Fedora 15 Update: selinux-policy-3.9.16-15.fc15

updates at fedoraproject.org updates at fedoraproject.org
Fri Apr 15 21:33:27 UTC 2011


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-5311
2011-04-14 00:31:10
--------------------------------------------------------------------------------

Name        : selinux-policy
Product     : Fedora 15
Version     : 3.9.16
Release     : 15.fc15
URL         : http://oss.tresys.com/repos/refpolicy/
Summary     : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision  2.20091117

--------------------------------------------------------------------------------
Update Information:

- xdm_t needs getsession for switch user
- Every app that used to exec init is now execing systemdctl
- Allow squid to manage krb5_host_rcache_t files
- Allow foghorn to connect to agentx port
- Fixes for colord policy
- Need to allow apps that use locks to read /var/lock if it is a symlink
- Allow systemd to create tasks
- Logwatch reads /etc/sysctl.conf and /proc/sys/net/ipv4/ip_forward
- Fixes for foghorn policy
- Add labeling for systemd unit files
- Allow gnomeclok to enable ntpd service using systemctl - systemd_systemctl_t domain was added
- Add label for matahari-broker.pid file
- We want to remove untrustedmcsprocess from ability to read /proc/pid
- Fixes for matahari policy


--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #689143 - SELinux is preventing /usr/bin/metacity from 'getattr' accesses on the sock_file /tmp/at-spi2/socket-1413-1804289383.
        https://bugzilla.redhat.com/show_bug.cgi?id=689143
  [ 2 ] Bug #695683 - SELinux is preventing /usr/libexec/colord from 'write' accesses on the sock_file log.
        https://bugzilla.redhat.com/show_bug.cgi?id=695683
  [ 3 ] Bug #695684 - SELinux is preventing /usr/libexec/colord from 'write' accesses on the chr_file /dev/parport0.
        https://bugzilla.redhat.com/show_bug.cgi?id=695684
  [ 4 ] Bug #695688 - SELinux is preventing /usr/libexec/colord from 'search' accesses on the directory /etc/hp.
        https://bugzilla.redhat.com/show_bug.cgi?id=695688
  [ 5 ] Bug #695689 - SELinux is preventing /usr/libexec/colord from 'write' accesses on the chr_file 003.
        https://bugzilla.redhat.com/show_bug.cgi?id=695689
  [ 6 ] Bug #695789 - SELinux is preventing /bin/bash from 'execute' accesses on the file /bin/systemctl.
        https://bugzilla.redhat.com/show_bug.cgi?id=695789
  [ 7 ] Bug #695818 - SELinux is preventing /bin/bash from 'execute' accesses on the file /bin/systemctl.
        https://bugzilla.redhat.com/show_bug.cgi?id=695818
  [ 8 ] Bug #696054 - SELinux is preventing /usr/bin/kdm from using the 'getsession' accesses on a process.
        https://bugzilla.redhat.com/show_bug.cgi?id=696054
  [ 9 ] Bug #696264 - SELinux is preventing /bin/bash from 'getattr' accesses on the file /bin/systemctl.
        https://bugzilla.redhat.com/show_bug.cgi?id=696264
  [ 10 ] Bug #694523 - SELinux is preventing /usr/libexec/colord from 'write' accesses on the unix_dgram_socket Unknown.
        https://bugzilla.redhat.com/show_bug.cgi?id=694523
  [ 11 ] Bug #694739 - SELinux is preventing /bin/systemctl from 'search' accesses on the directory 1.
        https://bugzilla.redhat.com/show_bug.cgi?id=694739
  [ 12 ] Bug #695084 - SELinux is preventing /bin/systemctl from create access on the lnk_file ntpd.service.
        https://bugzilla.redhat.com/show_bug.cgi?id=695084
  [ 13 ] Bug #675278 - SELinux is preventing /sbin/chkconfig from 'getattr' accesses on the file /etc/rc.d/init.d/lvm2-monitor.
        https://bugzilla.redhat.com/show_bug.cgi?id=675278
  [ 14 ] Bug #694256 - SELinux is preventing /sbin/iscsid from 'create' accesses on the directory iscsi.
        https://bugzilla.redhat.com/show_bug.cgi?id=694256
  [ 15 ] Bug #694384 - SELinux is preventing /usr/libexec/kde4/ksysguardprocesslist_helper from 'read' accesses on the file stat.
        https://bugzilla.redhat.com/show_bug.cgi?id=694384
  [ 16 ] Bug #694473 - SELinux is preventing /bin/systemctl from 'search' accesses on the directory /sys.
        https://bugzilla.redhat.com/show_bug.cgi?id=694473
  [ 17 ] Bug #694474 - SELinux is preventing /bin/systemctl from 'search' accesses on the directory /sys/fs/cgroup.
        https://bugzilla.redhat.com/show_bug.cgi?id=694474
  [ 18 ] Bug #695085 - SELinux is preventing /bin/systemctl from search access on the directory 1.
        https://bugzilla.redhat.com/show_bug.cgi?id=695085
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list