--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-13384
2009-12-18 03:19:42
--------------------------------------------------------------------------------

Name        : selinux-policy
Product     : Fedora 12
Version     : 3.6.32
Release     : 59.fc12
URL         : http://oss.tresys.com/repos/refpolicy/
Summary     : SELinux policy configuration
Description :
SELinux Reference Policy - modular.
Based off of reference policy: Checked out revision  2.20090730

--------------------------------------------------------------------------------
Update Information:

* Tue Dec 15 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-59  - Dontaudit
udp_socket leaks for xauth_t  - Dontaudit rules for iceauth_t  - Let locate read
symlinks on noxattr file systems  - Remove wine from unconfined domain if
unconfined pp removed  - Add labels for vhostmd  - Add port 546 as a dhcpc port
- Add labeled for /dev/dahdi  - Add certmonger policy  - Allow sysadm to
communicate with racoon and zebra  - Allow dbus service dbus_chat with
unconfined_t  - Fixes for xguest  - Add dontaudits for abrt  - file contexts for
mythtv  - Lots of fixes for asterisk  - Fix file context for certmaster  - Add
log dir for dovecot  - Policy for ksmtuned  - File labeling and fixes for mysql
and mysql_safe  - New plugin infrstructure for nagios  - Allow nut_upsd_t
dac_override  - File context fixes for nx  - Allow oddjob_mkhomedir to create
homedir  - Add pcscd_pub interfaces to be used by xdm  - Add stream connect from
fenced to corosync  - Fixes for swat  - Allow fsdaemon to manage scsi devices  -
Policy for tgtd  - Policy for vhostmd  - Allow ipsec to create tmp files  -
Change label on fusermount    * Thu Dec 10 2009 Dan Walsh <dwa...@redhat.com>
3.6.32-58  - Dontaudit udp_socket leaks for xauth_t    * Wed Dec 9 2009 Dan
Walsh <dwa...@redhat.com> 3.6.32-57  - Allow unconfined_t to send dbus messages
to setroubleshoot  - Allow confined screen app to setattr on user ttys  - remove
wine_t from unconfined domain when unconfined.pp disabled  - Allow sysadm_t to
communicate with racoon  - Allow xauth to be run from all unconfined user types
- Fix labeling on all /var/cache/mod_* apps  - Allow asterisk to communicate
with postgresql  - Fix labeling for /var/lib/certmaster  - Add policy for
ksmtuned and tgtd  - Fixes for vhostmd
--------------------------------------------------------------------------------
ChangeLog:

* Tue Dec 15 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-59
- Dontaudit udp_socket leaks for xauth_t
- Dontaudit rules for iceauth_t
- Let locate read symlinks on noxattr file systems
- Remove wine from unconfined domain if unconfined pp removed
- Add labels for vhostmd
- Add port 546 as a dhcpc port
- Add labeled for /dev/dahdi
- Add certmonger policy
- Allow sysadm to communicate with racoon and zebra
- Allow dbus service dbus_chat with unconfined_t
- Fixes for xguest
- Add dontaudits for abrt
- file contexts for mythtv
- Lots of fixes for asterisk
- Fix file context for certmaster
- Add log dir for dovecot
- Policy for ksmtuned
- File labeling and fixes for mysql and mysql_safe
- New plugin infrstructure for nagios
- Allow nut_upsd_t dac_override
- File context fixes for nx
- Allow oddjob_mkhomedir to create homedir
- Add pcscd_pub interfaces to be used by xdm
- Add stream connect from fenced to corosync
- Fixes for swat
- Allow fsdaemon to manage scsi devices
- Policy for tgtd
- Policy for vhostmd
- Allow ipsec to create tmp files
- Change label on fusermount
* Thu Dec 10 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-58
- Dontaudit udp_socket leaks for xauth_t
* Wed Dec  9 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-57
- Allow unconfined_t to send dbus messages to setroubleshoot
- Allow confined screen app to setattr on user ttys
- remove wine_t from unconfined domain when unconfined.pp disabled
- Allow sysadm_t to communicate with racoon
- Allow xauth to be run from all unconfined user types
