Skip to content

Commit fdebaac

Browse files
committed
Update Changelog and VERSION for release 2.20220520.
Signed-off-by: Chris PeBenito <[email protected]>
1 parent ed9e2c9 commit fdebaac

File tree

2 files changed

+313
-1
lines changed

2 files changed

+313
-1
lines changed

Changelog

+312
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,315 @@
1+
* Fri May 20 2022 Chris PeBenito <[email protected]> - 2.20220520
2+
Björn Esser (1):
3+
authlogin: add fcontext for tcb
4+
5+
Chris PeBenito (118):
6+
0xC0ncord/bugfix/systemd-user-exec-apps-hookup
7+
systemd, ssh, ntp: Read fips_enabled crypto sysctl.
8+
systemd: Unit generator fixes.
9+
systemd: Revise tmpfiles factory to allow writing all configs.
10+
systemd: User runtime reads user cgroup files.
11+
logging: Add audit_control for journald.
12+
udev: Manage EFI variables.
13+
ntp: Handle symlink to drift directory.
14+
logging: Allow auditd to stat() dispatcher executables.
15+
Drop module versioning.
16+
tests.yml: Disable policy_module() selint checks.
17+
systemd: Change journal file context to MLS system high.
18+
Revert "users: remove MCS categories from default users"
19+
systemd: Add systemd-homed and systemd-userdbd.
20+
systemd, ssh: Crypto sysctl use.
21+
systemd: Additional fixes for fs getattrs.
22+
systemd: Updates for generators and kmod-static-nodes.service.
23+
domain: Allow lockdown for all domains.
24+
postfix, spamassassin: Fix missed type renames after alias removals.
25+
cron, dbus, policykit, postfix: Minor style fixes.
26+
Make hide_broken_symptoms unconditional.
27+
puppet: Style fixes.
28+
matrixd: Cleanups.
29+
matrixd: SELint fixes.
30+
mailmain: Fix check_fc_files issue.
31+
mailmain: Fix SELint issues.
32+
postfix: Move lines.
33+
apache: Remove unnecessary require in apache_exec().
34+
seusers: Remove sddm.
35+
Add a vulnerability handling process.
36+
37+
Christian Goettsche (1):
38+
check_fc_files: allow optional @ character
39+
40+
Christian Göttsche (11):
41+
filesystem: add fs_use_trans for ramfs
42+
Ignore umask on when installing headers
43+
Revert "tests.yml: Disable policy_module() selint checks."
44+
build.conf: bump policy version in comment
45+
flask: add new kernel security classes
46+
policy_capabilities: add ioctl_skip_cloexec
47+
policy.dtd: more strict bool/tunable and infoflow validation
48+
Makefile: invoke python with -bb
49+
Rules.monolithic: add target to generate CIL policy
50+
Makefile: use override for adding options
51+
Rules.modular: add pure-load target
52+
53+
Dave Sugar (4):
54+
Allow iscsid to request kernel module load
55+
Allow iscsid to check fips_enabled
56+
sshd: allow to run /usr/bin/fipscheck (to check fips state)
57+
systemd: resolve error with systemd-sysctl
58+
59+
Fabrice Fontaine (2):
60+
policy/modules/services/samba.te: make crack optional
61+
policy/modules/services/wireguard.te: make iptables optional
62+
63+
Gao Xiang (1):
64+
Add erofs as a SELinux capable file system
65+
66+
Henrik Grindal Bakken (1):
67+
snmp: Fix typo in /var/net-snmp rule
68+
69+
Jonathan Davies (12):
70+
chronyd.te: Added chronyd_hwtimestamp boolean for chronyd_t to access
71+
net_admin capability, this is required for its `hwtimestamp` option,
72+
which otherwise returns:
73+
virt.te: Fixed typo in virtlogd_t virt_common_runtime_t
74+
manage_files_pattern.
75+
obfs4proxy: Added policy.
76+
tor: Added interfaces and types for obfs4proxy support.
77+
corenetwork.te.in: Added ntske port.
78+
chronyd.te: Added support for bind/connect/recv/send NTS packets.
79+
chronyd: Allow access to read certs.
80+
obj_perm_sets.spt: Fixed typo in rw_netlink_socket_perms.
81+
policy/*: Replaced rw_netlink_socket_perms with
82+
create_netlink_socket_perms.
83+
node_exporter: Added initial policy.
84+
systemd.te: Added boolean for allowing dhcpd server packets.
85+
