-
Thu Oct 01 2020 EL Errata <el-errata_ww@oracle.com> - 3.13.1-268.0.1
- Make cloud-init work with mls policy [Orabug: 31428176]
- Allow cloud-init to create /var/run/cloud-init dir with net_conf_t SELinux label. [Orabug: 31428176]
- Make various processes work with mls policy [Orabug: 29848756]
- Make unconfined domains part of domain_named_attribute [Orabug: 30700069]
- Make tuned work with mls policy [Orabug: 29778485]
- Make rpm_transition_script() a nested optional policy in init policy module [Orabug: 29661269]
- Allow cloud_init_t to dbus chat with systemd_logind_t [Orabug: 29399653]
- Add fs_relabel_pstore_dirs() interface. [Orabug: 28260775]
- Allow systemd running as init_t to relabel pstore directories. [Orabug: 28260775]
- Allow udev_t to load modules [Orabug: 28260775]
- Allow insmod_t to load modules BZ(1544189) [Orabug: 28260775]
- Allow chronyd_t to execute shell scripts [Orabug: 28260775]
- SELinux support for cgroup2 filesystem. [OraBug 28127822]
- refpolicy: Define getrlimit permission for class process [OraBug 28229492]
- Add vhost-scsi to be vhost_device_t type [OraBug 27774921]
- Obsolete docker-engine-selinux [OraBug 26439663]
- Fix container selinux policy [OraBug 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type.
-
Tue May 12 2020 Zdenek Pytela <zpytela@redhat.com> - 3.13.1-268
- Allow rhsmd read process state of all domains and kernel threads
Resolves: rhbz#1837461
- Allow ipa-adtrust-install restart sssd and dirsrv services
Resolves: rhbz#1820298
- Allow nagios_plugin_domain execute programs in bin directories
Resolves: rhbz#1824625
- selinux policy: add the right context for org.freeipa.server.trust-enable-agent
Related: rhbz#1820298
-
Mon Mar 23 2020 Zdenek Pytela <zpytela@redhat.com> - 3.13.1-267
- Allow chronyd_t domain to exec shell
Resolves: rhbz#1775573
- Allow pmie daemon to send signal pcmd daemon
Resolves: rhbz#1770123
- Allow auditd poweroff or switch to single mode
Resolves: rhbz#1780332
-
Wed Nov 06 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-266
- Dontaudit tmpreaper_t getting attributes from sysctl_type files
Resolves: rhbz#1765063
-
Thu Oct 31 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-265
- Allow tmpreaper_t domain to getattr files labeled as mtrr_device_t
Resolves: rhbz#1765063
-
Wed Oct 30 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-264
- Allow tmpwatch process labeled as tmpreaper_t domain to execute fuser command
Resolves: rhbz#1765063
-
Wed Oct 30 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-263
- Update tmpreaper_t policy due to fuser command
Resolves: rhbz#1765063
-
Fri Oct 25 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-262
- Allow tmpreaper_t domain to read all domains state
Resolves: rhbz#1765063
-
Mon Oct 14 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-261
- Update sudo_role_template() to allow caller domain to read syslog pid files
Resolves: rhbz#1651253
-
Fri Oct 11 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-260
- Allow sbd_t domain to check presence of processes labeled as cluster_t
Resolves: rhbz#1753623