diff --git a/selinux-policy.spec b/selinux-policy.spec index 8ca7aded..6b152c94 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,6 +1,6 @@ # github repo with selinux-policy sources %global giturl https://github.com/fedora-selinux/selinux-policy -%global commit cc594909ed91e01158de01b5d43673ba2e5c8967 +%global commit 446acdeadf4722bb0e559214e31ddbdb1970c71a %global shortcommit %(c=%{commit}; echo ${c:0:7}) %define distro redhat @@ -27,7 +27,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 38.1.53 -Release: 3%{?dist} +Release: 4%{?dist} License: GPLv2+ Source: %{giturl}/archive/%{commit}/%{name}-%{shortcommit}.tar.gz Source1: modules-targeted-base.conf @@ -906,6 +906,10 @@ exit 0 %endif %changelog +* Fri Mar 14 2025 Zdenek Pytela - 38.1.53-4 +- Allow afterburn to mount and read config drives +Resolves: RHEL-82276 + * Fri Feb 07 2025 Zdenek Pytela - 38.1.53-1 - Allow svirt_t to connect to nbdkit over a unix stream socket Resolves: RHEL-56029 diff --git a/sources b/sources index 8c5c7068..17a76647 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-cc59490.tar.gz) = be189db2a1328cc94e2a1cd8a2dbb22b827927d3631859ef566983eb3dc2d8dead8bc4f70845a853e1e72c8e7b810221a6bbd0fc510a64e03c4d0d4d8f83caff +SHA512 (selinux-policy-446acde.tar.gz) = 5953aa7bed49b0a57cca384e0bb7fbe4715f5ce8a0b5b148f5dcfbe9e1eee96e69c0f359fea3289392fae9de8ad925e8df5f2f165df91b60f2cf2d762de86787 SHA512 (macro-expander) = 243ee49f1185b78ac47e56ca9a3f3592f8975fab1a2401c0fcc7f88217be614fe31805bacec602b728e7fcfc21dcc17d90e9a54ce87f3a0c97624d9ad885aea4 -SHA512 (container-selinux.tgz) = f774e0f1a8ef83cd53869cddd583eab5b9703370ce793d765448ba936d09a7321350a593c6453fca640224216a3839eeeac388b6b821ba1294b6f97fb8a24f0a +SHA512 (container-selinux.tgz) = b1e9b5aef11421d6aa4e9002df2a7f3f3c25c99a9e2ecaff8ac85f0649595fcb0b7d248fe9156a7ae51b8ce42c48314cb1bca89560dd1d3f092c471b53b38882