Fedora 14 Update: selinux-policy-3.9.7-14.fc14

updates at fedoraproject.org updates at fedoraproject.org
Sun Dec 5 00:38:06 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-18460
2010-12-02 18:50:26
--------------------------------------------------------------------------------

Name        : selinux-policy
Product     : Fedora 14
Version     : 3.9.7
Release     : 14.fc14
URL         : http://oss.tresys.com/repos/refpolicy/
Summary     : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision  2.20091117

--------------------------------------------------------------------------------
Update Information:

- Allow clear dac overrides
- Fix dirsrv.te to talk to rpcbind
- certmonger needs to manage dirsrv data
- Allow posftfix-smtpd to connect to dovecot unix domain stream socket
- Allow ssh_keygen to generate files in /root/.ssh
--------------------------------------------------------------------------------
ChangeLog:

* Wed Dec  1 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-14
- Allow clear dac overrides
- Fix dirsrv.te to talk to rpcbind
- certmonger needs to manage dirsrv data
- Allow posftfix-smtpd to connect to dovecot unix domain stream socket
- Allow ssh_keygen to generate files in /root/.ssh
* Mon Nov 22 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-13
- Allow ddclient to fix file mode bits of ddclient conf file
- Add labels for /etc/lirc directory
- Allow amavis_t to exec shell
- Add label for gssd_tmp_t for /var/tmp/nfs_0
* Thu Nov 18 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-12
- Add xdm_exec_bootloader boolean
- Allow cgconfig fsetid capability
- Allow logwatch and cron to mls_read_to_clearance for MLS boxes
- Allow wm to send signull to all applications and receive them from users
- lircd patch from field
- Patch for Stephen Beahm for ulogd policy
- Turn on pyzor policy
* Mon Nov 15 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-11
- Allow mysqld-safe to send system log messages
- Fix label for lxdm.sock
- Fixes for ddclient policy
- Allow munin plugins to search /var/lib directory
- Allow gpsd to read sysfs_t 
- Add label for acroread
- Add dirsrv and dirsrv-admin policy
- Allow saslauthd_t to create krb5_host_rcache_t files in /tmp
* Wed Nov 10 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-10
- Turn on ddclient policy
- Allow mount to set the attributes of all mount points
- Allow bitlbee setsched
- Allow groupd transition to fenced domain when executes fence_node
- Fixes for rchs policy
- Fixes for puppetmaster
* Mon Nov  8 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-9
- Fixes for corosync policy
- Add initial drbd policy
- Allow mpd to be able to read samba/nfs files
* Mon Nov  1 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-8
- Allow NetworkManager to read openvpn_etc_t
- Dontaudit hplip to write of /usr dirs
- Allow system_mail_t to create /root/dead.letter as mail_home_t
- Add vdagent policy for spice agent daemon
* Thu Oct 28 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-7
- Dontaudit sandbox sending sigkill to all user domains
- Add policy for rssh_chroot_helper
- Add missing flask definitions
- Allow udev to relabelto removable_t
- Fix label on /var/log/wicd.log
- Transition to initrc_t from init when executing bin_t
- Add audit_access permissions to file
- Make removable_t a device_node 
- Fix label on /lib/systemd/*
* Fri Oct 22 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-6
- Fixes for systemd to manage /var/run
- Dontaudit leaks by firstboot
* Tue Oct 19 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-5
- Allow chome to create netlink_route_socket
- Add additional MATHLAB file context
- Define nsplugin as an application_domain
- Dontaudit sending signals from sandboxed domains to other domains
- systemd requires init to build /tmp /var/auth and /var/lock dirs
- mount wants to read devicekit_power /proc/ entries
- mpd wants to connect to soundd port
- Openoffice causes a setattr on a lib_t file for normal users, add dontaudit
- Treat lib_t and textrel_shlib_t directories the same
- Allow mount read access on virtual images
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #658645 - SELinux is preventing /usr/sbin/snmptrapd "connectto" access      on /var/agentx/master.
        https://bugzilla.redhat.com/show_bug.cgi?id=658645
  [ 2 ] Bug #658407 - SELinux está negando a /sbin/cgclear el acceso "dac_override"
        https://bugzilla.redhat.com/show_bug.cgi?id=658407
  [ 3 ] Bug #658593 - SELinux prevents node_bind for ns-slapd
        https://bugzilla.redhat.com/show_bug.cgi?id=658593
  [ 4 ] Bug #658583 - certmonger cannot track 389-ds certificates
        https://bugzilla.redhat.com/show_bug.cgi?id=658583
  [ 5 ] Bug #658337 - SELinux is preventing /opt/google/chrome/chrome "getattr" access      on unix_stream_socket.
        https://bugzilla.redhat.com/show_bug.cgi?id=658337
  [ 6 ] Bug #649663 - SELinux is preventing /usr/libexec/postfix/smtpd "connectto" access      on /var/spool/postfix/private/auth.
        https://bugzilla.redhat.com/show_bug.cgi?id=649663
  [ 7 ] Bug #656518 - SELinux policy denies dovecot's bind to TCP LMTP port.
        https://bugzilla.redhat.com/show_bug.cgi?id=656518
  [ 8 ] Bug #638691 - SELinux is preventing /usr/sbin/openvpn "search" access      on /home/erinn/Documents.
        https://bugzilla.redhat.com/show_bug.cgi?id=638691
  [ 9 ] Bug #657947 - SELinux is preventing /sbin/ifconfig "search" access for ddclient.
        https://bugzilla.redhat.com/show_bug.cgi?id=657947
  [ 10 ] Bug #656856 - SELinux is preventing /bin/bash "signal" access     .
        https://bugzilla.redhat.com/show_bug.cgi?id=656856
  [ 11 ] Bug #650814 - SELinux is preventing /usr/sbin/httpd from using potentially mislabeled files /var/lib/git
        https://bugzilla.redhat.com/show_bug.cgi?id=650814
  [ 12 ] Bug #655728 - SELinux block write acces to /var/log/ for cgrulesengd
        https://bugzilla.redhat.com/show_bug.cgi?id=655728
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list