systemd.if: Allowed reading systemd_userdbd_runtime_t symlinks in
86+
systemd_stream_connect_userdb().
87+
88+
Kenton Groombridge (174):
89+
userdomain: add user exec domain attribute and interface
90+
systemd: assign user exec attribute to systemd --user instances
91+
systemd: add interface to support monitoring and output capturing of child
92+
processes
93+
wm: add user exec domain attribute to wm domains
94+
ssh: add interface to execute and transition to ssh client
95+
userdomain: add interface to allow mapping all user home content
96+
git, roles: add policy for git client
97+
apache, roles: use user exec domain attribute
98+
screen, roles: use user exec domain attribute
99+
git, roles: use user exec domain attribute
100+
postgresql, roles: use user exec domain attribute
101+
ssh, roles: use user exec domain attribute
102+
sudo, roles: use user exec domain attribute
103+
syncthing, roles: use user exec domain attribute
104+
xscreensaver, roles: use user exec domain attribute
105+
xserver, roles, various: use user exec domain attribute
106+
authlogin, roles: use user exec domain attribute
107+
bluetooth, roles: use user exec domain attribute
108+
cdrecord, roles: use user exec domain attribute
109+
chromium, roles: use user exec domain attribute
110+
cron, roles: use user exec domain attribute
111+
dirmngr, roles: use user exec domain attribute
112+
evolution, roles: use user exec domain attribute
113+
games, roles: use user exec domain attribute
114+
gnome, roles: use user exec domain attribute
115+
gpg, roles: use user exec domain attribute
116+
irc, roles: use user exec domain attribute
117+
java, roles: use user exec domain attribute
118+
libmtp, roles: use user exec domain attribute
119+
lpd, roles: use user exec domain attribute
120+
mozilla, roles: use user exec domain attribute
121+
mplayer, roles: use user exec domain attribute
122+
mta, roles: use user exec domain attribute
123+
openoffice, roles: use user exec domain attribute
124+
pulseaudio, roles: use user exec domain attribute
125+
pyzor, roles: use user exec domain attribute
126+
razor, roles: use user exec domain attribute
127+
rssh, roles: use user exec domain attribute
128+
spamassassin, roles: use user exec domain attribute
129+
su, roles: use user exec domain attribute
130+
telepathy, roles: use user exec domain attribute
131+
thunderbird, roles: use user exec domain attribute
132+
tvtime, roles: use user exec domain attribute
133+
uml, roles: use user exec domain attribute
134+
userhelper, roles: use user exec domain attribute
135+
vmware, roles: use user exec domain attribute
136+
wireshark, roles: use user exec domain attribute
137+
wm, roles: use user exec domain attribute
138+
hadoop, roles: use user exec domain attribute
139+
shutdown, roles: use user exec domain attribute
140+
cryfs, roles: use user exec domain attribute
141+
wine: use user exec domain attribute
142+
mono: use user exec domain attribute
143+
sudo: add tunable to control user exec domain access
144+
su: add tunable to control user exec domain access
145+
shutdown: add tunable to control user exec domain access
146+
mpd, pulseaudio: split domtrans and client access
147+
mcs: deprecate mcs overrides
148+
mcs: restrict create, relabelto on mcs files
149+
fs: add pseudofs attribute and interfaces
150+
devices: make usbfs pseudofs instead of noxattrfs
151+
git: fix typo in git hook exec access
152+
dovecot, spamassassin: allow dovecot to execute spamc
153+
mta, spamassassin: fixes for rspamd
154+
certbot, various: allow various services to read certbot certs
155+
usbguard, sysadm: misc fixes
156+
ssh: fix for polyinstantiation
157+
sysadm, systemd: fixes for systemd-networkd
158+
asterisk: allow reading generic certs
159+
bind: fixes for unbound
160+
netutils: fix ping
161+
policykit, systemd: allow policykit to watch systemd logins and sessions
