Update Changelog and VERSION for release 2.20220520.
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
This commit is contained in:
parent
ed9e2c99ca
commit
fdebaaca4b
312
Changelog
312
Changelog
|
@ -1,3 +1,315 @@
|
|||
* Fri May 20 2022 Chris PeBenito <pebenito@ieee.org> - 2.20220520
|
||||
Björn Esser (1):
|
||||
authlogin: add fcontext for tcb
|
||||
|
||||
Chris PeBenito (118):
|
||||
0xC0ncord/bugfix/systemd-user-exec-apps-hookup
|
||||
systemd, ssh, ntp: Read fips_enabled crypto sysctl.
|
||||
systemd: Unit generator fixes.
|
||||
systemd: Revise tmpfiles factory to allow writing all configs.
|
||||
systemd: User runtime reads user cgroup files.
|
||||
logging: Add audit_control for journald.
|
||||
udev: Manage EFI variables.
|
||||
ntp: Handle symlink to drift directory.
|
||||
logging: Allow auditd to stat() dispatcher executables.
|
||||
Drop module versioning.
|
||||
tests.yml: Disable policy_module() selint checks.
|
||||
systemd: Change journal file context to MLS system high.
|
||||
Revert "users: remove MCS categories from default users"
|
||||
systemd: Add systemd-homed and systemd-userdbd.
|
||||
systemd, ssh: Crypto sysctl use.
|
||||
systemd: Additional fixes for fs getattrs.
|
||||
systemd: Updates for generators and kmod-static-nodes.service.
|
||||
domain: Allow lockdown for all domains.
|
||||
postfix, spamassassin: Fix missed type renames after alias removals.
|
||||
cron, dbus, policykit, postfix: Minor style fixes.
|
||||
Make hide_broken_symptoms unconditional.
|
||||
puppet: Style fixes.
|
||||
matrixd: Cleanups.
|
||||
matrixd: SELint fixes.
|
||||
mailmain: Fix check_fc_files issue.
|
||||
mailmain: Fix SELint issues.
|
||||
postfix: Move lines.
|
||||
apache: Remove unnecessary require in apache_exec().
|
||||
seusers: Remove sddm.
|
||||
Add a vulnerability handling process.
|
||||
|
||||
Christian Goettsche (1):
|
||||
check_fc_files: allow optional @ character
|
||||
|
||||
Christian Göttsche (11):
|
||||
filesystem: add fs_use_trans for ramfs
|
||||
Ignore umask on when installing headers
|
||||
Revert "tests.yml: Disable policy_module() selint checks."
|
||||
build.conf: bump policy version in comment
|
||||
flask: add new kernel security classes
|
||||
policy_capabilities: add ioctl_skip_cloexec
|
||||
policy.dtd: more strict bool/tunable and infoflow validation
|
||||
Makefile: invoke python with -bb
|
||||
Rules.monolithic: add target to generate CIL policy
|
||||
Makefile: use override for adding options
|
||||
Rules.modular: add pure-load target
|
||||
|
||||
Dave Sugar (4):
|
||||
Allow iscsid to request kernel module load
|
||||
Allow iscsid to check fips_enabled
|
||||
sshd: allow to run /usr/bin/fipscheck (to check fips state)
|
||||
systemd: resolve error with systemd-sysctl
|
||||
|
||||
Fabrice Fontaine (2):
|
||||
policy/modules/services/samba.te: make crack optional
|
||||
policy/modules/services/wireguard.te: make iptables optional
|
||||
|
||||
Gao Xiang (1):
|
||||
Add erofs as a SELinux capable file system
|
||||
|
||||
Henrik Grindal Bakken (1):
|
||||
snmp: Fix typo in /var/net-snmp rule
|
||||
|
||||
Jonathan Davies (12):
|
||||
chronyd.te: Added chronyd_hwtimestamp boolean for chronyd_t to access
|
||||
net_admin capability, this is required for its `hwtimestamp` option,
|
||||
which otherwise returns:
|
||||
virt.te: Fixed typo in virtlogd_t virt_common_runtime_t
|
||||
manage_files_pattern.
|
||||
obfs4proxy: Added policy.
|
||||
tor: Added interfaces and types for obfs4proxy support.
|
||||
corenetwork.te.in: Added ntske port.
|
||||
chronyd.te: Added support for bind/connect/recv/send NTS packets.
|
||||
chronyd: Allow access to read certs.
|
||||
obj_perm_sets.spt: Fixed typo in rw_netlink_socket_perms.
|
||||
policy/*: Replaced rw_netlink_socket_perms with
|
||||
create_netlink_socket_perms.
|
||||
node_exporter: Added initial policy.
|
||||
systemd.te: Added boolean for allowing dhcpd server packets.
|
||||
systemd.if: Allowed reading systemd_userdbd_runtime_t symlinks in
|
||||
systemd_stream_connect_userdb().
|
||||
|
||||
Kenton Groombridge (174):
|
||||
userdomain: add user exec domain attribute and interface
|
||||
systemd: assign user exec attribute to systemd --user instances
|
||||
systemd: add interface to support monitoring and output capturing of child
|
||||
processes
|
||||
wm: add user exec domain attribute to wm domains
|
||||
ssh: add interface to execute and transition to ssh client
|
||||
userdomain: add interface to allow mapping all user home content
|
||||
git, roles: add policy for git client
|
||||
apache, roles: use user exec domain attribute
|
||||
screen, roles: use user exec domain attribute
|
||||
git, roles: use user exec domain attribute
|
||||
postgresql, roles: use user exec domain attribute
|
||||
ssh, roles: use user exec domain attribute
|
||||
sudo, roles: use user exec domain attribute
|
||||
syncthing, roles: use user exec domain attribute
|
||||
xscreensaver, roles: use user exec domain attribute
|
||||
xserver, roles, various: use user exec domain attribute
|
||||
authlogin, roles: use user exec domain attribute
|
||||
bluetooth, roles: use user exec domain attribute
|
||||
cdrecord, roles: use user exec domain attribute
|
||||
chromium, roles: use user exec domain attribute
|
||||
cron, roles: use user exec domain attribute
|
||||
dirmngr, roles: use user exec domain attribute
|
||||
evolution, roles: use user exec domain attribute
|
||||
games, roles: use user exec domain attribute
|
||||
gnome, roles: use user exec domain attribute
|
||||
gpg, roles: use user exec domain attribute
|
||||
irc, roles: use user exec domain attribute
|
||||
java, roles: use user exec domain attribute
|
||||
libmtp, roles: use user exec domain attribute
|
||||
lpd, roles: use user exec domain attribute
|
||||
mozilla, roles: use user exec domain attribute
|
||||
mplayer, roles: use user exec domain attribute
|
||||
mta, roles: use user exec domain attribute
|
||||
openoffice, roles: use user exec domain attribute
|
||||
pulseaudio, roles: use user exec domain attribute
|
||||
pyzor, roles: use user exec domain attribute
|
||||
razor, roles: use user exec domain attribute
|
||||
rssh, roles: use user exec domain attribute
|
||||
spamassassin, roles: use user exec domain attribute
|
||||
su, roles: use user exec domain attribute
|
||||
telepathy, roles: use user exec domain attribute
|
||||
thunderbird, roles: use user exec domain attribute
|
||||
tvtime, roles: use user exec domain attribute
|
||||
uml, roles: use user exec domain attribute
|
||||
userhelper, roles: use user exec domain attribute
|
||||
vmware, roles: use user exec domain attribute
|
||||
wireshark, roles: use user exec domain attribute
|
||||
wm, roles: use user exec domain attribute
|
||||
hadoop, roles: use user exec domain attribute
|
||||
shutdown, roles: use user exec domain attribute
|
||||
cryfs, roles: use user exec domain attribute
|
||||
wine: use user exec domain attribute
|
||||
mono: use user exec domain attribute
|
||||
sudo: add tunable to control user exec domain access
|
||||
su: add tunable to control user exec domain access
|
||||
shutdown: add tunable to control user exec domain access
|
||||
mpd, pulseaudio: split domtrans and client access
|
||||
mcs: deprecate mcs overrides
|
||||
mcs: restrict create, relabelto on mcs files
|
||||
fs: add pseudofs attribute and interfaces
|
||||
devices: make usbfs pseudofs instead of noxattrfs
|
||||
git: fix typo in git hook exec access
|
||||
dovecot, spamassassin: allow dovecot to execute spamc
|
||||
mta, spamassassin: fixes for rspamd
|
||||
certbot, various: allow various services to read certbot certs
|
||||
usbguard, sysadm: misc fixes
|
||||
ssh: fix for polyinstantiation
|
||||
sysadm, systemd: fixes for systemd-networkd
|
||||
asterisk: allow reading generic certs
|
||||
bind: fixes for unbound
|
||||
netutils: fix ping
|
||||
policykit, systemd: allow policykit to watch systemd logins and sessions
|
||||
spamassassin: fix file contexts for rspamd symlinks
|
||||
mcs: add additional constraints to databases
|
||||
mcs: constrain misc IPC objects
|
||||
mcs: combine single-level object creation constraints
|
||||
various: deprecate mcs override interfaces
|
||||
corenet: make netlabel_peer_t mcs constrained
|
||||
mcs: constrain context contain access
|
||||
mcs: only constrain mcs_constrained_type for db accesses
|
||||
guest, xguest: remove apache role access
|
||||
wine: fix roleattribute statement
|
||||
testing: accept '@' as a valid ending character in filecon checker
|
||||
users: remove MCS categories from default users
|
||||
various: remove various mcs ranged transitions
|
||||
kernel: add various supporting interfaces for containers
|
||||
kernel, rpc, systemd: deprecate kernel_mounton_proc
|
||||
devices, kernel: deprecate dev_mounton_sysfs
|
||||
devices: add interfaces to remount sysfs and device filesystems
|
||||
init: add interface to run init bpf programs
|
||||
systemd: add interface to dbus chat with systemd-machined
|
||||
userdom: add interfaces to relabel generic user home content
|
||||
init: add interface to setsched on init
|
||||
init: allow systemd to renice all other domains
|
||||
sysnetwork: add interfaces for /run/netns
|
||||
container, virt: move svirt lxc domains to new container module
|
||||
container: svirt_lxc_net_t is now container_t
|
||||
container: fixup rules
|
||||
container: add interface to identify container mountpoints
|
||||
various: make various types a mountpoint for containers
|
||||
container: add base attributes for containers and container engines
|
||||
container: initial support for container engines
|
||||
container, gpg, userdom: allow container engines to execute gpg
|
||||
container: allow containers to use container ptys
|
||||
container, mount: allow mount to getattr on container fs
|
||||
various: various userns capability permissions
|
||||
container: allow containers the chroot capability
|
||||
container: allow containers various userns capabilities
|
||||
container: allow containers to watch all container files
|
||||
container, podman: initial support for podman
|
||||
filesystem: add supporting FUSEFS interfaces
|
||||
dbus: add supporting interfaces and rules for rootless podman
|
||||
systemd: add private type for systemd user manager units
|
||||
container: add role access templates
|
||||
container, podman, systemd: initial support for rootless podman
|
||||
container: add required admin rules
|
||||
sysadm: allow container admin access
|
||||
container: call podman access in container access
|
||||
staff, unconfined: allow container user access
|
||||
container: add policy for privileged containers
|
||||
container: allow containers to read read-only container files
|
||||
container: add tunable for containers to manage cgroups
|
||||
container: add tunables for containers to use nfs and cifs
|
||||
container: add tunable to allow engines to mounton non security
|
||||
container, iptables: dontaudit iptables rw on /ptmx
|
||||
xdg: add interface to search xdg data directories
|
||||
container, podman: add policy for conmon
|
||||
kernel: add filetrans interface for unlabeled dirs
|
||||
container, docker: add initial support for docker
|
||||
container: call docker access in container access
|
||||
userdomain: add type for user bin files
|
||||
systemd: allow systemd user managers to execute user bin files
|
||||
systemd: use stream socket perms in systemd_user_app_status
|
||||
systemd: add supporting interfaces for user daemons
|
||||
rootlesskit: new policy module
|
||||
container, docker, rootlesskit: add support for rootless docker
|
||||
docker: call rootlesskit access in docker access
|
||||
container: drop old commented rules
|
||||
lxc_contexts: add ro_file and sandbox_lxc_process contexts
|
||||
container: allow containers to getsession
|
||||
docker: make rootlesskit optional
|
||||
docker: add missing call to init_daemon_domain()
|
||||
podman: add explicit range transition for conmon
|
||||
init: split access for systemd runtime units
|
||||
dbus: fixes for dbus-broker
|
||||
dbus, policykit: add tunables for dbus-broker access
|
||||
docker, podman: container units now have the runtime unit type
|
||||
init: allow systemd to nnp_transition and nosuid_transition to daemon
|
||||
domains
|
||||
files, init: allow init to remount filesystems mounted on /boot
|
||||
sudo: fixes for polyinstantiation
|
||||
locallogin: fix for polyinstantiation
|
||||
authlogin: dontaudit getcap chkpwd
|
||||
systemd: various fixes
|
||||
systemd: add support for systemd-resolved stubs
|
||||
getty, locallogin: cgroup fixes
|
||||
unconfined: fixes for bluetooth dbus chat and systemd
|
||||
udev: allow udev to start the systemd system object
|
||||
networkmanager: allow getting systemd system status
|
||||
container, podman: allow podman to create and write config files
|
||||
podman: allow system podman to interact with container transient units
|
||||
podman: fix role associations
|
||||
container, podman: allow containers to interact with conmon
|
||||
podman: add rules for systemd container units
|
||||
container, init: allow init to remount container filesystems
|
||||
container: allow generic containers to read the vm_overcommit sysctl
|
||||
container: add tunables to allow containers to access public content
|
||||
container: add missing capabilities
|
||||
container: also allow containers to watch public content
|
||||
podman: allow podman to watch journal dirs
|
||||
sysadm: allow sysadm to watch journal directories
|
||||
git: add missing file contexts
|
||||
udica-templates: initial commit of udica templates
|
||||
makefile: add install target for udica templates
|
||||
github: test install of udica templates
|
||||
|
||||
Laurent Bigonville (2):
|
||||
docker: On debian dockerd and docker-proxy are in /usr/sbin
|
||||
container: On Debian, runc is installed in /usr/sbin
|
||||
|
||||
Pedro (1):
|
||||
File context for nginx cache files
|
||||
|
||||
Russell Coker (8):
|
||||
remove aliases from 20210203
|
||||
dontaudit net_admin without hide_broken_symptoms
|
||||
puppet V3
|
||||
matrixd-synapse policy V3
|
||||
mailman3 V3
|
||||
certbot V3
|
||||
init dbus patch for GetDynamicUsers with systemd_use_nss() V2
|
||||
new sddm V2
|
||||
|
||||
Vit Mojzis (1):
|
||||
Improve error message on duplicate definition of interface
|
||||
|
||||
Yi Zhao (24):
|
||||
rpc: remove obsolete comment line
|
||||
secadm: allow secadm to read selinux policy
|
||||
rpcbind: allow sysadm to run rpcinfo
|
||||
samba: allow smbd_t to send and receive messages from avahi over dbus
|
||||
rpc: add dac_read_search capability for rpcd_t
|
||||
bluetooth: fixes for bluetoothd
|
||||
avahi: allow avahi_t to watch /etc/avahi directory
|
||||
udev: allow udev_t to watch udev_rules_t dir
|
||||
rpc: allow rpc.mountd to list/watch NFS server directory
|
||||
usermanage: do not audit attempts to getattr of proc for passwd_t and
|
||||
useradd_t
|
||||
selinuxutil: allow setfiles_t to read kernel sysctl
|
||||
rngd: fixes for rngd
|
||||
dbus: allow dbus-daemon to map SELinux status page
|
||||
bind: fixes for bind
|
||||
passwd: allow passwd to map SELinux status page
|
||||
ipsec: fixes for strongswan
|
||||
samba: fixes for smbd/nmbd
|
||||
ntp: allow ntpd to set rlimit_memlock
|
||||
ssh: do not audit attempts by ssh-keygen to read proc
|
||||
acpid: allow acpid to watch the directories in /dev
|
||||
bluetooth: allow bluetoothd to create alg_socket
|
||||
systemd: allow systemd-hostnamed to read udev runtime files
|
||||
su: allow su to map SELinux status page
|
||||
modutils: allow kmod_t to write keys
|
||||
|
||||
* Wed Sep 08 2021 Chris PeBenito <pebenito@ieee.org> - 2.20210908
|
||||
Andreas Freimuth (2):
|
||||
Prefer user_fonts_config_t over xdg_config_t
|
||||
|
|
Loading…
Reference in New Issue