-
Wed Aug 24 2022 EL Errata <el-errata_ww@oracle.com> - 34.1.29-1.0.4
- Add the corecmd_watch_bin_dirs() interface [Orabug: 34322059]
- Allow rpm_t sys_admin capability [Orabug: 34250651]
- Revert "Dontaudit domain the fowner capability" [Orabug: 33952489]
- Make systemd_tmpfiles_t MLS trusted for lowering the level of files [Orabug: 33841245]
- Allow nfsd_t to list exports_t dirs [Orabug: 33844301]
- Allow fsadm_t to get attributes of cgroup filesystems [Orabug: 33841268]
- Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t [Orabug: 33841205]
- Allow udev to watch fixed disk devices [Orabug: 33841093]
- Allow administrative users the bpf capability [Orabug: 33803450]
- Allow tuned_t to read the process state of all domains [Orabug: 33520684]
- Allow initrc_t to manage pid files used by chronyd [Orabug: 33520623]
- Make import-state work with mls policy [Orabug: 32636699]
- Add map permission to lvm_t on lvm_metadata_t. [Orabug: 31405325]
- Add comment for map on lvm_metadata_t. [Orabug: 31405325]
- Make iscsiadm work with mls policy [Orabug: 32725411]
- Make cloud-init work with mls policy [Orabug: 32430460]
- Allow systemd-pstore to transfer files from /sys/fs/pstore [Orabug: 31594666]
- Make smartd work with mls policy [Orabug: 32430379]
- Allow sysadm_t to mmap modules_object_t files [Orabug: 32411855]
- Allow tuned_t to execute systemd_systemctl_exec_t files [Orabug: 32355342]
- Make logrotate work with mls policy [Orabug: 32343731]
- Make udev work with mls policy [Orabug: 31405299]
- Make tuned work with mls policy [Orabug: 31396024]
- Make lsmd, rngd, and kdumpctl work with mls policy [Orabug: 31405378]
- Allow virt_domain to mmap virt_content_t files [Orabug: 30932671]
- Enable NetworkManager and dhclient to use initramfs-configured DHCP connection [Orabug: 30537515]
- Enable policykit and sssd policy modules with minimum policy [Orabug: 29744511]
- Allow cloud_init_t to dbus chat with systemd_logind_t [Orabug: 29399653]
- Allow udev_t to load modules [Orabug: 28260775]
- Add vhost-scsi to be vhost_device_t type [Orabug: 27774921]
- Fix container selinux policy [Orabug: 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type. [Orabug: 13333429]
-
Thu Aug 04 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.29-1.2
- Allow insights-client rpm named file transitions
Resolves: rhbz#2106147
- Add /var/tmp/insights-archive to insights_client_filetrans_named_content
Resolves: rhbz#2106147
- Use insights_client_filetrans_named_content
Resolves: rhbz#2106147
- Make default file context match with named transitions
Resolves: rhbz#2106147
- Allow rhsmcertd to read insights config files
Resolves: rhbz#2106147
- Label /etc/insights-client/machine-id
Resolves: rhbz#2106147
- Use insights_client_etc_t in insights_search_config()
Resolves: rhbz#2106147
- Add the insights_search_config() interface
Resolves: rhbz#2106147
-
Wed Jul 13 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.29-1.1
- Update insights_client_filetrans_named_content()
Resolves: rhbz#2106147
- Allow transition to insights_client named content
Resolves: rhbz#2106147
- Add the insights_client_filetrans_named_content() interface
Resolves: rhbz#2106147
- Update policy for insights-client to run additional commands 3
Resolves: rhbz#2106147
- Allow insights-client execute its private memfd: objects
Resolves: rhbz#2106147
- Update policy for insights-client to run additional commands 2
Resolves: rhbz#2106147
- Use insights_client_tmp_t instead of insights_client_var_tmp_t
Resolves: rhbz#2106147
- Change space indentation to tab in insights-client
Resolves: rhbz#2106147
- Use socket permissions sets in insights-client
Resolves: rhbz#2106147
- Update policy for insights-client to run additional commands
Resolves: rhbz#2106147
- Allow init_t to rw insights_client unnamed pipe
Resolves: rhbz#2106147
- Change rpm_setattr_db_files() to use a pattern
Resolves: rhbz#2106147
- Add rpm setattr db files macro
Resolves: rhbz#2106147
- Fix insights client
Resolves: rhbz#2106147
- Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling
Resolves: rhbz#2106147
- Label /var/cache/insights with insights_client_cache_t
Resolves: rhbz#2106147
- Allow insights-client manage gpg admin home content
Resolves: rhbz#2106147
- Add the gpg_manage_admin_home_content() interface
Resolves: rhbz#2106147
- Allow insights-client create and use unix_dgram_socket
Resolves: rhbz#2106147
- Allow insights-client search gconf homedir
Resolves: rhbz#2106147
- Allow insights-client create_socket_perms for tcp/udp sockets
Resolves: rhbz#2106147
- Allow insights-client read rhnsd config files
