Fedora 18 Update: selinux-policy-3.11.1-60.fc18
updates at fedoraproject.org
updates at fedoraproject.org
Fri Dec 7 04:33:42 UTC 2012
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-19374
2012-11-30 06:25:53
--------------------------------------------------------------------------------
Name : selinux-policy
Product : Fedora 18
Version : 3.11.1
Release : 60.fc18
URL : http://oss.tresys.com/repos/refpolicy/
Summary : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision 2.20091117
--------------------------------------------------------------------------------
Update Information:
Here is where you give an explanation of your update.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #866998 - SELinux is preventing /usr/bin/systemd-tmpfiles from 'rmdir' accesses on the directory /var/cache/man/id/cat1.
https://bugzilla.redhat.com/show_bug.cgi?id=866998
[ 2 ] Bug #875402 - SELinux is preventing systemd-tmpfile from 'setattr' accesses on the directory /var/cache/man.
https://bugzilla.redhat.com/show_bug.cgi?id=875402
[ 3 ] Bug #883163 - selinux blocks NetworkManager communications to dbus
https://bugzilla.redhat.com/show_bug.cgi?id=883163
[ 4 ] Bug #883200 - SELinux is preventing /usr/bin/python2.7 from 'getattr' accesses on the file /usr/bin/rpm.
https://bugzilla.redhat.com/show_bug.cgi?id=883200
[ 5 ] Bug #883422 - tuned: please fix selinux AVCs for generated profiles
https://bugzilla.redhat.com/show_bug.cgi?id=883422
[ 6 ] Bug #882201 - SELinux is preventing Chrome_ChildIOT from 'write' accesses on the file /home/francisco/.config/chromium/Default/databases/chrome-extension_jpfpebmajhhopeonhlcgidhclcccjcik_0/1.
https://bugzilla.redhat.com/show_bug.cgi?id=882201
[ 7 ] Bug #882255 - SELinux is preventing /usr/sbin/console-kit-daemon from 'read' accesses on the unix_stream_socket .
https://bugzilla.redhat.com/show_bug.cgi?id=882255
[ 8 ] Bug #872568 - SELinux is preventing /usr/bin/bash from 'execute' accesses on the file bash.
https://bugzilla.redhat.com/show_bug.cgi?id=872568
[ 9 ] Bug #872956 - Changing shell for user not working when SELinux is in enforcing mode
https://bugzilla.redhat.com/show_bug.cgi?id=872956
[ 10 ] Bug #873355 - avc: denied { read } for pid=12901 comm="xend" name="para.img" dev="dm-1" ino=1443697 scontext=system_u:system_r:xend_t:s0 tcontext=system_u:object_r:virt_image_t:s0 tclass=file
https://bugzilla.redhat.com/show_bug.cgi?id=873355
[ 11 ] Bug #873564 - krb5kdc causes 'block_suspend' AVC in SELinux audit.log
https://bugzilla.redhat.com/show_bug.cgi?id=873564
[ 12 ] Bug #873939 - SELinux is preventing /usr/sbin/php-fpm from 'name_bind' accesses on the tcp_socket .
https://bugzilla.redhat.com/show_bug.cgi?id=873939
[ 13 ] Bug #873946 - SELinux is preventing /usr/bin/totem-video-thumbnailer from 'unlink' accesses on the file /home/mikhail/.cache/gstreamer-1.0/registry.i686.bin.
https://bugzilla.redhat.com/show_bug.cgi?id=873946
[ 14 ] Bug #874830 - SELinux is preventing /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.9.x86_64/jre/bin/java from 'read' accesses on the file /anon_hugepage (deleted).
https://bugzilla.redhat.com/show_bug.cgi?id=874830
[ 15 ] Bug #874947 - SELinux is preventing /usr/bin/pulseaudio from 'read' accesses on the directory sessions.
https://bugzilla.redhat.com/show_bug.cgi?id=874947
[ 16 ] Bug #875180 - SELinux is preventing /usr/bin/mpd from 'read' accesses on the chr_file urandom.
https://bugzilla.redhat.com/show_bug.cgi?id=875180
[ 17 ] Bug #875485 - SELinux is preventing dbus-daemon from 'read' accesses on the blk_file /dev/vda.
https://bugzilla.redhat.com/show_bug.cgi?id=875485
[ 18 ] Bug #875552 - SELinux is preventing /usr/sbin/setfiles from 'read' accesses on the chr_file /dev/random.
https://bugzilla.redhat.com/show_bug.cgi?id=875552
[ 19 ] Bug #876750 - SELinux is preventing /usr/lib64/realmd/realmd from 'getattr' accesses on the filesystem /.
https://bugzilla.redhat.com/show_bug.cgi?id=876750
[ 20 ] Bug #877642 - SELinux is preventing /usr/bin/perl from 'search' accesses on the directory /var/lib/mysql.
https://bugzilla.redhat.com/show_bug.cgi?id=877642
[ 21 ] Bug #878184 - SELinux is preventing /usr/bin/gnome-keyring-daemon from 'write' accesses on the directory /home/eparis/.local/share/keyrings/Default.keyring.temp-154895502.
https://bugzilla.redhat.com/show_bug.cgi?id=878184
[ 22 ] Bug #878242 - SELinux is preventing /usr/libexec/kde4/kcmdatetimehelper from 'write' accesses on the directory /root/.kde.
https://bugzilla.redhat.com/show_bug.cgi?id=878242
[ 23 ] Bug #878354 - CIM providers can't use cimxml.socket
https://bugzilla.redhat.com/show_bug.cgi?id=878354
[ 24 ] Bug #878395 - SELinux is preventing /usr/lib64/firefox/firefox from 'name_connect' accesses on the tcp_socket .
https://bugzilla.redhat.com/show_bug.cgi?id=878395
[ 25 ] Bug #879421 - SELinux is preventing /usr/libexec/mission-control-5 from 'connectto' accesses on the unix_stream_socket /run/dbus/system_bus_socket.
https://bugzilla.redhat.com/show_bug.cgi?id=879421
[ 26 ] Bug #879516 - SELinux does not allow pki-tomcat connecting to port 7389
https://bugzilla.redhat.com/show_bug.cgi?id=879516
[ 27 ] Bug #879666 - Selinux Filters Dovecot/Pigeonhole Filters
https://bugzilla.redhat.com/show_bug.cgi?id=879666
[ 28 ] Bug #880761 - GDM extremely slow to load
https://bugzilla.redhat.com/show_bug.cgi?id=880761
[ 29 ] Bug #880965 - SELinux is preventing /usr/sbin/pptp from 'name_connect' accesses on the tcp_socket .
https://bugzilla.redhat.com/show_bug.cgi?id=880965
[ 30 ] Bug #881119 - selinux-policy-devel needs to require m4 in F18 and rawhide
https://bugzilla.redhat.com/show_bug.cgi?id=881119
[ 31 ] Bug #873429 - SELinux errors when including domain-realm mapping directory
https://bugzilla.redhat.com/show_bug.cgi?id=873429
[ 32 ] Bug #874083 - Allow /usr/sbin/cimprovagt to use dbus socket
https://bugzilla.redhat.com/show_bug.cgi?id=874083
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list