4.159. selinux-policy
4.159.1.  RHBA-2013:0060 — selinux-policy bug fix and enhancement update  Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
		Updated selinux-policy packages that fix a number of bugs and add various enhancements are now available for Red Hat Enterprise Linux 5.
	
		The selinux-policy packages contain the rules that govern how confined processes run on the system.
	
Bug Fixes
- BZ#682856, BZ#841178
 - When SELinux was running in enforcing mode, it incorrectly prevented the Postfix mail transfer agent from re-sending queued email messages. This update adds a new security file context for the
/var/spool/postfix/maildrop/directory to make sure Postfix is allowed to re-send queued email messages in enforcing mode. - BZ#738995
 - Previously, the
cyrus-masterprocess could not run as an NNTP server becausecyrus-masterwas unable to use theinddport. With this update, the SELinux policy rules have been updated, and the problem withcyrus-masterrunning as an NNTP server no longer occurs. - BZ#751385
 - Previously, the
condor_vm-gahpservice running in theinitrc_tSELinux domain returned AVC (Access Vector Cache) messages. This update labelscondor_vm-gahpthevirtd_exec_tSELinux security context, thus fixing this bug. - BZ#784197
 - When SELinux was running in enforcing mode, the
cimservercommand was unable to rename its owncimserver_current.conffile. This update fixes the relevant policy andcimserverprogram can now rename its configuration file as expected. - BZ#785076
 - When SELinux was running in enforcing mode and Kerberos+NSS was configured to use the
coolkeymodule, AVC messages were returned. This update fixes the relevant SELinux policy so that the AVC messages are no longer returned in the described scenario. - BZ#803704
 - Previously, when a file was created by the
/usr/bin/Rcommand in user home directories, these directories got an incorrect SELinux security context because of missing SELinux policy rules. With this update, the relevant SELinux policy has been amended to ensure that correct SELinux security context is set in the described scenario. - BZ#807686
 - When OpenMPI (Open Message Passing Interface) was configured to use the parallel universe environment in the Condor server, a large number of AVC messages was returned when an OpenMPI job was submitted. Consequently, the job failed. This update fixes the appropriate SELinux policy and OpenMPI jobs now pass successfully and no longer cause AVC messages to be returned.
 - BZ#833843
 - With SELinux in enforcing mode, missing SELinux policy rules prevented the
freeradius2server to communicate with thepostgresqldatabase. With this update, appropriate SELinux rules have been added andfreeradius2is now able to communicate with thepostgresql. - BZ#834621
 - SSSD (System Security Services Daemon) sometimes handles systems with more than four thousand processes running simultaneously. This requires the
CAP_SYS_RESOURCELinux capability to be set with a higher limit for open file descriptors but SELinux did not previously allow it. With this update, an appropriate SELinux rule has been added to prevent this bug. - BZ#838511
 - Previously, with SELinux in enforcing mode, the
clamdcommand was unable to create its own PID file in the/var/run/amavis/directory. With this update, theamavis_create_pid_files()SELinux policy interface has been fixed to allow this action. - BZ#843443
 - With SELinux running in enforcing mode, the
snmpddaemon was unable to connect to themodclusterservice over theUnixstream socket. This bug has been fixed and the updated SELinux policy rules now allow these operations. - BZ#844701
 - When SELinux was running in enforcing mode, the
httpddaemon running in thepiranha_web_tSELinux domain was unable to read from the random number generator device (/dev/random). This update adds appropriate SELinux rules to granthttpdrunning in thepiranha_web_tdomain access to/dev/random. - BZ#848693
 - Previously, security contexts for the
seshshell installed in different directories did not match. This update adds a SELinux security context for the/usr/libexec/seshcommand to be the same as the context for the/usr/sbin/seshcommand. - BZ#848727
 - Due to an error in a SELinux policy, SELinux incorrectly prevented the
netplugdservice from starting. Now, updated SELinux policy rules have been provided that allownetplugdexecute thebrctlcommand in thebrctlSELinux domain, thus fixing this bug. - BZ#849155
 - Due to an incorrect file context specification, correct labeling for 64-bit Oracle libraries was missing from the SELinux policy. This bug has been fixed and the selinux-policy packages now provide this missing labeling.