162+
spamassassin: fix file contexts for rspamd symlinks
163+
mcs: add additional constraints to databases
164+
mcs: constrain misc IPC objects
165+
mcs: combine single-level object creation constraints
166+
various: deprecate mcs override interfaces
167+
corenet: make netlabel_peer_t mcs constrained
168+
mcs: constrain context contain access
169+
mcs: only constrain mcs_constrained_type for db accesses
170+
guest, xguest: remove apache role access
171+
wine: fix roleattribute statement
172+
testing: accept '@' as a valid ending character in filecon checker
173+
users: remove MCS categories from default users
174+
various: remove various mcs ranged transitions
175+
kernel: add various supporting interfaces for containers
176+
kernel, rpc, systemd: deprecate kernel_mounton_proc
177+
devices, kernel: deprecate dev_mounton_sysfs
178+
devices: add interfaces to remount sysfs and device filesystems
179+
init: add interface to run init bpf programs
180+
systemd: add interface to dbus chat with systemd-machined
181+
userdom: add interfaces to relabel generic user home content
182+
init: add interface to setsched on init
183+
init: allow systemd to renice all other domains
184+
sysnetwork: add interfaces for /run/netns
185+
container, virt: move svirt lxc domains to new container module
186+
container: svirt_lxc_net_t is now container_t
187+
container: fixup rules
188+
container: add interface to identify container mountpoints
189+
various: make various types a mountpoint for containers
190+
container: add base attributes for containers and container engines
191+
container: initial support for container engines
192+
container, gpg, userdom: allow container engines to execute gpg
193+
container: allow containers to use container ptys
194+
container, mount: allow mount to getattr on container fs
195+
various: various userns capability permissions
196+
container: allow containers the chroot capability
197+
container: allow containers various userns capabilities
198+
container: allow containers to watch all container files
199+
container, podman: initial support for podman
200+
filesystem: add supporting FUSEFS interfaces
201+
dbus: add supporting interfaces and rules for rootless podman
202+
systemd: add private type for systemd user manager units
203+
container: add role access templates
204+
container, podman, systemd: initial support for rootless podman
205+
container: add required admin rules
206+
sysadm: allow container admin access
207+
container: call podman access in container access
208+
staff, unconfined: allow container user access
209+
container: add policy for privileged containers
210+
container: allow containers to read read-only container files
211+
container: add tunable for containers to manage cgroups
212+
container: add tunables for containers to use nfs and cifs
213+
container: add tunable to allow engines to mounton non security
214+
container, iptables: dontaudit iptables rw on /ptmx
215+
xdg: add interface to search xdg data directories
216+
container, podman: add policy for conmon
217+
kernel: add filetrans interface for unlabeled dirs
218+
container, docker: add initial support for docker
219+
container: call docker access in container access
220+
userdomain: add type for user bin files
221+
systemd: allow systemd user managers to execute user bin files
222+
systemd: use stream socket perms in systemd_user_app_status
223+
systemd: add supporting interfaces for user daemons
224+
rootlesskit: new policy module
225+
container, docker, rootlesskit: add support for rootless docker
226+
docker: call rootlesskit access in docker access
227+
container: drop old commented rules
228+
lxc_contexts: add ro_file and sandbox_lxc_process contexts
229+
container: allow containers to getsession
230+
docker: make rootlesskit optional
231+
docker: add missing call to init_daemon_domain()
