|
| 1 | +* Fri May 20 2022 Chris PeBenito < [email protected]> - 2.20220520 |
| 2 | +Björn Esser (1): |
| 3 | + authlogin: add fcontext for tcb |
| 4 | + |
| 5 | +Chris PeBenito (118): |
| 6 | + 0xC0ncord/bugfix/systemd-user-exec-apps-hookup |
| 7 | + systemd, ssh, ntp: Read fips_enabled crypto sysctl. |
| 8 | + systemd: Unit generator fixes. |
| 9 | + systemd: Revise tmpfiles factory to allow writing all configs. |
| 10 | + systemd: User runtime reads user cgroup files. |
| 11 | + logging: Add audit_control for journald. |
| 12 | + udev: Manage EFI variables. |
| 13 | + ntp: Handle symlink to drift directory. |
| 14 | + logging: Allow auditd to stat() dispatcher executables. |
| 15 | + Drop module versioning. |
| 16 | + tests.yml: Disable policy_module() selint checks. |
| 17 | + systemd: Change journal file context to MLS system high. |
| 18 | + Revert "users: remove MCS categories from default users" |
| 19 | + systemd: Add systemd-homed and systemd-userdbd. |
| 20 | + systemd, ssh: Crypto sysctl use. |
| 21 | + systemd: Additional fixes for fs getattrs. |
| 22 | + systemd: Updates for generators and kmod-static-nodes.service. |
| 23 | + domain: Allow lockdown for all domains. |
| 24 | + postfix, spamassassin: Fix missed type renames after alias removals. |
| 25 | + cron, dbus, policykit, postfix: Minor style fixes. |
| 26 | + Make hide_broken_symptoms unconditional. |
| 27 | + puppet: Style fixes. |
| 28 | + matrixd: Cleanups. |
| 29 | + matrixd: SELint fixes. |
| 30 | + mailmain: Fix check_fc_files issue. |
| 31 | + mailmain: Fix SELint issues. |
| 32 | + postfix: Move lines. |
| 33 | + apache: Remove unnecessary require in apache_exec(). |
| 34 | + seusers: Remove sddm. |
| 35 | + Add a vulnerability handling process. |
| 36 | + |
| 37 | +Christian Goettsche (1): |
| 38 | + check_fc_files: allow optional @ character |
| 39 | + |
| 40 | +Christian Göttsche (11): |
| 41 | + filesystem: add fs_use_trans for ramfs |
| 42 | + Ignore umask on when installing headers |
| 43 | + Revert "tests.yml: Disable policy_module() selint checks." |
| 44 | + build.conf: bump policy version in comment |
| 45 | + flask: add new kernel security classes |
| 46 | + policy_capabilities: add ioctl_skip_cloexec |
| 47 | + policy.dtd: more strict bool/tunable and infoflow validation |
| 48 | + Makefile: invoke python with -bb |
| 49 | + Rules.monolithic: add target to generate CIL policy |
| 50 | + Makefile: use override for adding options |
| 51 | + Rules.modular: add pure-load target |
| 52 | + |
| 53 | +Dave Sugar (4): |
| 54 | + Allow iscsid to request kernel module load |
| 55 | + Allow iscsid to check fips_enabled |
| 56 | + sshd: allow to run /usr/bin/fipscheck (to check fips state) |
| 57 | + systemd: resolve error with systemd-sysctl |
| 58 | + |
| 59 | +Fabrice Fontaine (2): |
| 60 | + policy/modules/services/samba.te: make crack optional |
| 61 | + policy/modules/services/wireguard.te: make iptables optional |
| 62 | + |
| 63 | +Gao Xiang (1): |
| 64 | + Add erofs as a SELinux capable file system |
| 65 | + |
| 66 | +Henrik Grindal Bakken (1): |
| 67 | + snmp: Fix typo in /var/net-snmp rule |
| 68 | + |
| 69 | +Jonathan Davies (12): |
| 70 | + chronyd.te: Added chronyd_hwtimestamp boolean for chronyd_t to access |
| 71 | + net_admin capability, this is required for its `hwtimestamp` option, |
| 72 | + which otherwise returns: |
| 73 | + virt.te: Fixed typo in virtlogd_t virt_common_runtime_t |
| 74 | + manage_files_pattern. |
| 75 | + obfs4proxy: Added policy. |
| 76 | + tor: Added interfaces and types for obfs4proxy support. |
| 77 | + corenetwork.te.in: Added ntske port. |
| 78 | + chronyd.te: Added support for bind/connect/recv/send NTS packets. |
| 79 | + chronyd: Allow access to read certs. |
| 80 | + obj_perm_sets.spt: Fixed typo in rw_netlink_socket_perms. |
| 81 | + policy/*: Replaced rw_netlink_socket_perms with |
| 82 | + create_netlink_socket_perms. |
| 83 | + node_exporter: Added initial policy. |
| 84 | + systemd.te: Added boolean for allowing dhcpd server packets. |
| 85 | + systemd.if: Allowed reading systemd_userdbd_runtime_t symlinks in |
| 86 | + systemd_stream_connect_userdb(). |
| 87 | + |
| 88 | +Kenton Groombridge (174): |
| 89 | + userdomain: add user exec domain attribute and interface |
