Este contenido no está disponible en el idioma seleccionado.
8.198. selinux-policy
8.198.1. RHBA-2013:1598 — selinux-policy bug fix and enhancement update Copiar enlaceEnlace copiado en el portapapeles!
Copiar enlaceEnlace copiado en el portapapeles!
Updated selinux-policy packages that fix a number of bug fixes and add various enhancements are now available for Red Hat Enterprise Linux 6.
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fixes
- BZ#872542
- When SELinux was in enforcing mode and the
AWStatsutility was configured to purgehttpdlog files, AVC messages were generated due to missing SELinux policy rules for this setup. To fix this bug, theawstats_purge_apache_log_filesBoolean was added. When enabled, the Boolean allowsAWStatsto purge the log files. Thus, the AVC messages are no longer returned. - BZ#878148
- Due to a missing SELinux policy rule, the
httpddaemon did not have permissions for searching the/var/lib/cobbler/webui_sessions/directory. Consequently, the user was not able to log into the Cobbler Web User Interface (UI). With this update, the SELinux policy has been updated and the user is now able to use the Cobbler Web UI as expected. - BZ#890646, BZ#890647, BZ#892024
- When SELinux was in enforcing mode, the following problems related to the
postfixservice occurred:With this update, a set of new SELinux policy rules has been added to the SELinux policy to fix these bugs. As a result,- The
postfixservice was unable to connect to the MySQL database. - The
sysadm_uSELinux user was not able to execute thepostqueue -pcommand correctly. - The
postfixdaemon was not able to list the content of the/tmp/directory. - When the Sender Policy Framework (SPF) verification was enabled on a gateway, the
posfix-masterbinary was not able to execute thepostfix-policyd-spf-perlPostfix server.
postfixnow works as expected in the described scenarios. - BZ#903371
- Previously, a proper security context for the
/usr/local/bin/x11vncfile was missing. Consequently, SELinux in enforcing mode blocked the GNOME Display Manager (GDM) and the X.Org implementation of the X Window System from executing thex11vncserver utility. Thexserver_exec_tsecurity context for the file has been added to the SELinux policy and GDM and X.Org now work correctly in the described scenario. - BZ#906346
- Due to missing SELinux policy rules, the
sysstatutility was unable to write a device label when generating data for thesarcommand. With this update, the SELinux policy has been updated to allowsysstatto work correctly. - BZ#906773
- Previously, a proper security context for the
/bin/yum-builddepfile was missing. Consequently, SELinux in enforcing mode returned an error after installation of the sendmail package using theyum-builddepcommand. The security context has been updated torpm_exec_tand the installation usingyum-builddepnow proceeds as expected. - BZ#908095
- Due to incorrect SELinux policy rules, an attempt to use the
df_inodeplug-in of theMuninutility caused AVC messages to be returned. The policy rules have been updated and the plug-in now works as expected. - BZ#909857, BZ#983601, BZ#1003571, BZ#1021566
- When SELinux was in enforcing mode, the following problems related to the
tgtddaemon occurred due to insufficient SELinux policy rules:The appropriate SELinux policy rules have been added to fix these bugs and- The
tgtddaemon was not able to connect to the TCP port 3205 when it was running on a server together with theiSNSddaemon. Consequently,tgtdfailed to discover the Internet Storage Name Service (iSNS) target. - The
tgtddaemon failed to access the/dev/infiniband/uverbs0device due to missing SELinux labeling for the device. - The
SYS_RAWIO,SYS_ADMINandIPC_LOCKcapabilities were missing. - The
tgtddaemon failed to access the/dev/sg0device.
tgtdnow works as expected in the described scenarios. - BZ#912295
- Previously, when multiple devices were added to the system, a
udevrule restarted thektuneservices for each new device. This could lead to many restarts in a short period of time. The multiple restarts could trigger a race condition in the kernel, which cannot be currently fixed. Thetuneddaemon code has been modified not to trigger more than one restart per 10 seconds, thus preventing the race condition from occurring. - BZ#913673
- When the
cgrulesengddaemon attempted to use theinotifyfsscripts for monitoring file-system changes, SELinux denied the daemon to access to the scripts due to the insufficient SELinux policy. This update adds a new SELinux policy rule to fix this bug andcgrulesengdcan now useinotifyfsas expected. - BZ#915729, BZ#966203, BZ#984903
- When SELinux was in enforcing mode, the following problems related to the
system-config-kdumputility occurred due to insufficient SELinux policy rules:The appropriate SELinux policy rules have been added to fix these bugs and- The
kexecfeature running in thekdumpgui_tSELinux domain was not able to access thekcorefile. - The
system-config-kdumpwas unable to write to the/boot/efi/EFI/redhat/grub.cfgfile. - The
system-config-kdumpfailed to write theziplinformation.
