Fedora 14 Update: selinux-policy-3.9.0-2.fc14
updates at fedoraproject.org
updates at fedoraproject.org
Wed Sep 8 04:32:44 UTC 2010
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-13709
2010-08-30 19:33:59
--------------------------------------------------------------------------------
Name : selinux-policy
Product : Fedora 14
Version : 3.9.0
Release : 2.fc14
URL : http://oss.tresys.com/repos/refpolicy/
Summary : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision 2.20091117
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #628270 - SELinux is preventing /sbin/setfiles from creating a file with a context of cgroup_t on a filesystem.
https://bugzilla.redhat.com/show_bug.cgi?id=628270
[ 2 ] Bug #627191 - SELinux is preventing /usr/bin/gconftool-2 "create" access on linc-92e-0-1a9593a234557.
https://bugzilla.redhat.com/show_bug.cgi?id=627191
[ 3 ] Bug #627724 - SELinux is preventing /sbin/blkid "read" access on dm-4.
https://bugzilla.redhat.com/show_bug.cgi?id=627724
[ 4 ] Bug #627751 - SELinux is preventing /bin/bash "getattr" access on /sbin/modprobe.
https://bugzilla.redhat.com/show_bug.cgi?id=627751
[ 5 ] Bug #627757 - SELinux is preventing /lib/systemd/systemd-logger "sendto" access on @/org/freedesktop/systemd1/notify.
https://bugzilla.redhat.com/show_bug.cgi?id=627757
[ 6 ] Bug #627793 - SELinux is preventing /bin/bash "execute" access on /bin/mountpoint.
https://bugzilla.redhat.com/show_bug.cgi?id=627793
[ 7 ] Bug #627844 - SELinux is preventing /usr/libexec/upowerd (deleted) "read" access on random.
https://bugzilla.redhat.com/show_bug.cgi?id=627844
[ 8 ] Bug #627879 - SELinux is preventing /sbin/dmsetup "associate" access .
https://bugzilla.redhat.com/show_bug.cgi?id=627879
[ 9 ] Bug #627843 - SELinux is preventing /lib/udev/iphone-set-info "search" access on /root/.config.
https://bugzilla.redhat.com/show_bug.cgi?id=627843
[ 10 ] Bug #627869 - SELinux is preventing /usr/bin/Xorg "unix_read" access .
https://bugzilla.redhat.com/show_bug.cgi?id=627869
[ 11 ] Bug #627733 - SELinux is preventing /usr/sbin/libvirtd "relabelfrom" access on system-config-firewall.augnew.
https://bugzilla.redhat.com/show_bug.cgi?id=627733
[ 12 ] Bug #627734 - SELinux is preventing /bin/mountpoint "execute" access on /bin/mountpoint.
https://bugzilla.redhat.com/show_bug.cgi?id=627734
[ 13 ] Bug #627735 - SELinux is preventing /sbin/consoletype "execute" access on /sbin/consoletype.
https://bugzilla.redhat.com/show_bug.cgi?id=627735
[ 14 ] Bug #628454 - SELinux is preventing Xorg "read" access .
https://bugzilla.redhat.com/show_bug.cgi?id=628454
[ 15 ] Bug #628392 - SELinux is preventing /bin/bash access to a leaked /bin/sh file descriptor.
https://bugzilla.redhat.com/show_bug.cgi?id=628392
[ 16 ] Bug #628284 - SELinux is preventing /usr/sbin/tzdata-update "read" access on clock.
https://bugzilla.redhat.com/show_bug.cgi?id=628284
[ 17 ] Bug #628225 - SELinux is preventing /sbin/depmod access to a leaked /var/cache/akmods/nvidia/.last.log file descriptor.
https://bugzilla.redhat.com/show_bug.cgi?id=628225
[ 18 ] Bug #628257 - O SELinux está impedindo que o /sbin/ldconfig acesse um descritor de arquivo vazado do /home/cleiton/.cache/gwibber/gwibber.log.
https://bugzilla.redhat.com/show_bug.cgi?id=628257
[ 19 ] Bug #628021 - SELinux is preventing /usr/bin/Xorg (deleted) "unix_write" access .
https://bugzilla.redhat.com/show_bug.cgi?id=628021
[ 20 ] Bug #628025 - SELinux is preventing /bin/bash "write" access on /tmp.
https://bugzilla.redhat.com/show_bug.cgi?id=628025
[ 21 ] Bug #628027 - SELinux is preventing /sbin/consoletype "read" access on /var/log/pm-suspend.log.
https://bugzilla.redhat.com/show_bug.cgi?id=628027
[ 22 ] Bug #628598 - SELinux is preventing /sbin/hdparm "read" access on sda.
https://bugzilla.redhat.com/show_bug.cgi?id=628598
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list