| 90 | + systemd: assign user exec attribute to systemd --user instances |
| 91 | + systemd: add interface to support monitoring and output capturing of child |
| 92 | + processes |
| 93 | + wm: add user exec domain attribute to wm domains |
| 94 | + ssh: add interface to execute and transition to ssh client |
| 95 | + userdomain: add interface to allow mapping all user home content |
| 96 | + git, roles: add policy for git client |
| 97 | + apache, roles: use user exec domain attribute |
| 98 | + screen, roles: use user exec domain attribute |
| 99 | + git, roles: use user exec domain attribute |
| 100 | + postgresql, roles: use user exec domain attribute |
| 101 | + ssh, roles: use user exec domain attribute |
| 102 | + sudo, roles: use user exec domain attribute |
| 103 | + syncthing, roles: use user exec domain attribute |
| 104 | + xscreensaver, roles: use user exec domain attribute |
| 105 | + xserver, roles, various: use user exec domain attribute |
| 106 | + authlogin, roles: use user exec domain attribute |
| 107 | + bluetooth, roles: use user exec domain attribute |
| 108 | + cdrecord, roles: use user exec domain attribute |
| 109 | + chromium, roles: use user exec domain attribute |
| 110 | + cron, roles: use user exec domain attribute |
| 111 | + dirmngr, roles: use user exec domain attribute |
| 112 | + evolution, roles: use user exec domain attribute |
| 113 | + games, roles: use user exec domain attribute |
| 114 | + gnome, roles: use user exec domain attribute |
| 115 | + gpg, roles: use user exec domain attribute |
| 116 | + irc, roles: use user exec domain attribute |
| 117 | + java, roles: use user exec domain attribute |
| 118 | + libmtp, roles: use user exec domain attribute |
| 119 | + lpd, roles: use user exec domain attribute |
| 120 | + mozilla, roles: use user exec domain attribute |
| 121 | + mplayer, roles: use user exec domain attribute |
| 122 | + mta, roles: use user exec domain attribute |
| 123 | + openoffice, roles: use user exec domain attribute |
| 124 | + pulseaudio, roles: use user exec domain attribute |
| 125 | + pyzor, roles: use user exec domain attribute |
| 126 | + razor, roles: use user exec domain attribute |
| 127 | + rssh, roles: use user exec domain attribute |
| 128 | + spamassassin, roles: use user exec domain attribute |
| 129 | + su, roles: use user exec domain attribute |
| 130 | + telepathy, roles: use user exec domain attribute |
| 131 | + thunderbird, roles: use user exec domain attribute |
| 132 | + tvtime, roles: use user exec domain attribute |
| 133 | + uml, roles: use user exec domain attribute |
| 134 | + userhelper, roles: use user exec domain attribute |
| 135 | + vmware, roles: use user exec domain attribute |
| 136 | + wireshark, roles: use user exec domain attribute |
| 137 | + wm, roles: use user exec domain attribute |
| 138 | + hadoop, roles: use user exec domain attribute |
| 139 | + shutdown, roles: use user exec domain attribute |
| 140 | + cryfs, roles: use user exec domain attribute |
| 141 | + wine: use user exec domain attribute |
| 142 | + mono: use user exec domain attribute |
| 143 | + sudo: add tunable to control user exec domain access |
| 144 | + su: add tunable to control user exec domain access |
| 145 | + shutdown: add tunable to control user exec domain access |
| 146 | + mpd, pulseaudio: split domtrans and client access |
| 147 | + mcs: deprecate mcs overrides |
| 148 | + mcs: restrict create, relabelto on mcs files |
| 149 | + fs: add pseudofs attribute and interfaces |
| 150 | + devices: make usbfs pseudofs instead of noxattrfs |
| 151 | + git: fix typo in git hook exec access |
| 152 | + dovecot, spamassassin: allow dovecot to execute spamc |
| 153 | + mta, spamassassin: fixes for rspamd |
| 154 | + certbot, various: allow various services to read certbot certs |
| 155 | + usbguard, sysadm: misc fixes |
| 156 | + ssh: fix for polyinstantiation |
| 157 | + sysadm, systemd: fixes for systemd-networkd |
| 158 | + asterisk: allow reading generic certs |
| 159 | + bind: fixes for unbound |
| 160 | + netutils: fix ping |
| 161 | + policykit, systemd: allow policykit to watch systemd logins and sessions |
| 162 | + spamassassin: fix file contexts for rspamd symlinks |
| 163 | + mcs: add additional constraints to databases |