system-config-kdumpnow works as expected. - BZ#917157, BZ#991024
- Previously, Nagios Remote Plugin Executor (NRPE) was not allowed to execute the
sudoutility due to missing SELinux policy rules. Consequently, when users used NRPE and their own Nagios plug-ins for monitoring servers, an attempt to call thestatusaction of theinit.dscript for the supplied service, to determine the health of the service, failed. The appropriate SELinux policy rules have been updated so that NRPE can now use thesudoutility as expected. - BZ#919192
- Due to an incorrect label of the
/var/lock/subsys/dirsrv-adminfile, an attempt to restart the Administration server using the console or the command line failed. As a consequence, AVC denial messages were returned. This update adds the proper default security context for the file and denial messages are now no longer returned. - BZ#919893
- Previously, a proper security context for the
/sbin/ip6tablesfile was missing. Consequently, SELinux in enforcing mode caused failures in theShorewallutility. With this update, the security context has been updated toiptables_exec_t. As a result,Shorewallworks as expected. - BZ#921234
- Due to missing SELinux policy rules, the
abrt_tSELinux domain was not allowed to make a transition to theprelink_tSELinux domain. As a consequence, the RPM verification of a package, which provided binary of a package that had terminated unexpectedly, failed during the Automatic Bug Reporting Tool (ABRT) processing. The SELinux policy has been modified to fix this bug so that the RPM verification no longer fails in the described scenario. - BZ#922028
- Previously, SELinux in enforcing mode prevented the
snmptthandlerutility from performing any operations in the/var/spool/snmptt/directory due to the incorrect security context of the directory. With this update, the context has been updated tosnmpd_var_lib_tso that the utility now works as expected. - BZ#922135
- Due to incorrect SELinux policy rules, the Nagios application was unable to temporary store a file with its test results in the
/var/spool/nagios/checkresults/directory. This update fixes the relevant SELinux policy rules and Nagios is no longer prevented from storing the file in this directory. - BZ#927003
- The Network Information Service (NIS) master can be configured with other machines running as NIS slaves. Previously, when a NIS client changed the NIS password, a new AVC message was logged into the
/var/log/audit/audit.logfile. This was because SELinux did not allow theyppusutility to connect to the Transmission Control Protocol (TCP) 111 port. With this update, the appropriate SELinux policy rules have been modified and the AVC message is no longer logged in the described scenario. - BZ#927973
- Due to the incorrect SELinux policy, running the Apache HTTP Server alongside with the
postfixagent did not work correctly. As a consequence, thepostdroputility, which was labeled with thehttpd_tSELinux label, was unable to access the/var/spool/postfix/maildrop/directory. With this update, thehttpd_can_sendmailBoolean has been updated to allowpostdropto access the directory. - BZ#947772
- When SELinux was in enforcing mode, the
sanlock-helperutility was not allowed to send a SIGKILL signal to any process, which was registered to thesanlockdaemon. The relevant SELinux policy rules have been modified with this update andsanlock-helperis now able to send the SIGKILL signal to the registered processes. - BZ#950103
- Due to insufficient SELinux policy rules, a transition between the
pegasus_tand themount_tSELinux domains did not work correctly. Consequently, when the OpenPegasus Web-Based Enterprise Management (WBEM) services tried to retrieve information about a file system using thewbemcliutility, the access to the mount was denied by SELinux. With this update, the SELinux policy has been modified and OpenPegasus is now able to access the mount in the described scenario. - BZ#952621
- When SELinux was in enforcing mode, the
sandboxSELinux domains were not able to use inherited user terminals due to missing SELinux policy rules. With this update, the respective rules have been updated to allowsandboxdomains to use these terminals. - BZ#953180
- Due to insufficient SELinux policy rules, when the
