-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2012-19374 2012-11-30 06:25:53 --------------------------------------------------------------------------------
Name : selinux-policy Product : Fedora 18 Version : 3.11.1 Release : 60.fc18 URL : http://oss.tresys.com/repos/refpolicy/ Summary : SELinux policy configuration Description : SELinux Reference Policy - modular. Based off of reference policy: Checked out revision 2.20091117 -------------------------------------------------------------------------------- Update Information: Here is where you give an explanation of your update. -------------------------------------------------------------------------------- References: [ 1 ] Bug #866998 - SELinux is preventing /usr/bin/systemd-tmpfiles from 'rmdir' accesses on the directory /var/cache/man/id/cat1. https://bugzilla.redhat.com/show_bug.cgi?id=866998 [ 2 ] Bug #875402 - SELinux is preventing systemd-tmpfile from 'setattr' accesses on the directory /var/cache/man. https://bugzilla.redhat.com/show_bug.cgi?id=875402 [ 3 ] Bug #883163 - selinux blocks NetworkManager communications to dbus https://bugzilla.redhat.com/show_bug.cgi?id=883163 [ 4 ] Bug #883200 - SELinux is preventing /usr/bin/python2.7 from 'getattr' accesses on the file /usr/bin/rpm. https://bugzilla.redhat.com/show_bug.cgi?id=883200 [ 5 ] Bug #883422 - tuned: please fix selinux AVCs for generated profiles https://bugzilla.redhat.com/show_bug.cgi?id=883422 [ 6 ] Bug #882201 - SELinux is preventing Chrome_ChildIOT from 'write' accesses on the file /home/francisco/.config/chromium/Default/databases/chrome-extension_jpfpebmajhhopeonhlcgidhclcccjcik_0/1. https://bugzilla.redhat.com/show_bug.cgi?id=882201 [ 7 ] Bug #882255 - SELinux is preventing /usr/sbin/console-kit-daemon from 'read' accesses on the unix_stream_socket . https://bugzilla.redhat.com/show_bug.cgi?id=882255 [ 8 ] Bug #872568 - SELinux is preventing /usr/bin/bash from 'execute' accesses on the file bash. https://bugzilla.redhat.com/show_bug.cgi?id=872568 [ 9 ] Bug #872956 - Changing shell for user not working when SELinux is in enforcing mode https://bugzilla.redhat.com/show_bug.cgi?id=872956 [ 10 ] Bug #873355 - avc: denied { read } for pid=12901 comm="xend" name="para.img" dev="dm-1" ino=1443697 scontext=system_u:system_r:xend_t:s0 tcontext=system_u:object_r:virt_image_t:s0 tclass=file https://bugzilla.redhat.com/show_bug.cgi?id=873355 [ 11 ] Bug #873564 - krb5kdc causes 'block_suspend' AVC in SELinux audit.log https://bugzilla.redhat.com/show_bug.cgi?id=873564 [ 12 ] Bug #873939 - SELinux is preventing /usr/sbin/php-fpm from 'name_bind' accesses on the tcp_socket . https://bugzilla.redhat.com/show_bug.cgi?id=873939 [ 13 ] Bug #873946 - SELinux is preventing /usr/bin/totem-video-thumbnailer from 'unlink' accesses on the file /home/mikhail/.cache/gstreamer-1.0/registry.i686.bin. https://bugzilla.redhat.com/show_bug.cgi?id=873946 [ 14 ] Bug #874830 - SELinux is preventing /usr/lib/jvm/java-1.7.0-openjdk-1.7.0.9.x86_64/jre/bin/java from 'read' accesses on the file /anon_hugepage (deleted). https://bugzilla.redhat.com/show_bug.cgi?id=874830 [ 15 ] Bug #874947 - SELinux is preventing /usr/bin/pulseaudio from 'read' accesses on the directory sessions. https://bugzilla.redhat.com/show_bug.cgi?id=874947 [ 16 ] Bug #875180 - SELinux is preventing /usr/bin/mpd from 'read' accesses on the chr_file urandom. https://bugzilla.redhat.com/show_bug.cgi?id=875180 [ 17 ] Bug #875485 - SELinux is preventing dbus-daemon from 'read' accesses on the blk_file /dev/vda. https://bugzilla.redhat.com/show_bug.cgi?id=875485 [ 18 ] Bug #875552 - SELinux is preventing /usr/sbin/setfiles from 'read' accesses on the chr_file /dev/random. https://bugzilla.redhat.com/show_bug.cgi?id=875552 [ 19 ] Bug #876750 - SELinux is preventing /usr/lib64/realmd/realmd from 'getattr' accesses on the filesystem /. https://bugzilla.redhat.com/show_bug.cgi?id=876750 [ 20 ] Bug #877642 - SELinux is preventing /usr/bin/perl from 'search' accesses on the directory /var/lib/mysql. https://bugzilla.redhat.com/show_bug.cgi?id=877642 [ 21 ] Bug #878184 - SELinux is preventing /usr/bin/gnome-keyring-daemon from 'write' accesses on the directory /home/eparis/.local/share/keyrings/Default.keyring.temp-154895502. https://bugzilla.redhat.com/show_bug.cgi?id=878184 [ 22 ] Bug #878242 - SELinux is preventing /usr/libexec/kde4/kcmdatetimehelper from 'write' accesses on the directory /root/.kde. https://bugzilla.redhat.com/show_bug.cgi?id=878242 [ 23 ] Bug #878354 - CIM providers can't use cimxml.socket https://bugzilla.redhat.com/show_bug.cgi?id=878354 [ 24 ] Bug #878395 - SELinux is preventing /usr/lib64/firefox/firefox from 'name_connect' accesses on the tcp_socket . https://bugzilla.redhat.com/show_bug.cgi?id=878395 [ 25 ] Bug #879421 - SELinux is preventing /usr/libexec/mission-control-5 from 'connectto' accesses on the unix_stream_socket /run/dbus/system_bus_socket. https://bugzilla.redhat.com/show_bug.cgi?id=879421 [ 26 ] Bug #879516 - SELinux does not allow pki-tomcat connecting to port 7389 https://bugzilla.redhat.com/show_bug.cgi?id=879516 [ 27 ] Bug #879666 - Selinux Filters Dovecot/Pigeonhole Filters https://bugzilla.redhat.com/show_bug.cgi?id=879666 [ 28 ] Bug #880761 - GDM extremely slow to load https://bugzilla.redhat.com/show_bug.cgi?id=880761 [ 29 ] Bug #880965 - SELinux is preventing /usr/sbin/pptp from 'name_connect' accesses on the tcp_socket . https://bugzilla.redhat.com/show_bug.cgi?id=880965 [ 30 ] Bug #881119 - selinux-policy-devel needs to require m4 in F18 and rawhide https://bugzilla.redhat.com/show_bug.cgi?id=881119 [ 31 ] Bug #873429 - SELinux errors when including domain-realm mapping directory https://bugzilla.redhat.com/show_bug.cgi?id=873429 [ 32 ] Bug #874083 - Allow /usr/sbin/cimprovagt to use dbus socket https://bugzilla.redhat.com/show_bug.cgi?id=874083 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update selinux-policy' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list [email protected] https://admin.fedoraproject.org/mailman/listinfo/package-announce
