-
Mon Jul 29 2019 EL Errata <el-errata_ww@oracle.com> - 3.13.1-229.0.4
- Make rpm_transition_script() a nested optional policy in init policy module [Orabug: 29661269]
- Allow cloud_init_t to dbus chat with systemd_logind_t [Orabug: 29399653]
- Add fs_relabel_pstore_dirs() interface. [Orabug: 28260775]
- Allow systemd running as init_t to relabel pstore directories. [Orabug: 28260775]
- Allow udev_t to load modules [Orabug: 28260775]
- Allow insmod_t to load modules BZ(1544189) [Orabug: 28260775]
- Allow chronyd_t to execute shell scripts [Orabug: 28260775]
- SELinux support for cgroup2 filesystem. [OraBug 28127822]
- refpolicy: Define getrlimit permission for class process [OraBug 28229492]
- Add vhost-scsi to be vhost_device_t type [OraBug 27774921]
- Obsolete docker-engine-selinux [OraBug 26439663]
- Fix container selinux policy [OraBug 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type.
-
Wed Jul 10 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.15
- Allow sbd_t domain to use nsswitch
Resolves: rhbz#1728592
-
Mon May 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.14
- Allow nrpe_t domain to read process state of systemd_logind_t
- Alow nrpe_t to send signull to sssd domain when nagios_run_sudo boolean is turned on
- Allow nrpe_t domain to be dbus cliennt
- Allow ngaios to use chown capability
Resolves: rhbz#1692893
-
Tue Apr 23 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.13
- Update Nagios policy when sudo is used
Resolves: rhbz#1692893
-
Tue Apr 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.12
- Allow modemmanager_t domain to write to raw_ip file labeled as sysfs_t
Resolves: rhbz#1697868
-
Tue Mar 26 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.11
- Update nagios_run_sudo boolean with few allow rules related to accessing sssd
Resolves: rhbz#1692893
-
Wed Mar 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.10
- Allow sudodomains to write to systemd_logind_sessions_t pipes.
Resolves: rhbz#1688224
-
Thu Jan 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.9
- Allow gssd_t domain to manage kernel keyrings of every domain.
Resolves: rhbz#1665815
- Add new interface domain_manage_all_domains_keyrings()
Resolves: rhbz#1665815
-
Mon Jan 14 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.8
- Add interface domain_rw_all_domains_keyrings()
Resolves: rhbz#1665815
- Allow gssd_t domain to read/write kernel keyrings of every domain.
Resolves: rhbz#1665815
-
Thu Dec 20 2018 Lukas Vrabec <lvrabec@redhat.com> - 3.13.1-229.7
- Update snapperd policy to allow snapperd manage all non security dirs.
Resolves: rhbz#1661158