s2sservice was used in the mixed Red Hat Network Satellite and Red Hat Network Satellite Proxy environment, the following AVC message was returned in theaudit.logfile:The appropriate SELinux rules have been added to fix this bug and the AVC message is no longer returned in such a case.type=AVC msg=audit(1364300742.715:101611): avc: denied { name_connect } for pid=2278 comm="s2s" dest=5269 scontext=system_u:system_r:jabberd_t:s0 tcontext=system_u:object_r:jabber_interserver_port_t:s0 tclass=tcp_sockettype=AVC msg=audit(1364300742.715:101611): avc: denied { name_connect } for pid=2278 comm="s2s" dest=5269 scontext=system_u:system_r:jabberd_t:s0 tcontext=system_u:object_r:jabber_interserver_port_t:s0 tclass=tcp_socketCopy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#956720
- Previously the
opasswdand theopasswd.oldfiles were labeled with theetc_tSELinux context. However, these files included sensitive information and were supposed to be labeled with theshadow_tcontext. With this update, the SELinux policy has been modified and the files are now correctly labeled withshadow_tas expected. - BZ#957012
- Previously, clock devices (
/dev/ptp*) were incorrectly labeled with thedevice_tSELinux label instead ofclock_device_t. This update provides a patch to fix this bug and the clock devices are now correctly labeled. - BZ#957023
- Previously, SELinux in enforcing mode prevented the
svnservedaemon from using the TCP port 3690. The appropriate SELinux policy rules have been updated andsvnservecan now use the port as expected. - BZ#957265
- Due to missing SELinux rules, a transition between the
aide_tand theprelink_tSELinux domains was not possible. As a consequence, when SELinux was running in enforcing mode, theaide --checkcommand executed inside acronjob did not work correctly. The respective SELinux rules have been updated to fix this bug and the command now works as expected. - BZ#958682, BZ#975921, BZ#1009449
- Previously, the
mysqld_safescript was unable to execute a shell (/bin/sh) with theshell_exec_tSELinux security context. Consequently, the mysql55 and mariadb55 Software Collection packages were not working correctly. With this update, SELinux policy rules have been updated and these packages now work as expected. In addition, themysqld_safeSELinux policy has been modified to allow theSYS_NICEcapability. - BZ#966106
- When using certain versions of the Quantum service with
netnssupport, SELinux denied various operations, which caused Quantum to terminate unexpectedly. Moreover, due to a “dontaudit” rule for the operations, AVC messages were not returned unless SELinux was running in permissive mode. The appropriate SELinux policy has been fixed so that SELinux no longer denies the operations and Quantum failures no longer occur in the described scenario. - BZ#966515
- Previously, enabling the
ftp_homdedirBoolean allowed certain rules, that were not supposed to be allowed by the Boolean. The relevant SELinux policy has been modified and the Boolean now allows only the rules that it is supposed to. - BZ#966635
- Previously, the
MuninCommon Gateway Interface (CGI) scripts was labeled incorrectly, and therefore ran in an incorrect SELinux domain. The file context for the scripts has been updated tohttpd_munin_script_exec_tand the scripts now run in the correct SELinux domain. - BZ#966640
- Previously, the
/var/log/syslog-ngfile was incorrectly labeled with thesyslog_var_run_tSELinux security context. Consequently, when SELinux was running in enforcing mode, thelogwatchutility was unable to access the file. With this update, the security context for thesyslog-ngfile has been modified tovar_log_tandlogwatchcan now access the file as expected. - BZ#971594
- Previously, an attempt to attach a Logical Volume Management (LVM) volume to a Red Hat OpenStack 3 instance failed due to the incorrect SELinux policy and AVC denial messages were returned. The relevant SELinux policy rules have been modified to add an additional Multi-Category Security (MCS) attribute for the
hald_tSELinux domain. As a result, the AVC denial messages are now no longer returned in the described scenario. - BZ#973156
- Previously, the
/etc/yaboot.conffile was incorrectly labeled with theetc_tSELinux security context. With this update, the security context has been changed to thebootloader_etc_t. - BZ#974932
- The
