Fedora 14 Update: selinux-policy-3.9.7-14.fc14
updates at fedoraproject.org
updates at fedoraproject.org
Sun Dec 5 00:38:06 UTC 2010
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-18460
2010-12-02 18:50:26
--------------------------------------------------------------------------------
Name : selinux-policy
Product : Fedora 14
Version : 3.9.7
Release : 14.fc14
URL : http://oss.tresys.com/repos/refpolicy/
Summary : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision 2.20091117
--------------------------------------------------------------------------------
Update Information:
- Allow clear dac overrides
- Fix dirsrv.te to talk to rpcbind
- certmonger needs to manage dirsrv data
- Allow posftfix-smtpd to connect to dovecot unix domain stream socket
- Allow ssh_keygen to generate files in /root/.ssh
--------------------------------------------------------------------------------
ChangeLog:
* Wed Dec 1 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-14
- Allow clear dac overrides
- Fix dirsrv.te to talk to rpcbind
- certmonger needs to manage dirsrv data
- Allow posftfix-smtpd to connect to dovecot unix domain stream socket
- Allow ssh_keygen to generate files in /root/.ssh
* Mon Nov 22 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-13
- Allow ddclient to fix file mode bits of ddclient conf file
- Add labels for /etc/lirc directory
- Allow amavis_t to exec shell
- Add label for gssd_tmp_t for /var/tmp/nfs_0
* Thu Nov 18 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-12
- Add xdm_exec_bootloader boolean
- Allow cgconfig fsetid capability
- Allow logwatch and cron to mls_read_to_clearance for MLS boxes
- Allow wm to send signull to all applications and receive them from users
- lircd patch from field
- Patch for Stephen Beahm for ulogd policy
- Turn on pyzor policy
* Mon Nov 15 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-11
- Allow mysqld-safe to send system log messages
- Fix label for lxdm.sock
- Fixes for ddclient policy
- Allow munin plugins to search /var/lib directory
- Allow gpsd to read sysfs_t
- Add label for acroread
- Add dirsrv and dirsrv-admin policy
- Allow saslauthd_t to create krb5_host_rcache_t files in /tmp
* Wed Nov 10 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-10
- Turn on ddclient policy
- Allow mount to set the attributes of all mount points
- Allow bitlbee setsched
- Allow groupd transition to fenced domain when executes fence_node
- Fixes for rchs policy
- Fixes for puppetmaster
* Mon Nov 8 2010 Miroslav Grepl <mgrepl at redhat.com> 3.9.7-9
- Fixes for corosync policy
- Add initial drbd policy
- Allow mpd to be able to read samba/nfs files
* Mon Nov 1 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-8
- Allow NetworkManager to read openvpn_etc_t
- Dontaudit hplip to write of /usr dirs
- Allow system_mail_t to create /root/dead.letter as mail_home_t
- Add vdagent policy for spice agent daemon
* Thu Oct 28 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-7
- Dontaudit sandbox sending sigkill to all user domains
- Add policy for rssh_chroot_helper
- Add missing flask definitions
- Allow udev to relabelto removable_t
- Fix label on /var/log/wicd.log
- Transition to initrc_t from init when executing bin_t
- Add audit_access permissions to file
- Make removable_t a device_node
- Fix label on /lib/systemd/*
* Fri Oct 22 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-6
- Fixes for systemd to manage /var/run
- Dontaudit leaks by firstboot
* Tue Oct 19 2010 Dan Walsh <dwalsh at redhat.com> 3.9.7-5
- Allow chome to create netlink_route_socket
- Add additional MATHLAB file context
- Define nsplugin as an application_domain
- Dontaudit sending signals from sandboxed domains to other domains
- systemd requires init to build /tmp /var/auth and /var/lock dirs
- mount wants to read devicekit_power /proc/ entries
- mpd wants to connect to soundd port
- Openoffice causes a setattr on a lib_t file for normal users, add dontaudit
- Treat lib_t and textrel_shlib_t directories the same
- Allow mount read access on virtual images
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #658645 - SELinux is preventing /usr/sbin/snmptrapd "connectto" access on /var/agentx/master.
https://bugzilla.redhat.com/show_bug.cgi?id=658645
[ 2 ] Bug #658407 - SELinux está negando a /sbin/cgclear el acceso "dac_override"
https://bugzilla.redhat.com/show_bug.cgi?id=658407
[ 3 ] Bug #658593 - SELinux prevents node_bind for ns-slapd
https://bugzilla.redhat.com/show_bug.cgi?id=658593
[ 4 ] Bug #658583 - certmonger cannot track 389-ds certificates
https://bugzilla.redhat.com/show_bug.cgi?id=658583
[ 5 ] Bug #658337 - SELinux is preventing /opt/google/chrome/chrome "getattr" access on unix_stream_socket.
https://bugzilla.redhat.com/show_bug.cgi?id=658337
[ 6 ] Bug #649663 - SELinux is preventing /usr/libexec/postfix/smtpd "connectto" access on /var/spool/postfix/private/auth.
https://bugzilla.redhat.com/show_bug.cgi?id=649663
[ 7 ] Bug #656518 - SELinux policy denies dovecot's bind to TCP LMTP port.
https://bugzilla.redhat.com/show_bug.cgi?id=656518
[ 8 ] Bug #638691 - SELinux is preventing /usr/sbin/openvpn "search" access on /home/erinn/Documents.
https://bugzilla.redhat.com/show_bug.cgi?id=638691
[ 9 ] Bug #657947 - SELinux is preventing /sbin/ifconfig "search" access for ddclient.
https://bugzilla.redhat.com/show_bug.cgi?id=657947
[ 10 ] Bug #656856 - SELinux is preventing /bin/bash "signal" access .
https://bugzilla.redhat.com/show_bug.cgi?id=656856
[ 11 ] Bug #650814 - SELinux is preventing /usr/sbin/httpd from using potentially mislabeled files /var/lib/git
https://bugzilla.redhat.com/show_bug.cgi?id=650814
[ 12 ] Bug #655728 - SELinux block write acces to /var/log/ for cgrulesengd
https://bugzilla.redhat.com/show_bug.cgi?id=655728
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list