9fad02a * Wed Jul 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-24

Authored and Committed by lvrabec 4 years ago
    * Wed Jul 17 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.4-24
    - Label user cron spool file with user_cron_spool_t
    - Update gnome_role_template() template to allow sysadm_t confined user to login to xsession
    - Allow lograte_t domain to manage collect_rw_content files and dirs
    - Add interface collectd_manage_rw_content()
    - Allow systemd_hostnamed_t domain to dbus chat with sosreport_t domain
    - Update  tomcat_can_network_connect_db boolean to allow tomcat domains also connect to redis ports
    - Allow mysqld_t domain to manage cluster pid files
    - Relabel  /usr/sbin/virtlockd from virt_exec_t to virtlogd_exec_t.
    - Allow ptp4l_t domain to write to pmc socket which is created by pmc command line tool
    - Allow dkim-milter to send e-mails BZ(1716937)
    - Update spamassasin policy to make working /usr/share/spamassassin/sa-update.cron script BZ(1711799)
    - Update svnserve_t policy to make working svnserve hooks
    - Allow varnishlog_t domain to check for presence of varnishd_t domains
    - Update sandboxX policy to make working firefox inside SELinux sandbox
    - Remove allow rule from svirt_transition_svirt_sandbox interface to don't allow containers to connect to random services
    - Allow httpd_t domain to read /var/lib/softhsm/tokens to allow httpd daemon to use pkcs#11 devices
    - Allow gssd_t domain to list tmpfs_t dirs
    - Allow mdadm_t domain to read tmpfs_t files
    - Allow sbd_t domain to check presence of processes labeled as cluster_t
    - Dontaudit httpd_sys_script_t to read systemd unit files
    - Allow blkmapd_t domain to read nvme devices
    - Update cpucontrol_t domain to make working microcode service
    - Allow domain transition from logwatch_t do postfix_postqueue_t
    - Allow chronyc_t domain to create and write to non_security files in case when sysadmin is redirecting output to file e.g: 'chronyc -n tracking > /var/lib/test'
    - Allow httpd_sys_script_t domain to mmap httpcontent
    - Allow sbd_t to manage cgroups_t files
    - Update wireshark policy to make working tshar labeled as wireshark_t
    - Update virt_use_nfs boolean to allow svirt_t domain to mmap nfs_t files
    - Allow sysadm_t domain to create netlink selinux sockets
    - Make cgdcbxd active in Fedora upstream sources
    - Allow sysadm_t domain to dbus chat with rtkit daemon
    - Allow x_userdomains to nnp domain transition to thumb_t domain
    - Allow unconfined_domain_type to setattr own process lnk files.
    - Add interface files_write_generic_pid_sockets()
    - Dontaudit writing to user home dirs by gnome-keyring-daemon
    - Allow staff and admin domains to setpcap in user namespace
    - Allow staff and sysadm to use lockdev
    - Allow staff and sysadm users to run iotop.
    - Dontaudit traceroute_t domain require sys_admin capability
    - Dontaudit dbus chat between kernel_t and init_t
    - Allow systemd labeled as init_t to create mountpoints without any specific label as default_t
    
        
  • Build completed
    success
    Built as selinux-policy-3.14.4-24.fc31
    4 years ago
file modified
+2 -0
file modified
+46 -3
file modified
+4 -4