SETUIDandSETGIDcapabilities were missing in the SELinux policy. As a consequence, when SELinux was in enforcing mode, thersyslogutility was unable to drop privileges with the$PrivDropToUserand$PrivDropToGroupoptions. With this update, the missing capabilities have been added to the SELinux policy andrsyslogcan now drop privileges as expected. - BZ#978993
- Due to incorrect SELinux policy rules, SELinux prevented the
chronyddaemon from using theSYS_NICEcapability. The capability is required by thesched_setscheduler()function. With this update, the SELinux policy rules has been modified to allow the daemon to useSYS_NICE. - BZ#983217
- Previously, a transition from the
dovecot_tSELinux domain to theoddjob_mkhomedir_tSELinux domain was not allowed. Consequently, an attempt to create a user home directory alongside with the Dovecot server and thepam_oddjob_mkhomedirmodule enabled failed and AVC messages were returned. The SELinux policy has been modified so that the transition is now allowed. - BZ#995434
- SELinux running in enforcing mode prevented the
lldpadservice from communicating with thefcoemonservice. As a consequence, the user was not able to create a virtual machine in Virtual Machine Manager (virt-manager) and the following AVC message was returned:The appropriate SELinux policy has been fixed and users are now able to create virtual machines as expected.type=AVC msg=audit(1376046443.294:69876): avc: denied { sendto } for pid=2755 comm="lldpad" path=003030303232 scontext=system_u:system_r:lldpad_t:s0 tcontext=system_u:system_r:fcoemon_t:s0 tclass=unix_dgram_sockettype=AVC msg=audit(1376046443.294:69876): avc: denied { sendto } for pid=2755 comm="lldpad" path=003030303232 scontext=system_u:system_r:lldpad_t:s0 tcontext=system_u:system_r:fcoemon_t:s0 tclass=unix_dgram_socketCopy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#998663
- Previously, the SELinux policy prevented running virtual machines based on volumes located in the
/var/run/vdsm/storage/VDSM's daemon directory. As a consequence, an attempt to run such a virtual machine terminated unexpectedly with an error. With this update, thesvirt_tSELinux domain has been updated to read symbolic links in the/var/run/directory. As a result, the virtual machines no longer fail in the described scenario. - BZ#1005196, BZ#1005250
- Due to incorrect SELinux policy rules, certain SELinux domains were unable to access the
/sys/devices/system/cpu/directory. Consequently, such domains could not get information from the directory. With this update, the relevant SELinux policy rules have been updated to allow the domains access to the/sys/devices/system/cpu/directory. - BZ#1005806
- With the Multi-Level Security (MLS) SELinux policy enabled, the
xinetddaemon failed to execute a shell script and the following error message was returned:The appropriate SELinux rules have been updated to allowxinetd[2771]: execv( /usr/local/eal4_testing/audit-test/utils/network-server/pidfile_kill.sh ) failed: Permission denied (errno = 13)
xinetd[2771]: execv( /usr/local/eal4_testing/audit-test/utils/network-server/pidfile_kill.sh ) failed: Permission denied (errno = 13)Copy to Clipboard Copied! Toggle word wrap Toggle overflow xinetdto execute shell scripts. - BZ#1006952
- Due to insufficient SELinux policy rules, an attempt to start a QEMU process using the
libvirtlibrary failed with an error. With this update, the SELinux policy has been modified and QEMU processes now start as expected. - BZ#1009661
- Due to insufficient SELinux policy rules, the
beakerjobs failed during automatic wireless testing and an AVC denied message was returned. Consequently, users were unable to use the wireless connection. The appropriate SELinux policy rules have been updated to fix this bug so that users can now use the wireless connection in the described scenario. - BZ#1009838
- Due to missing SELinux policy rules, when the system was set up to use the
yppasswdddaemon on a server, therpc.yppasswddbinary was now allowed to read the/var/run/utmpfile and list the content of the/boot/directory. The relevant SELinux policy has been updated and the daemon can now access theutmpfile and the/boot/directory as expected. - BZ#1009859
- When the system was set up to the Concurrent Versions System (CVS) server using Pluggable Authentication Module (PAM) for client authentication, the CVS binary was not allowed to read the
/var/run/utmpfile. This update fixes the relevant SELinux policy to allow CVS to read the file as expected.