- Fix labeling on all /var/cache/mod_* apps
- Allow asterisk to communicate with postgresql
- Fix labeling for /var/lib/certmaster
- Add policy for ksmtuned and tgtd
- Fixes fro vhostmd
* Mon Dec  7 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-56
- Dontaudit exec of fusermount from xguest
- Allow licrd to use mouse_device
- Allow sysadm_t to connect to zebra stream socket
- Dontaudit policykit_auth trying to config terminal
- Allow logrotate and asterisk to execute asterisk
- Allow logrotate to read var_lib files (zope) and connect to fail2ban stream
- Allow firewallgui to communicate with unconfined_t
- Allow podsleuth to ask the kernel to load modules
- Fix labeling on vhostmd scripts
- Remove transition from unconfined_t to windbind_helper_t
- Allow abrt_helper to look at inotify
- Fix labels for mythtv
- Allow apache to signal sendmail
- allow asterisk to send mail
- Allow rpcd to get and setcap
- Add tor_bind_all_unreserved_ports boolean
- Add policy for vhostmd
- MOre textrel_shlib_t files
- Add rw_herited_term_perms
* Thu Dec  3 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-55
- Add fprintd_chat(unconfined_t) to fix su timeout problem
- Make xguest follow allow_execstack boolean
- Dontaudit dbus looking at nfs
* Thu Dec  3 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-54
- Require selinux-policy from selinux-policy-TYPE
- Add labeling to /usr/lib/win32 textrel_shlib_t
- dontaudit all leaks for abrt_helper
- Fix labeling for mythtv
- Dontaudit setroubleshoot_fix leaks
- Allow xauth_t to read usr_t
- Allow iptables to use fifo files
- Fix labeling on /var/lib/wifiroamd
* Tue Dec  1 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-53
- Remove transition from dhcpc_t to consoletype_t, just allow exec
- Fixes for prelink cron job
- Fix label on yumex backend
- Allow unconfined_java_t to communicate with iptables
- Allow abrt to read /tmp files
- Fix nut/ups policy
* Tue Dec  1 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-52
- Major fixup of ntop policy
- Fix label on /usr/lib/xorg/modules/extensions/libglx.so.195.22
- Allow xdm to signal session bus
- Allow modemmanager to use generic ptys, and sys_tty_config capability
- Allow abrt_helper chown access, dontaudit leaks
- Allow logwatch to list cifs and nfs file systems
- Allow kismet to read network state
- Allow cupsd_config_t to connecto unconfined unix_stream
- Fix avahi labeling and allow avahi to manage /etc/resolv.conf
- Allow sshd to read usr_t files
- Allow login programs to manage pcscd_var_run_t files
- Allow tor to read usr_t files
* Wed Nov 25 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-51
- Mark google shared libraries as requiring textrel_shlib
- Allow svirt to bind/connect to network ports
- Add label for .libvirt directory.
* Tue Nov 24 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-50
- Allow modemmanager sys_admin
* Mon Nov 23 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-49
- Allow sssd to read all processes domain
* Mon Nov 23 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-48
- Abrt connect to any port
- Dontaudit chrome-sandbox trying to getattr on all processes
- Allow passwd to execute gnome-keyring
- Allow chrome_sandbox_t to read home content inherited from the parent
- Fix eclipse labeling
- Allow mozilla to connect to flash port
- Allow pulseaudio to connect to unix_streams
- Allow sambagui to read secrets file
- Allow mount to mount unlabeled files
- ALlow abrt to use ypbind, send kill signals
- Allow arpwatch to create socket class
- Allow asterisk to read urand
- Allow corosync to communicate with user tmpfs
- Allow devicedisk to read virt images block devices
- Allow gpsd to sys_tty_config
- Fix nagios interfaces
- Policy for nagios plugins
- Fixes for nx 
- Allow rtkit_daemon to read locale file
- Allow snort to create socket 
- Additional perms for xauth
- lots of textrel_lib_t file context
* Tue Nov 17 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-47