232+
podman: add explicit range transition for conmon
233+
init: split access for systemd runtime units
234+
dbus: fixes for dbus-broker
235+
dbus, policykit: add tunables for dbus-broker access
236+
docker, podman: container units now have the runtime unit type
237+
init: allow systemd to nnp_transition and nosuid_transition to daemon
238+
domains
239+
files, init: allow init to remount filesystems mounted on /boot
240+
sudo: fixes for polyinstantiation
241+
locallogin: fix for polyinstantiation
242+
authlogin: dontaudit getcap chkpwd
243+
systemd: various fixes
244+
systemd: add support for systemd-resolved stubs
245+
getty, locallogin: cgroup fixes
246+
unconfined: fixes for bluetooth dbus chat and systemd
247+
udev: allow udev to start the systemd system object
248+
networkmanager: allow getting systemd system status
249+
container, podman: allow podman to create and write config files
250+
podman: allow system podman to interact with container transient units
251+
podman: fix role associations
252+
container, podman: allow containers to interact with conmon
253+
podman: add rules for systemd container units
254+
container, init: allow init to remount container filesystems
255+
container: allow generic containers to read the vm_overcommit sysctl
256+
container: add tunables to allow containers to access public content
257+
container: add missing capabilities
258+
container: also allow containers to watch public content
259+
podman: allow podman to watch journal dirs
260+
sysadm: allow sysadm to watch journal directories
261+
git: add missing file contexts
262+
udica-templates: initial commit of udica templates
263+
makefile: add install target for udica templates
264+
github: test install of udica templates
265+
266+
Laurent Bigonville (2):
267+
docker: On debian dockerd and docker-proxy are in /usr/sbin
268+
container: On Debian, runc is installed in /usr/sbin
269+
270+
Pedro (1):
271+
File context for nginx cache files
272+
273+
Russell Coker (8):
274+
remove aliases from 20210203
275+
dontaudit net_admin without hide_broken_symptoms
276+
puppet V3
277+
matrixd-synapse policy V3
278+
mailman3 V3
279+
certbot V3
280+
init dbus patch for GetDynamicUsers with systemd_use_nss() V2
281+
new sddm V2
282+
283+
Vit Mojzis (1):
284+
Improve error message on duplicate definition of interface
285+
286+
Yi Zhao (24):
287+
rpc: remove obsolete comment line
288+
secadm: allow secadm to read selinux policy
289+
rpcbind: allow sysadm to run rpcinfo
290+
samba: allow smbd_t to send and receive messages from avahi over dbus
291+
rpc: add dac_read_search capability for rpcd_t
292+
bluetooth: fixes for bluetoothd
293+
avahi: allow avahi_t to watch /etc/avahi directory
294+
udev: allow udev_t to watch udev_rules_t dir
295+
rpc: allow rpc.mountd to list/watch NFS server directory
296+
usermanage: do not audit attempts to getattr of proc for passwd_t and
297+
useradd_t
298+
selinuxutil: allow setfiles_t to read kernel sysctl
299+
rngd: fixes for rngd
300+
dbus: allow dbus-daemon to map SELinux status page
301+
bind: fixes for bind
302+
passwd: allow passwd to map SELinux status page
303+
ipsec: fixes for strongswan
304+
samba: fixes for smbd/nmbd
305+
ntp: allow ntpd to set rlimit_memlock
306+
ssh: do not audit attempts by ssh-keygen to read proc
307+
acpid: allow acpid to watch the directories in /dev
308+
bluetooth: allow bluetoothd to create alg_socket
309+
systemd: allow systemd-hostnamed to read udev runtime files
310+
su: allow su to map SELinux status page
311+
modutils: allow kmod_t to write keys
312+
1313
* Wed Sep 08 2021 Chris PeBenito <[email protected]> - 2.20210908
2314
Andreas Freimuth (2):
3315
Prefer user_fonts_config_t over xdg_config_t

VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.20210908
1+
2.20220520

0 commit comments

Comments
 (0)