| 164 | + mcs: constrain misc IPC objects |
| 165 | + mcs: combine single-level object creation constraints |
| 166 | + various: deprecate mcs override interfaces |
| 167 | + corenet: make netlabel_peer_t mcs constrained |
| 168 | + mcs: constrain context contain access |
| 169 | + mcs: only constrain mcs_constrained_type for db accesses |
| 170 | + guest, xguest: remove apache role access |
| 171 | + wine: fix roleattribute statement |
| 172 | + testing: accept '@' as a valid ending character in filecon checker |
| 173 | + users: remove MCS categories from default users |
| 174 | + various: remove various mcs ranged transitions |
| 175 | + kernel: add various supporting interfaces for containers |
| 176 | + kernel, rpc, systemd: deprecate kernel_mounton_proc |
| 177 | + devices, kernel: deprecate dev_mounton_sysfs |
| 178 | + devices: add interfaces to remount sysfs and device filesystems |
| 179 | + init: add interface to run init bpf programs |
| 180 | + systemd: add interface to dbus chat with systemd-machined |
| 181 | + userdom: add interfaces to relabel generic user home content |
| 182 | + init: add interface to setsched on init |
| 183 | + init: allow systemd to renice all other domains |
| 184 | + sysnetwork: add interfaces for /run/netns |
| 185 | + container, virt: move svirt lxc domains to new container module |
| 186 | + container: svirt_lxc_net_t is now container_t |
| 187 | + container: fixup rules |
| 188 | + container: add interface to identify container mountpoints |
| 189 | + various: make various types a mountpoint for containers |
| 190 | + container: add base attributes for containers and container engines |
| 191 | + container: initial support for container engines |
| 192 | + container, gpg, userdom: allow container engines to execute gpg |
| 193 | + container: allow containers to use container ptys |
| 194 | + container, mount: allow mount to getattr on container fs |
| 195 | + various: various userns capability permissions |
| 196 | + container: allow containers the chroot capability |
| 197 | + container: allow containers various userns capabilities |
| 198 | + container: allow containers to watch all container files |
| 199 | + container, podman: initial support for podman |
| 200 | + filesystem: add supporting FUSEFS interfaces |
| 201 | + dbus: add supporting interfaces and rules for rootless podman |
| 202 | + systemd: add private type for systemd user manager units |
| 203 | + container: add role access templates |
| 204 | + container, podman, systemd: initial support for rootless podman |
| 205 | + container: add required admin rules |
| 206 | + sysadm: allow container admin access |
| 207 | + container: call podman access in container access |
| 208 | + staff, unconfined: allow container user access |
| 209 | + container: add policy for privileged containers |
| 210 | + container: allow containers to read read-only container files |
| 211 | + container: add tunable for containers to manage cgroups |
| 212 | + container: add tunables for containers to use nfs and cifs |
| 213 | + container: add tunable to allow engines to mounton non security |
| 214 | + container, iptables: dontaudit iptables rw on /ptmx |
| 215 | + xdg: add interface to search xdg data directories |
| 216 | + container, podman: add policy for conmon |
| 217 | + kernel: add filetrans interface for unlabeled dirs |
| 218 | + container, docker: add initial support for docker |
| 219 | + container: call docker access in container access |
| 220 | + userdomain: add type for user bin files |
| 221 | + systemd: allow systemd user managers to execute user bin files |
| 222 | + systemd: use stream socket perms in systemd_user_app_status |
| 223 | + systemd: add supporting interfaces for user daemons |
| 224 | + rootlesskit: new policy module |
| 225 | + container, docker, rootlesskit: add support for rootless docker |
| 226 | + docker: call rootlesskit access in docker access |
| 227 | + container: drop old commented rules |
| 228 | + lxc_contexts: add ro_file and sandbox_lxc_process contexts |
| 229 | + container: allow containers to getsession |
| 230 | + docker: make rootlesskit optional |
| 231 | + docker: add missing call to init_daemon_domain() |
| 232 | + podman: add explicit range transition for conmon |
