SUSE-RU-2025:1181-1: moderate: Recommended update for container-selinux

SLE-UPDATES null at suse.de
Wed Apr 9 08:30:06 UTC 2025



# Recommended update for container-selinux

Announcement ID: SUSE-RU-2025:1181-1  
Release Date: 2025-04-09T07:30:57Z  
Rating: moderate  
References:

  * bsc#1207054
  * bsc#1207077
  * bsc#1221720

  
Affected Products:

  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro for Rancher 5.4

  
  
An update that has three fixes can now be installed.

## Description:

This update for container-selinux fixes the following issues:

  * Update to version 2.236.0:

  * Allow super privileged containers to use RealtimeKit for scheduling

  * Add container_ro_file_t to the podman artifact store

  * Update to version 2.235.0:

  * Bump to v2.235.0

  * container_log{reader,writer}_t: allow watch file
  * RPM: Update gating config
  * Enable aarch64 testing
  * TMT: simplify podman tests
  * feat: support /var/lib/crio

  * Update to version 2.234.2:

  * TMT: enable epel idomatically

  * Packit: switch back to fedora-all
  * RPM: Bump Epoch to 4
  * rpm: ship manpage
  * Add proper labeling for RamaLama
  * Packit: remove rhel / epel jobs
  * packit: remove unused file

  * Update to version 2.233.0:

  * container_engine_t: small change to allow non root exec in a container

  * RPM: explicitly list ghosted paths and skip mode verification
  * container-selinux install on non selinux-policy-targeted systems (#332)
  * set container_log_t type for /var/log/kube-apiserver
  * Allow kubelet_t to create a sock file kubelet_var_lib_t
  * dontaudit spc_t to mmap_zero
  * Packit: update targets (#330)
  * container_engine_t: another round of small improvements (#327)
  * Allow container_device_plugin_t to use the network (#325)
  * RPM: cleanup changelog (#324)
  * TMT: Simplify tests

  * Update to version 2.232.1:

  * TMT: fix srpm download syntax on rawhide

  * Packit: remove `update_release` key from downstream jobs (#313)
  * Update container-selinux.8 man page
  * Add ownership of /usr/share/udica (#312)
  * Packit/TMT: upstream maintenance of downstream gating tests
  * extend container_engine_t again
  * Allow spc_t to use localectl
  * Allow spc_t to use timedatectl
  * introduce container_use_xserver_devices boolean to allow GPU access

  * Update to version 2.231.0:

  * Allow container domains to communicate with spc_t unix_stream_sockets

  * Move to %posttrans to ensure selinux-policy got updated before the commands
    run (bsc#1221720)

  * Manual update to version 2.230.0+git4.a8e389d to include this commit that is
    needed for the main selinux-policy update to work:

  * Rename all /var/run file context entries to /run

  * Update to version 2.230.0:

  * Move to tar_scm based packaging: added _service and _servicedata

  * Allow containers to unmount file systems
  * Add buildah as a container_runtime_exec_t label
  * Additional rules for container_user_t
  * improve container_engine_t

  * Update to version 2.228:

  * Allow container domains to watch fifo_files

  * container_engine_t: improve for podman in kubernetes case
  * Allow spc_t to transition to install_t domain
  * Default to allowing containers to use dri devices
  * Allow access to BPF Filesystems
  * Fix kubernetes transition rule
  * Label kubensenter as well as kubenswrapper
  * Allow container domains to execute container_runtime_tmpfs_t files
  * Allow container domains to ptrace themselves
  * Allow container domains to use container_runtime_tmpfs_t as an entrypoint
  * Add boolean to allow containers to use dri devices
  * Give containers access to pod resources endpoint
  * Label kubenswrapper kubelet_exec_t

  * Update to version 2.222:

  * Allow containers to read/write inherited dri devices

  * Update to version 2.221:

  * Allow containers to shutdown sockets inherited from container runtimes

  * Allow spc_t to use execmod libraries on container file systems
  * Add boolean to allow containers to read all cert files
  * More MLS Policy allow rules
  * Allow container runtimes using pasta bind icmp_socket to port_t
  * Fix spc_t transitions from container_runtime_domain

  * Update to version 2.215.0:

  * Add some MLS rules to policy

  * Allow container runtime to dyntransition to spc_t
  * Tighten controls on confined users
  * Add labels for /var/lib/shared
  * Cleanup entrypoint definitions
  * Allow container_device_plugin_t access to debugfs
  * Allow containers which use devices to map them

  * Update to version 2.211.0:

  * Don't transition to initrc_t domains from spc_t
  * Add tunable to allow sshd_t to launch container engines
  * Allow syslogd_t gettatr on inheritited runtime tmpfs files
  * Add container_file_t and container_ro_file_t as user_home_type
  * Set default context for local-path-provisioner
  * Allow daemon to send dbus messages to spc_t by

  * Update to version 2.206.0:

  * Allow unconfined domains to transition to container_runtime_t
  * Allow container domains to transition to install_t
  * Allow avirt_sandbox_domain to manage container_file_t types
  * Allow containers to watch sysfs_t directories
  * Allow spc_t to transption to rpm_script_t
  * Smaller permission changes for container_init_t
  * Drop spc.patch, is now included

  * Update to version 2.198.0:

  * Fix spc_t transition rules on tmpfs_t
  * Changes from 2.197.0:
  * Add boolean containers_use_ecryptfs policy
  * Changes from 2.195.1:
  * Readd missing allow rules for container_t
  * Changes from 2.194.0:
  * Allow syslogd_t to use tmpfs files created by container runtime
  * Changes from 2.193.0:
  * Allow containers to mount tmpfs_t file systems
  * Label spc_t as a init initrc daemon
  * Allow userdomains to run containers
  * Changes from 2.191.0:
  * Create container_logwriter_t type
  * Changes from 2.190.1:
  * Support BuildKit
  * container.fc: Set label for kata-agent
  * support nerdctl
  * Changes from 2.190.0:
  * Packit: initial enablement
  * Allow iptables to list directories labeled as container_file_t

  * Changes from 2.189.0:

  * Dont audit searching other processes in /proc.

  * Allow privileged containers to use localectl (bsc#1207077)

  * Allow privileged containers to use timedatectl (bsc#1207054)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Micro for Rancher 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2025-1181=1

  * SUSE Linux Enterprise Micro 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2025-1181=1

## Package List:

  * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
    * container-selinux-2.236.0-150400.3.3.1
  * SUSE Linux Enterprise Micro 5.4 (noarch)
    * container-selinux-2.236.0-150400.3.3.1

## References:

  * https://bugzilla.suse.com/show_bug.cgi?id=1207054
  * https://bugzilla.suse.com/show_bug.cgi?id=1207077
  * https://bugzilla.suse.com/show_bug.cgi?id=1221720

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250409/9467007a/attachment.htm>


More information about the sle-updates mailing list