stable

selinux-policy-3.14.3-37.fc30

FEDORA-2019-40c077f70d created by lvrabec 5 years ago for Fedora 30

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2019-40c077f70d

This update has been submitted for testing by lvrabec.

5 years ago

This update has been pushed to testing.

5 years ago
User Icon cserpentis commented & provided feedback 5 years ago
karma

works for me still, nothing broke on reboot yet.

User Icon filiperosset commented & provided feedback 5 years ago
karma

no regressions noted

User Icon goeran commented & provided feedback 5 years ago
karma

This makes the alert from #1705331 go away, but instead it triggered other denials which I reported in #1711799.

I hesitated if this meant karma or not, but since the particular AVC from #1705331 is gone, and nothing breaks that wasn't already broken (sa-update didn't work and will still not work) I chose to give it.

BZ#1705331 SELinux is preventing (ate.cron) from 'execute' accesses on the file /usr/share/spamassassin/sa-update.cron.
User Icon mhayden commented & provided feedback 5 years ago
karma

Working fine.

This update has been submitted for batched by bodhi.

5 years ago
User Icon lucabotti commented & provided feedback 5 years ago
karma

Working fine!

BZ#1705246 SELinux is preventing cat from 'read' accesses on the file last_pwr.
BZ#1705331 SELinux is preventing (ate.cron) from 'execute' accesses on the file /usr/share/spamassassin/sa-update.cron.
BZ#1705685 SELinux is preventing qemu-system-x86 from 'open' accesses on the chr_file /dev/nvidiactl.
BZ#1706490 SELinux is preventing iscsid from 'map' accesses
BZ#1708082 SELinux is preventing cp from using the 'fsetid' capabilities.
BZ#1708951 SELinux is preventing runlevel from using the 'setrlimit' accesses on a process.
BZ#1709025 SELinux is preventing gpsd from 'read' accesses on the file c189:642.
BZ#1710119 SELinux is preventing dbus-broker-lau from 'sendto' accesses on the unix_dgram_socket /run/user/1000/systemd/notify.
BZ#1711122 SELinux is preventing /usr/lib/systemd/systemd-journald from 'kill' accesses on the cap_userns labeled syslogd_t.

This update has been submitted for stable by bodhi.

5 years ago

This update has been pushed to stable.

5 years ago

Please login to add feedback.

Metadata
Type
bugfix
Severity
high
Karma
5
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
4
Stable by Time
disabled
Dates
submitted
5 years ago
in testing
5 years ago
in stable
5 years ago
BZ#1705246 SELinux is preventing cat from 'read' accesses on the file last_pwr.
0
1
BZ#1705331 SELinux is preventing (ate.cron) from 'execute' accesses on the file /usr/share/spamassassin/sa-update.cron.
0
2
BZ#1705685 SELinux is preventing qemu-system-x86 from 'open' accesses on the chr_file /dev/nvidiactl.
0
1
BZ#1706490 SELinux is preventing iscsid from 'map' accesses
0
1
BZ#1708082 SELinux is preventing cp from using the 'fsetid' capabilities.
0
1
BZ#1708951 SELinux is preventing runlevel from using the 'setrlimit' accesses on a process.
0
1
BZ#1709025 SELinux is preventing gpsd from 'read' accesses on the file c189:642.
0
1
BZ#1709572 SELinux is preventing dovecot-lda from setuid/setgid when delivering mail
0
0
BZ#1710113 SELinux is preventing dbus-broker-lau from 'execute_no_trans' accesses on the file /usr/bin/dbus-broker.
0
0
BZ#1710119 SELinux is preventing dbus-broker-lau from 'sendto' accesses on the unix_dgram_socket /run/user/1000/systemd/notify.
0
1
BZ#1711122 SELinux is preventing /usr/lib/systemd/systemd-journald from 'kill' accesses on the cap_userns labeled syslogd_t.
0
1

Automated Test Results