| 233 | + init: split access for systemd runtime units |
| 234 | + dbus: fixes for dbus-broker |
| 235 | + dbus, policykit: add tunables for dbus-broker access |
| 236 | + docker, podman: container units now have the runtime unit type |
| 237 | + init: allow systemd to nnp_transition and nosuid_transition to daemon |
| 238 | + domains |
| 239 | + files, init: allow init to remount filesystems mounted on /boot |
| 240 | + sudo: fixes for polyinstantiation |
| 241 | + locallogin: fix for polyinstantiation |
| 242 | + authlogin: dontaudit getcap chkpwd |
| 243 | + systemd: various fixes |
| 244 | + systemd: add support for systemd-resolved stubs |
| 245 | + getty, locallogin: cgroup fixes |
| 246 | + unconfined: fixes for bluetooth dbus chat and systemd |
| 247 | + udev: allow udev to start the systemd system object |
| 248 | + networkmanager: allow getting systemd system status |
| 249 | + container, podman: allow podman to create and write config files |
| 250 | + podman: allow system podman to interact with container transient units |
| 251 | + podman: fix role associations |
| 252 | + container, podman: allow containers to interact with conmon |
| 253 | + podman: add rules for systemd container units |
| 254 | + container, init: allow init to remount container filesystems |
| 255 | + container: allow generic containers to read the vm_overcommit sysctl |
| 256 | + container: add tunables to allow containers to access public content |
| 257 | + container: add missing capabilities |
| 258 | + container: also allow containers to watch public content |
| 259 | + podman: allow podman to watch journal dirs |
| 260 | + sysadm: allow sysadm to watch journal directories |
| 261 | + git: add missing file contexts |
| 262 | + udica-templates: initial commit of udica templates |
| 263 | + makefile: add install target for udica templates |
| 264 | + github: test install of udica templates |
| 265 | + |
| 266 | +Laurent Bigonville (2): |
| 267 | + docker: On debian dockerd and docker-proxy are in /usr/sbin |
| 268 | + container: On Debian, runc is installed in /usr/sbin |
| 269 | + |
| 270 | +Pedro (1): |
| 271 | + File context for nginx cache files |
| 272 | + |
| 273 | +Russell Coker (8): |
| 274 | + remove aliases from 20210203 |
| 275 | + dontaudit net_admin without hide_broken_symptoms |
| 276 | + puppet V3 |
| 277 | + matrixd-synapse policy V3 |
| 278 | + mailman3 V3 |
| 279 | + certbot V3 |
| 280 | + init dbus patch for GetDynamicUsers with systemd_use_nss() V2 |
| 281 | + new sddm V2 |
| 282 | + |
| 283 | +Vit Mojzis (1): |
| 284 | + Improve error message on duplicate definition of interface |
| 285 | + |
| 286 | +Yi Zhao (24): |
| 287 | + rpc: remove obsolete comment line |
| 288 | + secadm: allow secadm to read selinux policy |
| 289 | + rpcbind: allow sysadm to run rpcinfo |
| 290 | + samba: allow smbd_t to send and receive messages from avahi over dbus |
| 291 | + rpc: add dac_read_search capability for rpcd_t |
| 292 | + bluetooth: fixes for bluetoothd |
| 293 | + avahi: allow avahi_t to watch /etc/avahi directory |
| 294 | + udev: allow udev_t to watch udev_rules_t dir |
| 295 | + rpc: allow rpc.mountd to list/watch NFS server directory |
| 296 | + usermanage: do not audit attempts to getattr of proc for passwd_t and |
| 297 | + useradd_t |
| 298 | + selinuxutil: allow setfiles_t to read kernel sysctl |
| 299 | + rngd: fixes for rngd |
| 300 | + dbus: allow dbus-daemon to map SELinux status page |
| 301 | + bind: fixes for bind |
| 302 | + passwd: allow passwd to map SELinux status page |
| 303 | + ipsec: fixes for strongswan |
| 304 | + samba: fixes for smbd/nmbd |
| 305 | + ntp: allow ntpd to set rlimit_memlock |
| 306 | + ssh: do not audit attempts by ssh-keygen to read proc |
| 307 | + acpid: allow acpid to watch the directories in /dev |
| 308 | + bluetooth: allow bluetoothd to create alg_socket |
| 309 | + systemd: allow systemd-hostnamed to read udev runtime files |
| 310 | + su: allow su to map SELinux status page |
| 311 | + modutils: allow kmod_t to write keys |
| 312 | + |
1 | 313 | * Wed Sep 08 2021 Chris PeBenito < [email protected]> - 2.20210908
|
2 | 314 | Andreas Freimuth (2):
|
3 | 315 | Prefer user_fonts_config_t over xdg_config_t
|
|
0 commit comments