Fedora 15 Update: selinux-policy-3.9.16-24.fc15
updates at fedoraproject.org
updates at fedoraproject.org
Wed May 25 03:30:40 UTC 2011
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-7161
2011-05-18 18:37:37
--------------------------------------------------------------------------------
Name : selinux-policy
Product : Fedora 15
Version : 3.9.16
Release : 24.fc15
URL : http://oss.tresys.com/repos/refpolicy/
Summary : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision 2.20091117
--------------------------------------------------------------------------------
Update Information:
- Allow logrotate to connect to init script using unix domain stream socket
- Allow shorewall read and write inherited user domain pty/tty
- virt will attempt to us another virtualizations pulsesaudio tmpfs_t, ignore error
- Allow colord to get the attributes of fixed disk device nodes
- Allow nsplugin_t to getattr on gpmctl
- Allow mozilla_plugin to connect to pcscd over an unix stream socket
- Allow logrotate to execute systemctl
- colord wants to read files in users homedir
- Remote login should create user_tmp_t content not its own tmp files
- Allow psad signal
- Fix cobbler_read_lib_files interface
- Allow rlogind to r/w user terminals
- Allow prelink_cron_system_t to relabel content and ignore obj_id
- Allow gnomeclock_systemctl_t to list init_var_run_t
- Dbus domains will inherit fds from the init system
--------------------------------------------------------------------------------
ChangeLog:
* Tue May 17 2011 Miroslav Grepl <mgrepl at redhat.com> 3.9.16-24
- Allow logrotate to connect to init script using unix domain stream socket
- Allow shorewall read and write inherited user domain pty/tty
- virt will attempt to us another virtualizations pulsesaudio tmpfs_t, ignore error
- Allow colord to get the attributes of fixed disk device nodes
- Allow nsplugin_t to getattr on gpmctl
- Allow mozilla_plugin to connect to pcscd over an unix stream socket
- Allow logrotate to execute systemctl
- colord wants to read files in users homedir
- Remote login should create user_tmp_t content not its own tmp files
- Allow psad signal
- Fix cobbler_read_lib_files interface
- Allow rlogind to r/w user terminals
- Allow prelink_cron_system_t to relabel content and ignore obj_id
- Allow gnomeclock_systemctl_t to list init_var_run_t
- Dbus domains will inherit fds from the init system
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #702291 - SELinux is preventing /sbin/ip from using the 'sys_module' capabilities.
https://bugzilla.redhat.com/show_bug.cgi?id=702291
[ 2 ] Bug #702889 - SELinux is preventing /bin/systemctl from 'read' accesses on the directory system.
https://bugzilla.redhat.com/show_bug.cgi?id=702889
[ 3 ] Bug #702931 - SELinux is preventing /bin/bash from 'read' accesses on the file /bin/systemctl.
https://bugzilla.redhat.com/show_bug.cgi?id=702931
[ 4 ] Bug #702945 - SELinux is preventing /usr/libexec/fprintd from 'use' accesses on the fd /dev/null.
https://bugzilla.redhat.com/show_bug.cgi?id=702945
[ 5 ] Bug #703043 - SELinux is preventing /bin/systemd-tmpfiles from 'unlink' accesses on the file .pam-systemd-lock.
https://bugzilla.redhat.com/show_bug.cgi?id=703043
[ 6 ] Bug #704152 - SELinux is preventing /usr/sbin/userhelper from 'search' accesses on the directory /dev/pts.
https://bugzilla.redhat.com/show_bug.cgi?id=704152
[ 7 ] Bug #704591 - SELinux is preventing /opt/google/talkplugin/GoogleTalkPlugin from 'getattr' accesses on the sock_file /dev/gpmctl.
https://bugzilla.redhat.com/show_bug.cgi?id=704591
[ 8 ] Bug #704808 - SELinux is preventing /usr/libexec/colord from 'getattr' accesses on the blk_file /dev/dm-0.
https://bugzilla.redhat.com/show_bug.cgi?id=704808
[ 9 ] Bug #704870 - SELinux is preventing /bin/bash from 'execute' accesses on the file /bin/systemctl.
https://bugzilla.redhat.com/show_bug.cgi?id=704870
[ 10 ] Bug #705279 - SELinux is preventing /usr/bin/who from 'read' accesses on the file utmp.
https://bugzilla.redhat.com/show_bug.cgi?id=705279
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list