- Make mozilla call in execmem.if optional to fix build of minimum install
- Allow uucpd to execute shells and send mail
- Fix label on libtfmessbsp.so
* Mon Nov 16 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-46
- abrt needs more access to rpm pid files
- Abrt wants to execute its own tmp files
- abrt needs to write sysfs 
- abrt needs to search all file system dirs
- logrotate and tmpreaper need to be able to manage abrt cache
- rtkit_daemon needs to be able to setsched on lots of user apps
- networkmanager creates dirs in /var/lib
- plymouth executes lvm tools
* Fri Nov 13 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-45
- Allow mount on dos file systems
- fixes for upsmon and upsd to be able to retrieve pwnam and resolve addresses
* Thu Nov 12 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-44
- Add lighttpd file context to apache.fc
- Allow tmpreaper to read /var/cache/yum
- Allow kdump_t sys_rawio
- Add execmem_exec_t context for /usr/bin/aticonfig
- Allow dovecot-deliver to signull dovecot
- Add textrel_shlib_t to /usr/lib/libADM5avcodec.so
* Tue Nov 10 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-43
- Fix transition so unconfined_exemem_t creates user_tmp_t
- Allow chrome_sandbox_t to write to user_tmp_t when printing
- Allow corosync to connect to port 5404 and to interact with user_tmpfs_t files
- Allow execmem_t to execmod files in mozilla_home_t
- Allow firewallgui to communicate with nscd
* Mon Nov  9 2009 Dan Walsh <dwa...@redhat.com> 3.6.32-42
- Allow kdump to read the kernel core interface 
- Dontaudit abrt read all files in home dir
- Allow kismet client to write to .kismet dir in homedir
- Turn on  asterisk policy and allow logrotate to communicate with it
- Allow abrt to manage rpm cache files
- Rules to allow sysadm_t to install a kernel
- Allow local_login to read console_device_t to Z series logins
- Allow automount and devicekit_disk to search all filesystem dirs
- Allow corosync to setrlimit
- Allow hal to read modules.dep
- Fix xdm using pcscd
- Dontaudit gssd trying to write user_tmp_t, kerberos libary problem.
- Eliminate transition from unconifned_t to loadkeys_t
- Dontaudit several leaks to xauth_t
- Allow xdm_t to search for man pages
- Allow xdm_dbus to append to xdm log
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #542654 - ntop triggers several AVC denials when starting
        https://bugzilla.redhat.com/show_bug.cgi?id=542654
  [ 2 ] Bug #545285 - SELinux is preventing /usr/sbin/httpd from using 
potentially mislabeled files mod_gnutls.dir.
        https://bugzilla.redhat.com/show_bug.cgi?id=545285
  [ 3 ] Bug #545534 - SELinux is preventing /usr/bin/python "read" access on 
/proc/<pid>/cmdline.
        https://bugzilla.redhat.com/show_bug.cgi?id=545534
  [ 4 ] Bug #545562 - SELinux is preventing /usr/bin/python "read" access on 
/proc/<pid>/cmdline.
        https://bugzilla.redhat.com/show_bug.cgi?id=545562
  [ 5 ] Bug #545598 - SELinux is preventing /sbin/iscsid "associate" access.
        https://bugzilla.redhat.com/show_bug.cgi?id=545598
  [ 6 ] Bug #545607 - SELinux is preventing /usr/bin/python (deleted) "getattr" 
access on /var/lib/certmaster/certmaster/certs/alpha.rzhou.org.cert.
        https://bugzilla.redhat.com/show_bug.cgi?id=545607
  [ 7 ] Bug #545648 - SELinux is preventing /usr/bin/iceauth "read" access on 
dcopPfMg8b.
        https://bugzilla.redhat.com/show_bug.cgi?id=545648
  [ 8 ] Bug #545676 - SELinux is preventing /usr/libexec/polkit-1/polkitd 
"getattr" access on /proc/<pid>.
        https://bugzilla.redhat.com/show_bug.cgi?id=545676
  [ 9 ] Bug #545741 - SELinux is preventing /usr/libexec/polkit-1/polkitd 
"search" access on 2B.
        https://bugzilla.redhat.com/show_bug.cgi?id=545741
  [ 10 ] Bug #545747 - SELinux is preventing /usr/bin/xauth access to a leaked 
unix_stream_socket file descriptor.
        https://bugzilla.redhat.com/show_bug.cgi?id=545747
  [ 11 ] Bug #545771 - SELinux is preventing /usr/sbin/slapd "write" access. 
