179a4d9 * Mon Jan 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-44

Authored and Committed by lvrabec 4 years ago
    * Mon Jan 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-44
    - Fix typo in anaconda SELinux module
    - Allow rtkit_t domain  to control scheduling for your install_t processes
    - Boolean: rngd_t to use executable memory
    - Allow rngd_t domain to use nsswitch BZ(1787661)
    - Allow exim to execute bin_t without domain trans
    - Allow create udp sockets for abrt_upload_watch_t domains
    - Drop label zebra_t for frr binaries
    - Allow NetworkManager_t domain to get status of samba services
    - Update milter policy to allow use sendmail
    - Modify file context for .local directory to match exactly BZ(1637401)
    - Add new file context rabbitmq_conf_t.
    - Allow journalctl read init state BZ(1731753)
    - Add fprintd_read_var_lib_dir and fprintd_setattr_var_lib_dir interfaces
    - Allow pulseaudio create .config and dgram sendto to unpriv_userdomain
    - Change type in transition for /var/cache/{dnf,yum} directory
    - Allow cockpit_ws_t read efivarfs_t BZ(1777085)
    - Allow abrt_dump_oops_t domain to create udp sockets BZ(1778030)
    - Allow named_t domain to mmap named_zone_t files BZ(1647493)
    - Make boinc_var_lib_t label system mountdir attribute
    - Allow stratis_t domain to request load modules
    - Update fail2ban policy
    - Allow spamd_update_t access antivirus_unit_file_t BZ(1774092)
    - Allow uuidd_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
    - Allow rdisc_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
    - Allow init_t domain to create own socket files in /tmp
    - Allow ipsec_mgmt_t domain to mmap ipsec_conf_file_t files
    - Allow userdomain dbus chat with systemd_resolved_t
    - Allow init_t read and setattr on /var/lib/fprintd
    - Allow systemd_domain to map files in /usr.
    - Allow sysadm_t dbus chat with colord_t
    - Allow confined users run fwupdmgr
    - Allow confined users run machinectl
    - Allow systemd labeled as init_t domain to create dirs labeled as var_t
    - Allow systemd labeled as init_t do read/write tpm_device_t chr files BZ(1778079)
    
        
  • Build completed
    success
    Built as selinux-policy-3.14.4-44.fc31
    4 years ago
file modified
+2 -0
file modified
+39 -3
file modified
+3 -3