Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
4.98. selinux-policy
4.98.1. RHBA-2013:14802 — selinux-policy bug fix update Link kopierenLink in die Zwischenablage kopiert!
Link kopierenLink in die Zwischenablage kopiert!
Updated selinux-policy packages that fix numerous bugs are now available for Red Hat Enterprise Linux 5.
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fixes
- BZ#746979
- When the SSH daemon (
sshd) was configured using thergmanagerutility as a service for clustering,sshdincorrectly ran in thergmanager_tSELinux domain instead of thesshd_tSELinux domain. With this update, the relevant SELinux policy has been fixed andsshdruns insshd_tas expected in the described scenario. - BZ#838702
- With the SELinux strict policy enabled, when the user executed a locally developed application configured to use the
atddaemon, the daemon ran in an incorrect SELinux domain due to the missing SELinux policy rules. Consequently, the following error message was logged in the/var/log/messagefile:Not allowed to set exec context
Not allowed to set exec contextCopy to Clipboard Copied! Toggle word wrap Toggle overflow With this update, the appropriate SELinux policy rules have been added so thatatdruns in the correct domain and the error message is no longer returned. - BZ#906279
- When SELinux was running in enforcing mode, it incorrectly prevented processes labeled with the
pptp_tSELinux security context from accessing files labeled with theproc_net_tSELinux security context. This update fixes the relevant SELinux policy andpptp_tprocesses can access files with theproc_net_tcontext as expected. - BZ#921671
- Previously, some patterns in the
/etc/selinux/targeted/contexts/files/file_contextsfile contained typographical errors. Some patterns matched the 32-bit path but the same pattern for the 64-bit path was missing. Consequently, different security contexts were assigned to these paths. With this update, the relevant file context specifications have been corrected so that there are no more differences between these paths. - BZ#923428, BZ#926028
- Due to the incorrect SELinux policy rules for the
httpd_use_fusefsandallow_ftpd_use_fusefsBooleans, thehttpdandftpddaemons were not able to access link files on a FUSE (Filesystem in Userspace) file system when SELinux was running in enforcing mode. The appropriate SELinux policy rules have been fixed andhttpdandftpdare now able to access link files on the FUSE file systems as expected. - BZ#953874
- When SELinux was running in enforcing mode, an attempt to fetch a file using the Squid proxy caching server along with Kerberos authentication caused AVC denials to be returned. The relevant SELinux policy has been changed to allow Squid to connect to the tcp/133 port and the AVC denials are no longer returned in the described scenario.
- BZ#958759, BZ#984583
- Previously, the
mysqld_safescript was unable to execute the Bourne shell (/bin/sh) with theshell_exec_tSELinux security context. Consequently, the mysql55 and mariadb55 Software Collection packages were not working correctly. With this update, SELinux policy rules have been updated and these packages now work as expected. - BZ#959171
- When a Network Information Service (NIS) master with two NIS slaves was configured, executing the
yppasswdd --port 836command proceeded up until it started rebuilding thepasswd.bynameandpasswd.byuiddatabases. The databases were rebuilt successfully but they were not pushed to the NIS slaves due to missing SELinux policy rules. With this update, the relevant SELinux rule has been added to fix this bug and theyppasswdd --port 836command works as expected. - BZ#966929
- Due to an incorrect SELinux policy, the
openvpnservice was not able to write or read the/var/log/openvpnfile. Consequently, an attempt to startopenvpnfailed and AVC messages were logged to the/var/log/audit/audit.logfile. With this update, the appropriate SELinux policy has been fixed so that the AVC messages are no longer returned andopenvpnworks as expected in the described scenario. - BZ#970707
- When the
php-cgicommand-line interface was called by thehttpdserver, SELinux running in enforcing mode prevented access to the/usr/share/snmp/mibs/.indexfile. Consequently, the PHP SNMP (Simple Network Management Protocol) extension did not work correctly due to the missing Management Information Bases (MIBs). With this update, the relevant SELinux policy has been modified and SELinux no longer prevents access to MIBs in the described scenario. - BZ#978864
- Previously, the
snmpd_tSELinux domain was missing thechowncapability. Consequently, theagentXpermsdirective in thesnmpd.conffile did not work. This update provides an updated SELinux policy rule that allows processes running in thesnmpd_tSELinux domain to use thechowncapability, thus fixing this bug.
Users of selinux-policy are advised to upgrade to these updated packages, which fix these bugs.