ELBA-2023-1568

ELBA-2023-1568 - selinux-policy bug fix and enhancement update

Type:BUG
Severity:NA
Release Date:2023-04-05

Description


[3.14.3-108.0.3]
- Label /var/log/kdump.log with kdump_log_t [Orabug: 32911792]
- Allow tuned_t to manage information from the debugging filesystem [Orabug: 34685730]
- Allow kdumpctl_t to execmem [Orabug: 34712872]
- Allow svirt_t domain to mmap svirt_image_t character files [Orabug: 34314421]
- Allow tuned_t to read the process state of all domains [Orabug: 33520684]
- Allow initrc_t to manage pid files used by chronyd [Orabug: 33520623]
- Make import-state work with mls policy [Orabug: 32636699]
- Add map permission to lvm_t on lvm_metadata_t. [Orabug: 31405325]
- Add comment for map on lvm_metadata_t. [Orabug: 31405325]
- Add file context for /var/run/fsck [Orabug: 32789338]
- Make iscsiadm work with mls policy [Orabug: 32725411]
- Make cloud-init work with mls policy [Orabug: 32430460]
- Allow systemd-pstore to transfer files from /sys/fs/pstore [Orabug: 31594666]
- Make smartd work with mls policy [Orabug: 32430379]
- Allow sysadm_t to mmap modules_object_t files [Orabug: 32411855]
- Allow tuned_t to execute systemd_systemctl_exec_t files [Orabug: 32355342]
- Make logrotate work with mls policy [Orabug: 32343731]
- Add interface kernel_relabelfrom_usermodehelper() [Orabug: 31396031]
- Allow systemd_tmpfiles_t domain to relabel from usermodehelper_t files [Orabug: 31396031]
- Make udev work with mls policy [Orabug: 31405299]
- Make tuned work with mls policy [Orabug: 31396024]
- Make lsmd, rngd, and kdumpctl work with mls policy [Orabug: 31405378]
- Allow virt_domain to mmap virt_content_t files [Orabug: 30932671]
- Enable NetworkManager and dhclient to use initramfs-configured DHCP connection [Orabug: 30537515]
- Enable policykit and sssd policy modules with minimum policy [Orabug: 29744511]
- Allow udev_t to load modules [Orabug: 28260775]
- Add vhost-scsi to be vhost_device_t type [Orabug: 27774921]
- Fix container selinux policy [Orabug: 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type. [Orabug: 13333429]

[3.14.3-108.2]
- Add domain_unix_read_all_semaphores() interface
Resolves: rhbz#2170510
- Add interfaces in domain, files, and unconfined modules
Resolves: rhbz#2170510
- Allow insights-client manage fsadm pid files
Resolves: rhbz#2170510
- Allow insights-client work with su and lpstat
Resolves: rhbz#2170510
- Allow insights-client read nvme devices
Resolves: rhbz#2170510
- Allow insights-client tcp connect to all ports
Resolves: rhbz#2170510
- Add insights additional capabilities
Resolves: rhbz#2170510
- Allow insights client work with gluster and pcp
Resolves: rhbz#2170510
- Allow insights-client tcp connect to various ports
Resolves: rhbz#2170510
- Allow insights-client work with pcp and manage user config files
Resolves: rhbz#2170510
- Allow insights-client dbus chat with various services
Resolves: rhbz#2170510
- Allow insights-client dbus chat with abrt
Resolves: rhbz#2170510
- Allow insights client communicate with cupsd, mysqld, openvswitch, redis
Resolves: rhbz#2170510
- Allow insights client read raw memory devices
Resolves: rhbz#2170510
- Allow insights-client domain transition on semanage execution
Resolves: rhbz#2170510
- Allow insights-client create gluster log dir with a transition
Resolves: rhbz#2170510
- Allow insights-client manage generic locks
Resolves: rhbz#2170510
- Allow insights-client unix_read all domain semaphores
Resolves: rhbz#2170510




Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) selinux-policy-3.14.3-108.0.3.el8_7.2.src.rpm3b8dca8559dcd061e70a906ff2e6dda7-
selinux-policy-3.14.3-108.0.3.el8_7.2.noarch.rpmde9691ec16d57b8394d8baacec99c97d-
selinux-policy-devel-3.14.3-108.0.3.el8_7.2.noarch.rpm41abcf908a49d15a629304b524617d59-
selinux-policy-doc-3.14.3-108.0.3.el8_7.2.noarch.rpm17de5271662b9da37e416c34059a5bf7-
selinux-policy-minimum-3.14.3-108.0.3.el8_7.2.noarch.rpmc3f38fd3d6ecab4bdb9a51faaef444c3-
selinux-policy-mls-3.14.3-108.0.3.el8_7.2.noarch.rpm8990480bc5e546d44ae6f6a9e15bc2f1-
selinux-policy-sandbox-3.14.3-108.0.3.el8_7.2.noarch.rpm0eaff0c0a4f7464d27c31ba622170234-
selinux-policy-targeted-3.14.3-108.0.3.el8_7.2.noarch.rpm7eb81b7d429c5556109ce394ddbd12c2-
Oracle Linux 8 (x86_64) selinux-policy-3.14.3-108.0.3.el8_7.2.src.rpm3b8dca8559dcd061e70a906ff2e6dda7-
selinux-policy-3.14.3-108.0.3.el8_7.2.noarch.rpmde9691ec16d57b8394d8baacec99c97d-
selinux-policy-devel-3.14.3-108.0.3.el8_7.2.noarch.rpm41abcf908a49d15a629304b524617d59-
selinux-policy-doc-3.14.3-108.0.3.el8_7.2.noarch.rpm17de5271662b9da37e416c34059a5bf7-
selinux-policy-minimum-3.14.3-108.0.3.el8_7.2.noarch.rpmc3f38fd3d6ecab4bdb9a51faaef444c3-
selinux-policy-mls-3.14.3-108.0.3.el8_7.2.noarch.rpm8990480bc5e546d44ae6f6a9e15bc2f1-
selinux-policy-sandbox-3.14.3-108.0.3.el8_7.2.noarch.rpm0eaff0c0a4f7464d27c31ba622170234-
selinux-policy-targeted-3.14.3-108.0.3.el8_7.2.noarch.rpm7eb81b7d429c5556109ce394ddbd12c2-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete