diff --git a/selinux-policy.spec b/selinux-policy.spec index 86a6da01..028c77c1 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit d1f3f7d9fe7f0759f7f2a3f721616aa211b27274 +%global commit 4adaa46d178368a83c2ada45d7da6f0f98dd8dc4 %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -23,7 +23,7 @@ %define CHECKPOLICYVER 3.2 Summary: SELinux policy configuration Name: selinux-policy -Version: 38.1.33 +Version: 38.1.34 Release: 1%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz @@ -809,6 +809,12 @@ exit 0 %endif %changelog +* Fri Mar 08 2024 Zdenek Pytela - 38.1.34-1 +- Allow wdmd list the contents of the sysfs directories +Resolves: RHEL-26663 +- Allow linuxptp configure phc2sys and chronyd over a unix domain socket +Resolves: RHEL-26660 + * Thu Feb 22 2024 Juraj Marcin - 38.1.33-1 - Allow thumb_t to watch and watch_reads mount_var_run_t Resolves: RHEL-26073 diff --git a/sources b/sources index 7c325615..54b89def 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-d1f3f7d.tar.gz) = 8fbc99747a9fbda5d38b2ab78811a5d759bee8bc69c3af03f276e2e1d546c68af30cba3fdba176f45b51ed5f934af988ef811ff26616e5867d61ea13e587a71c -SHA512 (container-selinux.tgz) = 2fa4ae4cc1cae213c7ae2352d4bcd5f1bebaf9e3eb0d681a774f2060c48a0b820cd1bf06cad2001092bee927014101e66391d6e471de637e041e29ed9a23af99 +SHA512 (selinux-policy-4adaa46.tar.gz) = fb7995f7aacbae053fbf28f20b04c95ed4a289f9e4606ec8396276086a062fbd594c84cd914cdd2ed75083f47ad36f086fce6aa042225dc497223aec82fb9b5c SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 +SHA512 (container-selinux.tgz) = 9dbac467c4e1a9c1f9b6cbf210dc5bbac9a0506058bf1676ff8de0f6686937832ddabeb4e89b819a7f2a6d03a012cca7d2569fee0b2f0c331f10a153bd28110d