diff --git a/selinux-policy.spec b/selinux-policy.spec index 4dbecdd..de1ed17 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 0b67d4d4f01428ebf80f2b695c970a27ed620b03 +%global commit 2c02f12752eadbdf8ac91e9e4ebe453300083e00 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 37.22 +Version: 37.23 Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -814,6 +814,11 @@ exit 0 %endif %changelog +* Tue Oct 17 2023 Zdenek Pytela - 37.23-1 +- Allow apcupsd cgi scripts read /sys +- Allow named and ndc the io_uring sqpoll permission +- Allow sssd io_uring sqpoll permission + * Thu Jun 29 2023 Zdenek Pytela - 37.22-1 - Allow exim read network sysctls - Allow kernel to manage its own BPF objects diff --git a/sources b/sources index 5af503b..6bf8556 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-0b67d4d.tar.gz) = a3a2ac8c7626dea9d1724cace75b3c7d884937680ebd9be2fa903e3aa4c7a181a7b98983a2890b88b48df41cf97a8d929a901fbde39edc9bf6a66d20ae4203a8 +SHA512 (selinux-policy-2c02f12.tar.gz) = 6bce912f3c9d6099503ae18d5591bece958bbdc9a09db4b3e124276bf7ae428924cb8c2ac9fa6ecbf02a469d17b3632c3f0f27818e66218d5f2126e840e0709f +SHA512 (container-selinux.tgz) = 0d04360f066686b51d15e43c0e3e52b320aa2f3be086abcf0020499ba02d0596408e25b73ef3d420190c94a65b1582d4461ecf09e6c9716dae19076c8c42b845 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 -SHA512 (container-selinux.tgz) = f1bde009aa6dc7f25c99e49aa47e5252d5b888f6b058fa69a7b4c1dbf47c22cdb87deedacf47d07302158d102635b02d43cf236cad04244b7844aa5e57b71e45