(to cn=config database)
        https://bugzilla.redhat.com/show_bug.cgi?id=545771
  [ 12 ] Bug #546007 - SELinux is preventing /usr/bin/python "read" access on 
/proc/<pid>/cmdline.
        https://bugzilla.redhat.com/show_bug.cgi?id=546007
  [ 13 ] Bug #546078 - SELinux is preventing /sbin/setfiles access to a leaked 
/tmp/xerr-root-:0 file descriptor.
        https://bugzilla.redhat.com/show_bug.cgi?id=546078
  [ 14 ] Bug #546101 - SELinux is preventing /usr/bin/xauth access to a leaked 
udp_socket file descriptor.
        https://bugzilla.redhat.com/show_bug.cgi?id=546101
  [ 15 ] Bug #546143 - SELinux is preventing 
/usr/libexec/polkit-gnome-authentication-agent-1 "search" access on /home.
        https://bugzilla.redhat.com/show_bug.cgi?id=546143
  [ 16 ] Bug #546145 - SELinux is preventing 
/usr/libexec/polkit-gnome-authentication-agent-1 "search" access on 
/usr/share/X11/fonts.
        https://bugzilla.redhat.com/show_bug.cgi?id=546145
  [ 17 ] Bug #546157 - SELinux is preventing /usr/bin/python "read" access on 
/var/run/abrt.pid.
        https://bugzilla.redhat.com/show_bug.cgi?id=546157
  [ 18 ] Bug #546224 - SELinux is preventing /usr/bin/xauth "write" access on 
/usr/NX/home/nx.
        https://bugzilla.redhat.com/show_bug.cgi?id=546224
  [ 19 ] Bug #546265 - SELinux is preventing /usr/libexec/hal-storage-mount 
"sys_resource" access.
        https://bugzilla.redhat.com/show_bug.cgi?id=546265
  [ 20 ] Bug #546352 - SELinux is preventing /usr/sbin/dovecot "write" access 
on /var/log/dovecot/dovecot.log.
        https://bugzilla.redhat.com/show_bug.cgi?id=546352
  [ 21 ] Bug #546360 - SELinux is preventing /sbin/unix_chkpwd access to a 
leaked 0 file descriptor.
        https://bugzilla.redhat.com/show_bug.cgi?id=546360
  [ 22 ] Bug #546362 - SELinux is preventing /usr/libexec/polkit-1/polkitd 
"getattr" access on /proc/<pid>/stat.
        https://bugzilla.redhat.com/show_bug.cgi?id=546362
  [ 23 ] Bug #546400 - SELinux is preventing /usr/bin/xauth "write" access on 
/usr/NX/home/nx.
        https://bugzilla.redhat.com/show_bug.cgi?id=546400
  [ 24 ] Bug #546467 - SELinux is preventing /bin/bash "search" access on 
/home/aurin.
        https://bugzilla.redhat.com/show_bug.cgi?id=546467
  [ 25 ] Bug #546773 - SELinux is preventing /usr/bin/iceauth "getattr" access 
on /tmp/dcopPfMg8b.
        https://bugzilla.redhat.com/show_bug.cgi?id=546773
  [ 26 ] Bug #546798 - SELinux is preventing /usr/libexec/gdm-session-worker 
"create" access on event.1652.17022326.
        https://bugzilla.redhat.com/show_bug.cgi?id=546798
  [ 27 ] Bug #546799 - SELinux is preventing /usr/bin/kismet_server 
"name_connect" access.
        https://bugzilla.redhat.com/show_bug.cgi?id=546799
  [ 28 ] Bug #546801 - SELinux is preventing the /usr/bin/qemu-kvm from using 
potentially mislabeled files (/home/juan/Downloads).
        https://bugzilla.redhat.com/show_bug.cgi?id=546801
  [ 29 ] Bug #546806 - SELinux is preventing /usr/bin/gdb "read" access on 
/lib/modules/2.6.31.6-166.fc12.x86_64/vdso/vdso.so.
        https://bugzilla.redhat.com/show_bug.cgi?id=546806
  [ 30 ] Bug #546853 - SELinux is preventing /lib/ld-2.11.so "execute" access 
on /usr/lib/firefox-3.5.5/firefox.
