-
Fri May 21 2021 John Mcwalters <john.mcwalters@oracle.com> - 3.14.3-67.0.1
- Allow systemd-pstore to transfer files from /sys/fs/pstore [Orabug: 31594666]
- Make smartd work with mls policy [Orabug: 32430379]
- Allow sysadm_t to mmap modules_object_t files [Orabug: 32411855]
- Allow tuned_t to execute systemd_systemctl_exec_t files [Orabug: 32355342]
- Make logrotate work with mls policy [Orabug: 32343731]
- Add interface kernel_relabelfrom_usermodehelper() [Orabug: 31396031]
- Allow systemd_tmpfiles_t domain to relabel from usermodehelper_t files [Orabug: 31396031]
- Make udev work with mls policy [Orabug: 31405299]
- Make tuned work with mls policy [Orabug: 31396024]
- Make lsmd, rngd, and kdumpctl work with mls policy [Orabug: 31405378]
- Allow virt_domain to mmap virt_content_t files [Orabug: 30932671] (Naoki Tanaka)
- Enable NetworkManager and dhclient to use initramfs-configured DHCP connection [Orabug: 30537515]
- Enable policykit and sssd policy modules with minimum policy [Orabug: 29744511] (Naoki Tanaka)
- Allow cloud_init_t to dbus chat with systemd_logind_t [Orabug: 29399653]
- Allow udev_t to load modules [Orabug: 28260775]
- Add vhost-scsi to be vhost_device_t type [Orabug: 27774921]
- Obsolete docker-engine-selinux [Orabug: 26439663]
- Fix container selinux policy [Orabug: 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type.
-
Mon Mar 15 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-67
- Allow systemd the audit_control capability conditionally
Resolves: rhbz#1861771
-
Thu Mar 04 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-66
- Disallow user_t run su/sudo and staff_t run su
Resolves: rhbz#1907517
-
Mon Feb 22 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-65
- Relabel /usr/sbin/charon-systemd as ipsec_exec_t
Resolves: rhbz#1889542
-
Wed Feb 17 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-64
- Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
Resolves: rhbz#1874527
Resolves: rhbz#1877044
- Allow rhsmcertd bind tcp sockets to a generic node
Resolves: rhbz#1923985
- Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
Resolves: rhbz#1889542
- Allow strongswan start using swanctl method
Resolves: rhbz#1889542
- Allow systemd-importd manage machines.lock file
Resolves: rhbz#1788055
-
Thu Feb 11 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-63
- Allow rtkit_daemon_t domain set process nice value in user namespaces
Resolves: rhbz#1910507
- Allow gpsd read and write ptp4l_t shared memory.
Resolves: rhbz#1803845
- Label /var/run/pcsd-ruby.socket socket with cluster_var_run_t type
Resolves: rhbz#1804626
- Allow Certmonger to use opencryptoki services
Resolves: rhbz#1894132
- Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
Resolves: rhbz#1815603
- Allow rhsmcertd_t read kpatch lib files
Resolves: rhbz#1895322
- Allow ipsec_t connectto ipsec_mgmt_t
Resolves: rhbz#1848355
- Allow IPsec to use opencryptoki services
Resolves: rhbz#1894132
- Allow systemd-importd create /run/systemd/machines.lock file
Resolves: rhbz#1788055
-
Fri Jan 29 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-62
- Allow rhsmcertd_t domain transition to kpatch_t
Resolves: rhbz#1895322
- Revert "Add kpatch_exec() interface"
Resolves: rhbz#1895322
- Revert "Allow rhsmcertd execute kpatch"
Resolves: rhbz#1895322
- Dontaudit NetworkManager_t domain to write to kdump temp pipies
Resolves: rhbz#1842897
- Allow NetworkManager_t domain to get status of samba services
Resolves: rhbz#1781806
- Allow openvswitch create and use xfrm netlink sockets
Resolves: rhbz#1916046
- Allow openvswitch_t perf_event write permission
Resolves: rhbz#1916046
- Add write_perf_event_perms object permission set
Related: rhbz#1916046
-
Wed Jan 27 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-61
- Add kpatch_exec() interface
Resolves: rhbz#1895322
- Allow rhsmcertd execute kpatch
Resolves: rhbz#1895322
- Allow openvswitch_t perf_event open permission
Resolves: rhbz#1916046
- Allow openvswitch fowner capability and create netlink sockets
Resolves: rhbz#1883980
- Add net_broadcast capability to openvswitch_t domain
Resolves: rhbz#1883980
- Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files
Resolves: rhbz#1883980
- Allow machinectl to run pull-tar
Resolves: rhbz#1788055
-
Wed Jan 13 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-60
- Allow wireshark create and use rdma socket
Resolves: rhbz#1844370
- Allow to use nnp_transition in pulseaudio_role
Resolves: rhbz#1854471
- Allow certmonger fsetid capability
Resolves: rhbz#1873211
- Add rsync_sys_admin tunable to allow rsync sys_admin capability
Resolves: rhbz#1889673
- Allow sysadm read and write /dev/rfkill
Resolves: rhbz#1831630
- Allow staff_u run pam_console_apply
Resolves: rhbz#1817690
- Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t
Resolves: rhbz#1907485
-
Thu Dec 17 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.3-59
- Add cron_dbus_chat_system_job() interface
Resolves: rhbz#1883906
- Dontaudit firewalld dac_override capability
Resolves: rhbz#1759010
- Allow tcsd the setgid capability
Resolves: rhbz#1898694
- Allow timedatex dbus chat with cron system domain
Resolves: rhbz#1883906
- Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain
Resolves: rhbz#1854299
- Allow pcp-pmcd manage perf_events
Resolves: rhbz#1901958
- Label /dev/isst_interface as cpu_device_t
Resolves: rhbz#1902227
- Allow ipsec set the context of a SPD entry to the default context
Resolves: rhbz#1880474
- Allow sysadm_u user and unconfined_domain_type manage perf_events
Resolves: rhbz#1901958
- Add manage_perf_event_perms object permissions set
Resolves: rhbz#1901958
- Add perf_event access vectors.
Resolves: rhbz#1901958
- Remove "ipa = module" from modules-targeted-contrib.conf
Resolves: rhbz#1461914