Resolves: rhbz#2106147
-
Thu Mar 31 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.29-1
- Allow qemu-kvm create and use netlink rdma sockets
Resolves: rhbz#2063612
- Label corosync-cfgtool with cluster_exec_t
Resolves: rhbz#2061277
-
Thu Mar 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.28-1
- Allow logrotate a domain transition to cluster administrative domain
Resolves: rhbz#2061277
- Change the selinuxuser_execstack boolean value to true
Resolves: rhbz#2064274
-
Thu Feb 24 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.27-1
- Allow ModemManager connect to the unconfined user domain
Resolves: rhbz#2000196
- Label /dev/wwan.+ with modem_manager_t
Resolves: rhbz#2000196
- Allow systemd-coredump userns capabilities and root mounton
Resolves: rhbz#2057435
- Allow systemd-coredump read and write usermodehelper state
Resolves: rhbz#2057435
- Allow sysadm_passwd_t to relabel passwd and group files
Resolves: rhbz#2053458
- Allow systemd-sysctl read the security state information
Resolves: rhbz#2056999
- Remove unnecessary /etc file transitions for insights-client
Resolves: rhbz#2055823
- Label all content in /var/lib/insights with insights_client_var_lib_t
Resolves: rhbz#2055823
- Update insights-client policy
Resolves: rhbz#2055823
- Update insights-client: fc pattern, motd, writing to etc
Resolves: rhbz#2055823
- Update specfile to buildrequire policycoreutils-devel >= 3.3-5
- Add modules_checksum to %files
-
Thu Feb 17 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.26-1
- Remove permissive domain for insights_client_t
Resolves: rhbz#2055823
- New policy for insight-client
Resolves: rhbz#2055823
- Allow confined sysadmin to use tool vipw
Resolves: rhbz#2053458
- Allow chage domtrans to sssd
Resolves: rhbz#2054657
- Remove label for /usr/sbin/bgpd
Resolves: rhbz#2055578
- Dontaudit pkcsslotd sys_admin capability
Resolves: rhbz#2055639
- Do not change selinuxuser_execmod and selinuxuser_execstack
Resolves: rhbz#2055822
- Allow tuned to read rhsmcertd config files
Resolves: rhbz#2055823
-
Mon Feb 14 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.25-1
- Allow systemd watch unallocated ttys
Resolves: rhbz#2054150
- Allow alsa bind mixer controls to led triggers
Resolves: rhbz#2049732
- Allow alsactl set group Process ID of a process
Resolves: rhbz#2049732
- Allow unconfined to run virtd bpf
Resolves: rhbz#2033504
-
Fri Feb 04 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.24-1
- Allow tumblerd write to session_dbusd tmp socket files
Resolves: rhbz#2000039
- Allow login_userdomain write to session_dbusd tmp socket files
Resolves: rhbz#2000039
- Allow login_userdomain create session_dbusd tmp socket files
Resolves: rhbz#2000039
- Allow gkeyringd_domain write to session_dbusd tmp socket files
Resolves: rhbz#2000039
- Allow systemd-logind delete session_dbusd tmp socket files
Resolves: rhbz#2000039
- Allow gdm-x-session write to session dbus tmp sock files
Resolves: rhbz#2000039
- Allow sysadm_t nnp_domtrans to systemd_tmpfiles_t
Resolves: rhbz#2039453
- Label exFAT utilities at /usr/sbin
Resolves: rhbz#1972225
-
Wed Feb 02 2022 Zdenek Pytela <zpytela@redhat.com> - 34.1.23-1
- Allow systemd nnp_transition to login_userdomain
Resolves: rhbz#2039453
- Label /var/run/user/%{USERID}/dbus with session_dbusd_tmp_t
Resolves: rhbz#2000039
- Change /run/user/[0-9]+ to /run/user/%{USERID} for proper labeling
Resolves: rhbz#2000039
- Allow scripts to enter LUKS password
Resolves: rhbz#2048521
- Allow system_mail_t read inherited apache system content rw files
Resolves: rhbz#2049372
- Add apache_read_inherited_sys_content_rw_files() interface
Related: rhbz#2049372
- Allow sanlock get attributes of filesystems with extended attributes
Resolves: rhbz#2047811
- Associate stratisd_data_t with device filesystem
Resolves: rhbz#2039974
- Allow init read stratis data symlinks
Resolves: rhbz#2039974
- Label /run/stratisd with stratisd_var_run_t
Resolves: rhbz#2039974
- Allow domtrans to sssd_t and role access to sssd
Resolves: rhbz#2039757
- Creating interface sssd_run_sssd()
Resolves: rhbz#2039757
- Fix badly indented used interfaces
Resolves: rhbz#2039757
- Allow domain transition to sssd_t
Resolves: rhbz#2039757
- Label /dev/nvme-fabrics with fixed_disk_device_t
Resolves: rhbz#2039759
- Allow local_login_t nnp_transition to login_userdomain
Resolves: rhbz#2039453
- Allow xdm_t nnp_transition to login_userdomain
Resolves: rhbz#2039453
- Make cupsd_lpd_t a daemon
Resolves: rhbz#2039449
- Label utilities for exFAT filesystems with fsadm_exec_t
Resolves: rhbz#1972225
- Dontaudit sfcbd sys_ptrace cap_userns
Resolves: rhbz#2040311