        https://bugzilla.redhat.com/show_bug.cgi?id=546853
  [ 31 ] Bug #546888 - SELinux is preventing /usr/bin/gok "getattr" access on 
/var/mail.
        https://bugzilla.redhat.com/show_bug.cgi?id=546888
  [ 32 ] Bug #547003 - SELinux is preventing /usr/libexec/mysqld "unlink" 
access on squeezebox-mysql.sock.
        https://bugzilla.redhat.com/show_bug.cgi?id=547003
  [ 33 ] Bug #547021 - SELinux is preventing /usr/bin/xauth "write" access on 
nx.
        https://bugzilla.redhat.com/show_bug.cgi?id=547021
  [ 34 ] Bug #547043 - SELinux is preventing /usr/sbin/lircd "read" access on 
fifo_file.
        https://bugzilla.redhat.com/show_bug.cgi?id=547043
  [ 35 ] Bug #547111 - SELinux is preventing /usr/bin/updatedb "read" access on 
2.0.0.0__b03f5f7f11d50a3a.
        https://bugzilla.redhat.com/show_bug.cgi?id=547111
  [ 36 ] Bug #547180 - SELinux is preventing /usr/sbin/swat "search" access on 
/root.
        https://bugzilla.redhat.com/show_bug.cgi?id=547180
  [ 37 ] Bug #547247 - SELinux is preventing /usr/libexec/mysqld from 
connecting to port 49527.
        https://bugzilla.redhat.com/show_bug.cgi?id=547247
  [ 38 ] Bug #547342 - SELinux is preventing /bin/sed "write" access on 
fifo_file.
        https://bugzilla.redhat.com/show_bug.cgi?id=547342
  [ 39 ] Bug #547468 - SELinux is preventing Samba (smbd) "search" access to 
4DC3BA73696361.
        https://bugzilla.redhat.com/show_bug.cgi?id=547468
  [ 40 ] Bug #547472 - SELinux is preventing /usr/bin/python "read" access on 
/var/run/abrt.pid.
        https://bugzilla.redhat.com/show_bug.cgi?id=547472
  [ 41 ] Bug #547555 - SELinux is preventing /usr/bin/mythfrontend from loading 
/usr/lib/mythtv/filters/libgreedyhdeint.so which requires text relocation.
        https://bugzilla.redhat.com/show_bug.cgi?id=547555
  [ 42 ] Bug #547569 - SELinux is preventing /usr/lib/cups/backend/tpu "read" 
access.
        https://bugzilla.redhat.com/show_bug.cgi?id=547569
  [ 43 ] Bug #547575 - SELinux is preventing /bin/bash "search" access on /home.
        https://bugzilla.redhat.com/show_bug.cgi?id=547575
  [ 44 ] Bug #547579 - SELinux is preventing tuned "read" access on fifo_file.
        https://bugzilla.redhat.com/show_bug.cgi?id=547579
  [ 45 ] Bug #547580 - SELinux is preventing ethtool "read" access on 
/usr/share/tuned/monitorplugins/net.py.
        https://bugzilla.redhat.com/show_bug.cgi?id=547580
  [ 46 ] Bug #547612 - SELinux is preventing /usr/bin/iceauth "read" access on 
/proc/<pid>/status.
        https://bugzilla.redhat.com/show_bug.cgi?id=547612
  [ 47 ] Bug #547632 - SELinux is preventing /opt/lampp/bin/php-5.3.0 from 
loading /opt/lampp/lib/libct.so.3.0.0 which requires text relocation.
        https://bugzilla.redhat.com/show_bug.cgi?id=547632
  [ 48 ] Bug #547793 - SELinux is preventing /usr/bin/memcached "write" access 
on memcached.pid.
        https://bugzilla.redhat.com/show_bug.cgi?id=547793
  [ 49 ] Bug #547794 - SELinux is preventing /usr/bin/memcached "bind" access.
        https://bugzilla.redhat.com/show_bug.cgi?id=547794
  [ 50 ] Bug #547858 - SELinux is preventing /usr/bin/gok "getattr" access on 
/var/games.
        https://bugzilla.redhat.com/show_bug.cgi?id=547858
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update selinux-policy' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

Reply via email to