Fedora 22 Update: selinux-policy-3.13.1-128.28.fc22
updates at fedoraproject.org
updates at fedoraproject.org
Tue May 10 18:00:37 UTC 2016
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-ce419c9cab
2016-05-10 11:43:00.964984
--------------------------------------------------------------------------------
Name : selinux-policy
Product : Fedora 22
Version : 3.13.1
Release : 128.28.fc22
URL : http://github.com/TresysTechnology/refpolicy/wiki
Summary : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision 2.20091117
--------------------------------------------------------------------------------
Update Information:
More info: http://koji.fedoraproject.org/koji/buildinfo?buildID=736112 ----
More info: http://koji.fedoraproject.org/koji/buildinfo?buildID=712036 ----
More info: http://koji.fedoraproject.org/koji/buildinfo?buildID=704375
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1253319 - SELinux prevents systemd-coredump from working
https://bugzilla.redhat.com/show_bug.cgi?id=1253319
[ 2 ] Bug #1271401 - SELinux policy prevents the NVIDIA 358.xx driver from updating the screen
https://bugzilla.redhat.com/show_bug.cgi?id=1271401
[ 3 ] Bug #1294328 - SELinux is preventing /usr/bin/gnome-shell from 'sendto' accesses on the unix_dgram_socket @nvidia050d047c.
https://bugzilla.redhat.com/show_bug.cgi?id=1294328
[ 4 ] Bug #1308622 - SELinux blocks iptables on Fedora Atomic 23
https://bugzilla.redhat.com/show_bug.cgi?id=1308622
[ 5 ] Bug #1266153 - SELinux prevents reboot from cron job
https://bugzilla.redhat.com/show_bug.cgi?id=1266153
[ 6 ] Bug #1267217 - selinux denial when adding bridge via monitor command
https://bugzilla.redhat.com/show_bug.cgi?id=1267217
[ 7 ] Bug #1276519 - SELinux is preventing mdadm from 'search' accesses on the directory /sys/firmware/efi/efivars.
https://bugzilla.redhat.com/show_bug.cgi?id=1276519
[ 8 ] Bug #1276861 - SELinux is preventing /usr/sbin/upsmon from using the 'kill' capabilities.
https://bugzilla.redhat.com/show_bug.cgi?id=1276861
[ 9 ] Bug #1279752 - SELinux is preventing plugin-containe from 'create' accesses on the directory .linphone-web.
https://bugzilla.redhat.com/show_bug.cgi?id=1279752
[ 10 ] Bug #1282103 - SELinux is preventing /usr/sbin/upsmon from 'read' accesses on the chr_file urandom.
https://bugzilla.redhat.com/show_bug.cgi?id=1282103
[ 11 ] Bug #1282104 - SELinux is preventing /usr/sbin/upsmon from 'open' accesses on the chr_file /dev/random.
https://bugzilla.redhat.com/show_bug.cgi?id=1282104
[ 12 ] Bug #1282105 - SELinux is preventing /usr/sbin/upsmon from 'open' accesses on the chr_file /dev/urandom.
https://bugzilla.redhat.com/show_bug.cgi?id=1282105
[ 13 ] Bug #1285425 - SELinux is preventing /usr/bin/perl from name_connect
https://bugzilla.redhat.com/show_bug.cgi?id=1285425
[ 14 ] Bug #1248785 - SELinux is preventing /usr/sbin/clamd from name_bind access on the tcp_socket
https://bugzilla.redhat.com/show_bug.cgi?id=1248785
[ 15 ] Bug #1268638 - SELinux preventing qemu create access sock_file
https://bugzilla.redhat.com/show_bug.cgi?id=1268638
[ 16 ] Bug #1274018 - selinux blocks apcupsd scrips
https://bugzilla.redhat.com/show_bug.cgi?id=1274018
[ 17 ] Bug #1275006 - SELinux is preventing acpid from 'create' accesses on the netlink_generic_socket Unknown.
https://bugzilla.redhat.com/show_bug.cgi?id=1275006
[ 18 ] Bug #1277779 - SELinux is preventing /usr/bin/bash from 'getattr' accesses on the file /usr/sbin/dmsetup.
https://bugzilla.redhat.com/show_bug.cgi?id=1277779
[ 19 ] Bug #1279182 - AVC: systemd hostnamed and networkd cannot talk over dbus
https://bugzilla.redhat.com/show_bug.cgi?id=1279182
[ 20 ] Bug #1282139 - arpwatch doesn't start on fc22 (selinux related)
https://bugzilla.redhat.com/show_bug.cgi?id=1282139
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list