Enhancements
- BZ#926022
- With this enhancement, a new Boolean,
ftpd_use_fusefs, has been added to the SELinux policy. When enabled, this Boolean allows the GlusterFS mounts to be used for the File Transfer Protocol (FTP) data directory. - BZ#854963, BZ#876334, BZ#881834, Bz#891779, BZ#1000521
- The
pand,haproxy,watchdog,lldpad, andopenhpiddaemons ran in theinitrc_tSELinux domain. With this enhancement, SELinux support has been added for the daemons and they now use their own separate SELinux domains. - BZ#871437
- With this enhancement, a new SELinux policy for the smstools package is provided.
- BZ#880728, BZ#986198
- Previously, the manual pages did not include all updated SELinux policy rules. With this update, the actual SELinux policy is included in the selinux-policy package. As a result, such manual pages are up-to-date.
- BZ#889120, BZ#915151, BZ#923246, BZ#924843, BZ#1011963,
- Previously, the
pacemakerresource manager did not have its own SELinux policy defined and used theinitrc_tdomain. With this update, all cluster administrative services includingpacemakerhave been merged together to thecluster_tSELinux domain. In addition to this merge, all other Red Hat Cluster services have been updated to use thecluster_tdomain. - BZ#859651, BZ#1004380, BZ#1010324
- The
git_shell_tSELinux type has been removed from the SELinux policy. With this enhancement, the updated SELinux policy for the Git control system is provided. - BZ#890554
- With this enhancement, the SELinux policy for the Zabbix monitoring system has been updated.
- BZ#915314
- With this enhancement, a set of new rules, which allows the user to mount the Gluster file system, has been added to the SELinux policy.
- BZ#922732, BZ#966387
- A new SELinux file type and label has been added for the
/var/lib/openvpn/directory. In addition, the SELinux policy has been updated to allow OpenVPN to manage its own log files. - BZ#928020, BZ#955189, BZ#979421, BZ#999471, BZ#1002593
- With this enhancement, the
amavis_t,clamd_t,clamscan_t,freshclam_tSELinux domains have been merged to theantivirus_tSELinux domain. - BZ#952827
- With this update, SELinux support for 27017, 28017, 27018, 28018, 27019 and 28019 ports has been added. These now ports use their separate
mongod_port_tSELinux port type. - BZ#953652, BZ#963465, BZ#968344, BZ#969485
- With this update, the SELinux policy for the OpenShift application platform has been updated to reflect the latest upstream policy.
- BZ#953754
- The file contexts for all Nagios plug-ins located in the
usr/lib(64)?/nagios/plugins/directory have been updated to thenagios_unconfined_plugin_exec_tcontext. - BZ#955774
- With this enhancement, two new Booleans have been added to the SELinux policy. The
tftp_use_nfsBoolean allows The Trivial File Transfer Protocol (TFTP) to read from NFS volumes for public file transfer services. Thetftp_use_cifsBoolean allows TFTP to read from CIFS volumes. - BZ#959554
- The new Shared System Certificates feature has added new locations, from which system trusted certificated and blacklist information could be read. With this enhancement, SELinux file contexts have been updated accordingly.
- BZ#964345
- The SELinux policy related to the QEMU Guest Agent (
qemu-ga) has been updated according to newqemu-gafeatures and functionality. - BZ#968403
- With this update, the SELinux policy for the Oracle Automatic Storage Management (ASM) has been updated to reflect the latest upstream policy.
- BZ#977047
- The Zettabyte File System (ZFS) has been added to the
xattrlist of supported file systems. With this enhancement, the SELinux policy has been updated accordingly. - BZ#979432
- The new
openvpn_run_unconfinedBoolean has been added to the SELinux policy. When enabled, the Boolean allows OpenVPN to execute unconfined scripts. - BZ#986883
- With this update, the SELinux policy for Internet Protocol Security (IPsec) has been updated to reflect the latest upstream policy.
- BZ#1006370
- With this update, the prefix of the
openstack-selinuxpolicies has been changed from “quantum” to “neutron”. - BZ#1011973
- With this enhancement, the TCP port 9000 is labeled with the
httpd_port_tSELinux label.
Users of selinux-policy are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.