stable

selinux-policy-3.13.1-284.37.fc27

FEDORA-2018-4bb4de2d86 created by lvrabec 6 years ago for Fedora 27

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2018-4bb4de2d86

This update has been submitted for testing by lvrabec.

6 years ago

This update has been pushed to testing.

6 years ago

Installed this update and rebooted. I still get the error message as mentioned in bug #1598995 I have also tried to run 'restorecon -Rv /' and rebooted. It made no difference.

User Icon gjanssens provided feedback 6 years ago

Hmm, bodhi doesn't take my '-1' for bug #1598995 ? Tried twice now. Is this because there is also bug #1501331 for which I don't have access (it remains in loading status) ?

User Icon mavit provided feedback 6 years ago
karma
User Icon mavit provided feedback 6 years ago
User Icon dhgutteridge commented & provided feedback 6 years ago
karma

No regressions noted. (However, unlike a recent F28 update, this does not seem to address any of the upower-0.99.8 issues that prevent hibernation on lid close and other power-related activities.)

@gjanssens: Bodhi isn't taking your bug-specific feedback because there's a defect in Bodhi itself that's preventing that feedback from registering anymore.

@dhgutteridge: Ok. So how should I proceed to indicate this isn't working (other than adding a comment which will not block automatic release) ?

@gjanssens: you'd have to comment in the Red Hat Bugzilla ticket itself.

@dhgutteridge: Ok. That's what I did. Thanks for your feedback.

User Icon cserpentis commented & provided feedback 6 years ago
karma

works for me in a VM

This update has been submitted for batched by bodhi.

6 years ago

This update has been submitted for stable by bodhi.

6 years ago

This update has been pushed to stable.

6 years ago
User Icon jwakely provided feedback 6 years ago

Sigh, that was supposed to be a -1, because several of the bugs apparently fixed in this update, are not fixed.


Please login to add feedback.

Metadata
Type
bugfix
Severity
medium
Karma
3
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
6 years ago
in testing
6 years ago
in stable
6 years ago
BZ#1359061 Missing type enforcement rules for collectd plugin log_logstash
0
0
BZ#1483726 SELinux is preventing gnome-shell from 'map' accesses on the file /etc/udev/hwdb.bin.
0
0
BZ#1492377 tgtd (iscsi initiator service) fails to start due to SELinux denial
0
0
BZ#1518655 Lots of SELinux denials with "passwd: compat"
0
0
BZ#1530563 SELinux is preventing systemd-machine from 'read' accesses on the lnk_file os-release.
0
0
BZ#1532034 SELinux is preventing tlp from 'open' accesses on the file /run/tlp/lock_tlp.
0
0
BZ#1534182 aide requires "map" privilege
0
0
BZ#1539008 SELinux prevents the ntop service from running
0
0
BZ#1539072 SELinux prevents dictd from sending D-bus messages
0
0
BZ#1541205 SELinux Troublshooter keeps reporting issues with the systemd journal
0
0
BZ#1547139 Spurious SELinux alerts: SELinux is preventing acpid from 'open' accesses on the chr_file /dev/input/event26.
0
0
BZ#1575212 nnp_transition and execute_no_trans denials for geoclue2 2.4.10 prevent it working (F27)
0
0
BZ#1575719 SELinux is preventing (geoclue) from using the 'nnp_transition' accesses on a process.
0
0
BZ#1583797 qemu-ga does not have read access to utmp
0
0
BZ#1588212 SELinux is preventing mktemp from 'write' accesses on the directory .esmtp_queue.
0
0
BZ#1591421 SELinux is preventing fail2ban-server from using the 'getpgid' accesses on a process.
0
0
BZ#1595100 denied { map } comm="mdadm" path="/usr/sbin/mdadm"
0
0
BZ#1595991 SELinux is preventing systemd-network from 'create' accesses on the tun_socket Unknown.
0
0
BZ#1596506 /usr/sbin/rhn_check* should have same context as /usr/sbin/rhn_check
0
0
BZ#1598984 SELinux is preventing gnome-shell from map access on the chr_file /dev/nvidiactl.
0
0
BZ#1598995 SELinux is preventing sddm-greeter from 'map' accesses on the chr_file /dev/nvidiactl.
0
0
BZ#1601169 selinux-policy forbid gnome-session-c access map on chr_file /dev/nvidiactl, which in return prevent GDM to show
0
0

Automated Test Results