/selinux-policy-contrib-4905735.tar.gz +SOURCES/selinux-policy-1aa8a0e.tar.gz +SOURCES/selinux-policy-contrib-4edd823.tar.gz diff --git a/.selinux-policy.metadata b/.selinux-policy.metadata index 67c8ec2..8750686 100644 --- a/.selinux-policy.metadata +++ b/.selinux-policy.metadata @@ -1,3 +1,3 @@ -62dd406a45062fab41689908ab54f35130a63457 SOURCES/container-selinux.tgz -2b0d94fccabf9e9344870e6a70cdc6913b99b391 SOURCES/selinux-policy-b04459e.tar.gz -a35b419525db1eb8d7215d114528598a948489af SOURCES/selinux-policy-contrib-4905735.tar.gz +816e9fafc89d3e15db6675cbda54f34b18b0e5f9 SOURCES/container-selinux.tgz +0965955a2b5f2c0e227f0cbafd2628b860d4728f SOURCES/selinux-policy-1aa8a0e.tar.gz +9066c165077809df6abfcbacf5da30a482e9b62d SOURCES/selinux-policy-contrib-4edd823.tar.gz diff --git a/SPECS/selinux-policy.spec b/SPECS/selinux-policy.spec index 24a430c..577629b 100644 --- a/SPECS/selinux-policy.spec +++ b/SPECS/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 b04459ea53bcc11159ed41f5a71c624da129b7b6 +%global commit0 1aa8a0e438335c2a5a26350c2dcb180447985f3f %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 4905735f7b6c3afe79fb9bf52e81cec3bc67bc6a +%global commit1 4edd823afd43e6e576de2a9f738e686ab485dcc8 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 112%{?dist} +Release: 113%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -717,6 +717,30 @@ exit 0 %endif %changelog +* Thu Dec 15 2022 Zdenek Pytela - 3.14.3-113 +- Allow systemd-socket-proxyd get attributes of cgroup filesystems +Resolves: rhbz#2088441 +- Allow systemd-socket-proxyd get filesystems attributes +Resolves: rhbz#2088441 +- Allow sysadm read ipmi devices +Resolves: rhbz#2148561 +- Allow system mail service read inherited certmonger runtime files +Resolves: rhbz#2143337 +- Add lpr_roles to system_r roles +Resolves: rhbz#2151111 +- Allow insights-client tcp connect to various ports +Resolves: rhbz#2151111 +- Allow insights-client work with pcp and manage user config files +Resolves: rhbz#2151111 +- Allow insights-client dbus chat with various services +Resolves: rhbz#2152867 +- Allow insights-client dbus chat with abrt +Resolves: rhbz#2152867 +- Allow redis get user names +Resolves: rhbz#2112228 +- Add winbind-rpcd to samba_enable_home_dirs boolean +Resolves: rhbz#2143696 + * Wed Nov 30 2022 Zdenek Pytela - 3.14.3-112 - Allow ipsec_t only read tpm devices Resolves: rhbz#2147380