 - BZ#833843
 - Previously, when the
etc-pam-d-radiusd-uses-non-existent-password-authtest was run, theradiusdservice was disallowed theptracesystem call, resulting in an AVC message being returned. This update adds an appropriate SELinux policy rule to allowradiusdthis system call, thus fixing this bug. - BZ#851658
 - Previously, OCSP (Online Certificate Status Protocol) requests from the Kerberos KDC (Key Distribution Center) failed in enforcing mode. Consequently, attempts to obtain Kerberos credentials by running the
kinitfrom a smart card were not successful. This update allows thekrb5kdcutility to connect to thetcp/9180port, thus fixing this problem. - BZ#854194
 - With SELinux in enforcing mode, the following scenario did not work and generated AVC messages to the
/var/log/audit/audit.logfile:- append the following line to
/etc/sysconfig/snmptrapd.optionsfile:OPTIONS="-Lsd -x /var/agentx/master"
OPTIONS="-Lsd -x /var/agentx/master"Copy to Clipboard Copied! Toggle word wrap Toggle overflow  - append following line to
/etc/snmp/snmpd.conffile:master agentx
master agentxCopy to Clipboard Copied! Toggle word wrap Toggle overflow  - run the
service snmpd restartandservice snmptrapd restartcommands. 
With this update, an appropriate SELinux rule has been added and this scenario now succeeds. - BZ#855035
 - Due to incorrect SELinux policy rules, the
nmbdservice was unable to create the/var/nmbd/unexpected/directory for its operation. Consequently, the following command failed:nmblookup -U 127.0.0.1 MACHINE-nmb
nmblookup -U 127.0.0.1 MACHINE-nmbCopy to Clipboard Copied! Toggle word wrap Toggle overflow Now, the SELinux policy rules have been updated and the problem with the above command no longer occurs. - BZ#855324
 - With SELinux in enforcing mode, when the
openswanservice was started and stopped in quick succession on a freshly-booted system, the AVC denial messages were logged to the/var/log/audit/audit.logfile. With this update, SELinux policy has been amended to ensure that SELinux no longer logs AVC messages in the described scenario. - BZ#859338
 - When SELinux was running in enforcing mode, the
pulsedaemon failed to start theIPVSsynchronization daemon at startup and a large number of AVC messages was logged to the/var/log/audit/audit.logfile. This bug has been fixed and SELinux now allowsIPVSto be started bypulseas expected. - BZ#863155
 - Due to an incorrect SELinux policy, the
swatutility was unable to write into theunexpectedsamba socket. This update provides a new SELinux policy rule, which prevent this bug. 
Enhancements
- BZ#839608, BZ#849071
 - A new SELinux policy rule has been added to allow the CUPS back end to send D-Bus messages to the system bus, thus allowing the hplip3 package to work with SELinux running in enforcing mode.
 - BZ#843841
 - The rebased rsyslogd package in Red Hat Enterprise Linux 5.9 required additional SELinux policy updates to allow running the
getschedule,setschedule, andsys_niceoperations. These selinux-policy packages add the required policy. - BZ#810239
 - With this update, labels of all files that are processed by the
logrotateutility are preserved. - BZ#845672
 - The
zarafaSELinux policy has been updated by thezarafaSELinux policy from Red Hat Enterprise Linux 6. - BZ#772205
 - Support for the
mod_banmodule in theproftpdservice has been added. - BZ#773042
 - A new
fenced_selinux.8man page has been added. - BZ#750588
 - A new
virtd_selinux.8man page has been added. 
		Users of selinux-policy are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.