diff --git a/selinux-policy.spec b/selinux-policy.spec index 50f6288c..3745c195 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit 750db5ab9d7e074156b1daf8e2a8ecd5facc3d9b +%global commit 83462dd1d02e34be7a2469f2e974cdf703460969 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 40.13.1 +Version: 40.13.2 Release: 1%{?dist} License: GPL-2.0-or-later Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -860,6 +860,14 @@ exit 0 %endif %changelog +* Fri Jun 07 2024 Zdenek Pytela - 40.13.2-1 +- Allow all domains read and write z90crypt device +Resolves: RHEL-28539 +- Allow dhcpc read /run/netns files +Resolves: RHEL-39510 +- Allow bootupd search efivarfs dirs +Resolves: RHEL-39514 + * Fri May 17 2024 Zdenek Pytela - 40.13.1-1 - Allow logwatch read logind sessions files Resolves: RHEL-30441 diff --git a/sources b/sources index f5b9dd12..909e6e49 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-750db5a.tar.gz) = f6d0711b2789380c5daa05007f4408eff8e03f21b56791bd54228e14841a7898ff5836502d36743b754452409434fab6ce051f134b9b5fbaf777fc794c081ee0 +SHA512 (selinux-policy-83462dd.tar.gz) = c12577dba9fad104884b5c35c488b22bde98919770e363fa8bcd146261a717aa1888e03ac1cd3ceb8fde7ebdc30403dee399725e595e6b3424a950ae4ab886b9 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 -SHA512 (container-selinux.tgz) = bc713e3461d31f85f3fe8ad8ca9813ce1742b0bf0f0eb8712633558140f65bd765c3ce744646234925c34b4c1413f555e66f5f38636ad5b5b7cc5f1967ab4488 +SHA512 (container-selinux.tgz) = f943d72e16b14e374cc6e46e2abeefe64f2558fdd217195a5f3a6e243ec72fc2526a90c80a30bdced8adcb4219addea72979c3d75aa1610a2e7b36220c323fdf