ELBA-2026-3546

ELBA-2026-3546 - selinux-policy update

Type:BUG
Impact:NA
Release Date:2026-03-05

Description


[3.14.3-139.0.2.el8_10.2]
- Fixed avc for agetty checkpoint restore denied [Orabug: 37783500]
- Allow kdump create and use its memfd: objects [Orabug: 36538844]
- Allow cgred_t to get attributes of cgroup filesystems [Orabug: 36226040]
- Allow exim_t to read exim_log_t and manage exim_spool_t link files [Orabug: 36170954]
- Allow mailman_domain to manage mailman_log_t link files [Orabug: 36160497]
- Label /var/log/kdump.log with kdump_log_t [Orabug: 32911792]
- Allow tuned_t to manage information from the debugging filesystem [Orabug: 34685730]
- Allow kdumpctl_t to execmem [Orabug: 34712872]
- Allow svirt_t domain to mmap svirt_image_t character files [Orabug: 34314421]
- Allow tuned_t to read the process state of all domains [Orabug: 33520684]
- Allow initrc_t to manage pid files used by chronyd [Orabug: 33520623]
- Make import-state work with mls policy [Orabug: 32636699]
- Add map permission to lvm_t on lvm_metadata_t. [Orabug: 31405325]
- Add comment for map on lvm_metadata_t. [Orabug: 31405325]
- Make iscsiadm work with mls policy [Orabug: 32725411]
- Make cloud-init work with mls policy [Orabug: 32430460]
- Allow systemd-pstore to transfer files from /sys/fs/pstore [Orabug: 31594666]
- Make smartd work with mls policy [Orabug: 32430379]
- Allow sysadm_t to mmap modules_object_t files [Orabug: 32411855]
- Allow tuned_t to execute systemd_systemctl_exec_t files [Orabug: 32355342]
- Make logrotate work with mls policy [Orabug: 32343731]
- Add interface kernel_relabelfrom_usermodehelper() [Orabug: 31396031]
- Allow systemd_tmpfiles_t domain to relabel from usermodehelper_t files [Orabug: 31396031]
- Make udev work with mls policy [Orabug: 31405299]
- Make tuned work with mls policy [Orabug: 31396024]
- Make lsmd, rngd, and kdumpctl work with mls policy [Orabug: 31405378]
- Allow virt_domain to mmap virt_content_t files [Orabug: 30932671]
- Enable NetworkManager and dhclient to use initramfs-configured DHCP connection [Orabug: 30537515]
- Enable policykit and sssd policy modules with minimum policy [Orabug: 29744511]
- Allow udev_t to load modules [Orabug: 28260775]
- Add vhost-scsi to be vhost_device_t type [Orabug: 27774921]
- Fix container selinux policy [Orabug: 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type. [Orabug: 13333429]

[3.14.3-139.2]
- Label /etc/redis.conf with redis_conf_t
Resolves: RHEL-95750
- Allow nfsd_t domain setuid and setgid capability for rpc.mountd
Resolves: RHEL-148243

[3.14.3-139.1]
- Allow setsebool_t relabel selinux data files
Resolves: RHEL-55432
- Allow dirsrv-snmp map dirsv_tmpfs_t files
Resolves: RHEL-32441
- Allow dirsrv_snmp_t to manage dirsrv_config_t & dirsrv_var_run_t files
Resolves: RHEL-32441




Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) selinux-policy-3.14.3-139.0.2.el8_10.2.src.rpm781e3f612c436b5696f8e53e09d2cdebd0ebc640133393599a97600c63ceb1c7-ol8_aarch64_baseos_latest
selinux-policy-3.14.3-139.0.2.el8_10.2.src.rpm781e3f612c436b5696f8e53e09d2cdebd0ebc640133393599a97600c63ceb1c7-ol8_aarch64_u10_baseos_patch
selinux-policy-3.14.3-139.0.2.el8_10.2.noarch.rpmf89a8cbaa114d1daed97ba47a52f3b604078a7e03ae980f308ad25a688e07e9e-ol8_aarch64_baseos_latest
selinux-policy-3.14.3-139.0.2.el8_10.2.noarch.rpmf89a8cbaa114d1daed97ba47a52f3b604078a7e03ae980f308ad25a688e07e9e-ol8_aarch64_u10_baseos_patch
selinux-policy-devel-3.14.3-139.0.2.el8_10.2.noarch.rpmad9bf3f674f07c872797078ac81ae539064544d5d9fbe6d9eab079c678ac45db-ol8_aarch64_baseos_latest
selinux-policy-devel-3.14.3-139.0.2.el8_10.2.noarch.rpmad9bf3f674f07c872797078ac81ae539064544d5d9fbe6d9eab079c678ac45db-ol8_aarch64_u10_baseos_patch
selinux-policy-doc-3.14.3-139.0.2.el8_10.2.noarch.rpmb46425bd06b36c10b6c917f3e9e8e38f549b1e695ad2e11b56198698a9e2f43f-ol8_aarch64_baseos_latest
selinux-policy-doc-3.14.3-139.0.2.el8_10.2.noarch.rpmb46425bd06b36c10b6c917f3e9e8e38f549b1e695ad2e11b56198698a9e2f43f-ol8_aarch64_u10_baseos_patch
selinux-policy-minimum-3.14.3-139.0.2.el8_10.2.noarch.rpm80106c91b5d06889f75f4d6058d039f8d83ac4ed776f38d92fcb998659125c07-ol8_aarch64_baseos_latest
selinux-policy-minimum-3.14.3-139.0.2.el8_10.2.noarch.rpm80106c91b5d06889f75f4d6058d039f8d83ac4ed776f38d92fcb998659125c07-ol8_aarch64_u10_baseos_patch
selinux-policy-mls-3.14.3-139.0.2.el8_10.2.noarch.rpm13600a90a46bdc363d2179b59f3373ee9a129f32028ec39fa3cb4433ae9224af-ol8_aarch64_baseos_latest
selinux-policy-mls-3.14.3-139.0.2.el8_10.2.noarch.rpm13600a90a46bdc363d2179b59f3373ee9a129f32028ec39fa3cb4433ae9224af-ol8_aarch64_u10_baseos_patch
selinux-policy-sandbox-3.14.3-139.0.2.el8_10.2.noarch.rpm5d1eb23fa965adb38921717606a77fdc111d769dfb6839523f23a80513140083-ol8_aarch64_baseos_latest
selinux-policy-sandbox-3.14.3-139.0.2.el8_10.2.noarch.rpm5d1eb23fa965adb38921717606a77fdc111d769dfb6839523f23a80513140083-ol8_aarch64_u10_baseos_patch
selinux-policy-targeted-3.14.3-139.0.2.el8_10.2.noarch.rpm9be586090e9b0e73253bad817f6b5eabf91235fc55239bec8e50657532ff1167-ol8_aarch64_baseos_latest
selinux-policy-targeted-3.14.3-139.0.2.el8_10.2.noarch.rpm9be586090e9b0e73253bad817f6b5eabf91235fc55239bec8e50657532ff1167-ol8_aarch64_u10_baseos_patch
Oracle Linux 8 (x86_64) selinux-policy-3.14.3-139.0.2.el8_10.2.src.rpm781e3f612c436b5696f8e53e09d2cdebd0ebc640133393599a97600c63ceb1c7-ol8_x86_64_baseos_latest
selinux-policy-3.14.3-139.0.2.el8_10.2.src.rpm781e3f612c436b5696f8e53e09d2cdebd0ebc640133393599a97600c63ceb1c7-ol8_x86_64_u10_baseos_patch
selinux-policy-3.14.3-139.0.2.el8_10.2.noarch.rpmf89a8cbaa114d1daed97ba47a52f3b604078a7e03ae980f308ad25a688e07e9e-ol8_x86_64_baseos_latest
selinux-policy-3.14.3-139.0.2.el8_10.2.noarch.rpmf89a8cbaa114d1daed97ba47a52f3b604078a7e03ae980f308ad25a688e07e9e-ol8_x86_64_u10_baseos_patch
selinux-policy-devel-3.14.3-139.0.2.el8_10.2.noarch.rpmad9bf3f674f07c872797078ac81ae539064544d5d9fbe6d9eab079c678ac45db-ol8_x86_64_baseos_latest
selinux-policy-devel-3.14.3-139.0.2.el8_10.2.noarch.rpmad9bf3f674f07c872797078ac81ae539064544d5d9fbe6d9eab079c678ac45db-ol8_x86_64_u10_baseos_patch
selinux-policy-doc-3.14.3-139.0.2.el8_10.2.noarch.rpmb46425bd06b36c10b6c917f3e9e8e38f549b1e695ad2e11b56198698a9e2f43f-ol8_x86_64_baseos_latest
selinux-policy-doc-3.14.3-139.0.2.el8_10.2.noarch.rpmb46425bd06b36c10b6c917f3e9e8e38f549b1e695ad2e11b56198698a9e2f43f-ol8_x86_64_u10_baseos_patch
selinux-policy-minimum-3.14.3-139.0.2.el8_10.2.noarch.rpm80106c91b5d06889f75f4d6058d039f8d83ac4ed776f38d92fcb998659125c07-ol8_x86_64_baseos_latest
selinux-policy-minimum-3.14.3-139.0.2.el8_10.2.noarch.rpm80106c91b5d06889f75f4d6058d039f8d83ac4ed776f38d92fcb998659125c07-ol8_x86_64_u10_baseos_patch
selinux-policy-mls-3.14.3-139.0.2.el8_10.2.noarch.rpm13600a90a46bdc363d2179b59f3373ee9a129f32028ec39fa3cb4433ae9224af-ol8_x86_64_baseos_latest
selinux-policy-mls-3.14.3-139.0.2.el8_10.2.noarch.rpm13600a90a46bdc363d2179b59f3373ee9a129f32028ec39fa3cb4433ae9224af-ol8_x86_64_u10_baseos_patch
selinux-policy-sandbox-3.14.3-139.0.2.el8_10.2.noarch.rpm5d1eb23fa965adb38921717606a77fdc111d769dfb6839523f23a80513140083-ol8_x86_64_baseos_latest
selinux-policy-sandbox-3.14.3-139.0.2.el8_10.2.noarch.rpm5d1eb23fa965adb38921717606a77fdc111d769dfb6839523f23a80513140083-ol8_x86_64_u10_baseos_patch
selinux-policy-targeted-3.14.3-139.0.2.el8_10.2.noarch.rpm9be586090e9b0e73253bad817f6b5eabf91235fc55239bec8e50657532ff1167-ol8_x86_64_baseos_latest
selinux-policy-targeted-3.14.3-139.0.2.el8_10.2.noarch.rpm9be586090e9b0e73253bad817f6b5eabf91235fc55239bec8e50657532ff1167-ol8_x86_64_u10_baseos_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete