Oracle Linux 6277 Published by

A selinux-policy bug fix and enhancement update has been released for Oracle Linux 9.



El-errata: ELBA-2023-0669 Oracle Linux 9 selinux-policy bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2023-0669

  http://linux.oracle.com/errata/ELBA-2023-0669.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
selinux-policy-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-devel-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-doc-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-mls-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-sandbox-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-targeted-34.1.43-1.0.3.el9_1.1.noarch.rpm

aarch64:
selinux-policy-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-devel-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-doc-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-mls-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-sandbox-34.1.43-1.0.3.el9_1.1.noarch.rpm
selinux-policy-targeted-34.1.43-1.0.3.el9_1.1.noarch.rpm

SRPMS:
  http://oss.oracle.com/ol9/SRPMS-updates//selinux-policy-34.1.43-1.0.3.el9_1.1.src.rpm


Description of changes:

[34.1.43-1.0.3]
- Label /var/log/kdump.log with kdump_log_t [Orabug: 33810371]
- Allow svirt_t domain to mmap svirt_image_t character files [Orabug: 34908824]
- Allow system dbus daemon to watch generic /var/lib directory [Orabug: 34375044]
- Allow rpm_t sys_admin capability [Orabug: 34250651]
- Revert "Dontaudit domain the fowner capability" [Orabug: 33952489]
- Make systemd_tmpfiles_t MLS trusted for lowering the level of files [Orabug: 33841245]
- Allow nfsd_t to list exports_t dirs [Orabug: 33844301]
- Allow fsadm_t to get attributes of cgroup filesystems [Orabug: 33841268]
- Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t [Orabug: 33841205]
- Allow udev to watch fixed disk devices [Orabug: 33841093]
- Allow tuned_t to read the process state of all domains [Orabug: 33520684]
- Allow initrc_t to manage pid files used by chronyd [Orabug: 33520623]
- Make import-state work with mls policy [Orabug: 32636699]
- Add map permission to lvm_t on lvm_metadata_t. [Orabug: 31405325]
- Add comment for map on lvm_metadata_t. [Orabug: 31405325]
- Make iscsiadm work with mls policy [Orabug: 32725411]
- Make cloud-init work with mls policy [Orabug: 32430460]
- Allow systemd-pstore to transfer files from /sys/fs/pstore [Orabug: 31594666]
- Make smartd work with mls policy [Orabug: 32430379]
- Allow sysadm_t to mmap modules_object_t files [Orabug: 32411855]
- Allow tuned_t to execute systemd_systemctl_exec_t files [Orabug: 32355342]
- Make logrotate work with mls policy [Orabug: 32343731]
- Make udev work with mls policy [Orabug: 31405299]
- Make tuned work with mls policy [Orabug: 31396024]
- Make lsmd, rngd, and kdumpctl work with mls policy [Orabug: 31405378]
- Allow virt_domain to mmap virt_content_t files [Orabug: 30932671]
- Enable NetworkManager and dhclient to use initramfs-configured DHCP connection [Orabug: 30537515]
- Enable policykit and sssd policy modules with minimum policy [Orabug: 29744511]
- Allow cloud_init_t to dbus chat with systemd_logind_t [Orabug: 29399653]
- Allow udev_t to load modules [Orabug: 28260775]
- Add vhost-scsi to be vhost_device_t type [Orabug: 27774921]
- Fix container selinux policy [Orabug: 26427364]
- Allow ocfs2_dlmfs to be mounted with ocfs2_dlmfs_t type. [Orabug: 13333429]

[34.1.43-1.1]
- Add domain_unix_read_all_semaphores() interface
Resolves: rhbz#2136760
- Allow rhcd compute selinux access vector
Resolves: rhbz#2136760
- Add file context entries for insights-client and rhc
Resolves: rhbz#2136760
- Revert "Allow insights-client run lpr and allow the proper role"
Resolves: rhbz#2136760
- Allow insights-client dbus chat with various services
Resolves: rhbz#2136760
- Allow insights-client tcp connect to various ports
Resolves: rhbz#2136760
- Allow insights-client run lpr and allow the proper role
Resolves: rhbz#2136760
- Allow insights-client work with pcp and manage user config files
Resolves: rhbz#2136760
- Allow insights-client dbus chat with abrt
Resolves: rhbz#2136760
- Allow insights client communicate with cupsd, mysqld, openvswitch, redis
Resolves: rhbz#2136760
- Allow insights client read raw memory devices
Resolves: rhbz#2136760
- Allow insights-client domain transition on semanage execution
Resolves: rhbz#2136760
- Allow insights-client create gluster log dir with a transition
Resolves: rhbz#2136760
- Allow insights-client manage generic locks
Resolves: rhbz#2136760
- Allow insights-client unix_read all domain semaphores
Resolves: rhbz#2136760
- Allow insights-client manage samba var dirs
Resolves: rhbz#2136760
- Allow insights-client send null signal to rpm and system cronjob
Resolves: rhbz#2136760
- Allow insights-client connect to postgresql with a unix socket
Resolves: rhbz#2136760
- Allow insights-client domtrans on unix_chkpwd execution
Resolves: rhbz#2136760

_______________________________________________