-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-ba070ee6ba 2023-07-01 01:44:29.430900 -------------------------------------------------------------------------------- Name : selinux-policy Product : Fedora 38 Version : 38.20 Release : 1.fc38 URL : https://github.com/fedora-selinux/selinux-policy Summary : SELinux policy configuration Description : SELinux core policy package. Originally based off of reference policy, the policy has been adjusted to provide support for Fedora. -------------------------------------------------------------------------------- Update Information: New F38 selinux-policy build -------------------------------------------------------------------------------- ChangeLog: * Thu Jun 29 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.20-1 - Allow httpd tcp connect to redis port conditionally - Label only /usr/sbin/ripd and ripngd with zebra_exec_t - Dontaudit aide the execmem permission - Remove permissive from fdo - Allow sa-update manage spamc home files - Allow sa-update connect to systemlog services - Label /usr/lib/systemd/system/mimedefang.service with antivirus_unit_file_t - Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t - Allow bootupd search EFI directory * Wed Jun 28 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.19-1 - Change init_audit_control default value to true - Allow nfsidmapd connect to systemd-userdbd with a unix socket - Add the qatlib module - Add the fdo module - Add the bootupd module - Set default ports for keylime policy - Create policy for qatlib - Add policy for FIDO Device Onboard - Add policy for bootupd - Add the qatlib module - Add the fdo module - Add the bootupd module * Mon Jun 26 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.18-1 - Add support for kafs-dns requested by keyutils - Allow insights-client execmem - Add support for chronyd-restricted - Add init_explicit_domain() interface - Allow fsadm_t to get attributes of cgroup filesystems - Add list_dir_perms to kerberos_read_keytab - Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t - Allow sendmail manage its runtime files - Allow keyutils_dns_resolver_exec_t be an entrypoint - Allow collectd_t read network state symlinks - Revert "Allow collectd_t read proc_net link files" - Allow nfsd_t to list exports_t dirs - Allow cupsd dbus chat with xdm - Allow haproxy read hardware state information - Add the kafs module -------------------------------------------------------------------------------- References: [ 1 ] Bug #2169949 - selinux policy doesn't support chronyd-restricted service https://bugzilla.redhat.com/show_bug.cgi?id=2169949 [ 2 ] Bug #2208143 - SELinux is preventing request-key from execute access on the file /usr/libexec/kafs-dns https://bugzilla.redhat.com/show_bug.cgi?id=2208143 [ 3 ] Bug #2213571 - selinux is logging a new denial with a new systemd https://bugzilla.redhat.com/show_bug.cgi?id=2213571 [ 4 ] Bug #2215452 - SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. https://bugzilla.redhat.com/show_bug.cgi?id=2215452 [ 5 ] Bug #2216060 - SELinux is preventing sendmail from create and unlink access on the file /run/sendmail.pid. https://bugzilla.redhat.com/show_bug.cgi?id=2216060 [ 6 ] Bug #2217165 - SELinux is preventing aide from using the 'execmem' accesses on a process. https://bugzilla.redhat.com/show_bug.cgi?id=2217165 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-ba070ee6ba' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue