Fedora 38 Update: selinux-policy-38.20-1.fc38

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-ba070ee6ba
2023-07-01 01:44:29.430900
--------------------------------------------------------------------------------

Name        : selinux-policy
Product     : Fedora 38
Version     : 38.20
Release     : 1.fc38
URL         : https://github.com/fedora-selinux/selinux-policy
Summary     : SELinux policy configuration
Description :
SELinux core policy package.
Originally based off of reference policy,
the policy has been adjusted to provide support for Fedora.

--------------------------------------------------------------------------------
Update Information:

New F38 selinux-policy build
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 29 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.20-1
- Allow httpd tcp connect to redis port conditionally
- Label only /usr/sbin/ripd and ripngd with zebra_exec_t
- Dontaudit aide the execmem permission
- Remove permissive from fdo
- Allow sa-update manage spamc home files
- Allow sa-update connect to systemlog services
- Label /usr/lib/systemd/system/mimedefang.service with antivirus_unit_file_t
- Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t
- Allow bootupd search EFI directory
* Wed Jun 28 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.19-1
- Change init_audit_control default value to true
- Allow nfsidmapd connect to systemd-userdbd with a unix socket
- Add the qatlib  module
- Add the fdo module
- Add the bootupd module
- Set default ports for keylime policy
- Create policy for qatlib
- Add policy for FIDO Device Onboard
- Add policy for bootupd
- Add the qatlib module
- Add the fdo module
- Add the bootupd module
* Mon Jun 26 2023 Zdenek Pytela <zpytela@xxxxxxxxxx> - 38.18-1
- Add support for kafs-dns requested by keyutils
- Allow insights-client execmem
- Add support for chronyd-restricted
- Add init_explicit_domain() interface
- Allow fsadm_t to get attributes of cgroup filesystems
- Add list_dir_perms to kerberos_read_keytab
- Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t
- Allow sendmail manage its runtime files
- Allow keyutils_dns_resolver_exec_t be an entrypoint
- Allow collectd_t read network state symlinks
- Revert "Allow collectd_t read proc_net link files"
- Allow nfsd_t to list exports_t dirs
- Allow cupsd dbus chat with xdm
- Allow haproxy read hardware state information
- Add the kafs module
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2169949 - selinux policy doesn't support chronyd-restricted service
        https://bugzilla.redhat.com/show_bug.cgi?id=2169949
  [ 2 ] Bug #2208143 - SELinux is preventing request-key from execute access on the file /usr/libexec/kafs-dns
        https://bugzilla.redhat.com/show_bug.cgi?id=2208143
  [ 3 ] Bug #2213571 - selinux is logging a new denial with a new systemd
        https://bugzilla.redhat.com/show_bug.cgi?id=2213571
  [ 4 ] Bug #2215452 - SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser.
        https://bugzilla.redhat.com/show_bug.cgi?id=2215452
  [ 5 ] Bug #2216060 - SELinux is preventing sendmail from create and unlink access on the file /run/sendmail.pid.
        https://bugzilla.redhat.com/show_bug.cgi?id=2216060
  [ 6 ] Bug #2217165 - SELinux is preventing aide from using the 'execmem' accesses on a process.
        https://bugzilla.redhat.com/show_bug.cgi?id=2217165
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-ba070ee6ba' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux