Fedora 42 Update: selinux-policy-42.4-1.fc42

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-d93e219f23
2025-08-07 00:52:21.280276+00:00
--------------------------------------------------------------------------------

Name        : selinux-policy
Product     : Fedora 42
Version     : 42.4
Release     : 1.fc42
URL         : https://github.com/fedora-selinux/selinux-policy
Summary     : SELinux policy configuration
Description :
SELinux core policy package.
Originally based off of reference policy,
the policy has been adjusted to provide support for Fedora.

--------------------------------------------------------------------------------
Update Information:

New F42 selinux-policy build
--------------------------------------------------------------------------------
ChangeLog:

* Mon Aug  4 2025 Zdenek Pytela <zpytela@xxxxxxxxxx> - 42.4-1
- Allow unconfined user a file transition for creating sudo log directory
- Allow virtqemud read/write inherited dri devices
- Allow xdm_t create user namespaces
- Update policy for login_userdomain
- Add ppd_base_profile to file transition to get tuned_rw_etc_t type
- Update policy for bootupd
- Allow logwatch work with opensmtpd
- Update dovecot policy for dovecot 2.4.1
- Allow ras-mc-ctl write to sysfs files
- Allow anaconda-generator get attributes of all filesystems
- Add the rhcd_rw_fifo_files() interface
- Allow systemd-coredump the sys_chroot capability
- Allow hostapd write to socket files in /tmp
- Recognize /var/home as an alternate path for /home
- Label /var/lib/lastlog with lastlog_t
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2278988 - /var/log/sudo-io is created with var_log_t instead of sudo_log_t
        https://bugzilla.redhat.com/show_bug.cgi?id=2278988
  [ 2 ] Bug #2342843 - SELinux is preventing /usr/sbin/smtpctl from 'write' accesses on the directory /var/spool/smtpd/offline/.
        https://bugzilla.redhat.com/show_bug.cgi?id=2342843
  [ 3 ] Bug #2367923 - SELinux is preventing rpc-virtqemud from 'read, write' accesses on the chr_file renderD128.
        https://bugzilla.redhat.com/show_bug.cgi?id=2367923
  [ 4 ] Bug #2381745 - Confine nfs generator
        https://bugzilla.redhat.com/show_bug.cgi?id=2381745
  [ 5 ] Bug #2385046 - SELinux is preventing anaconda-genera from 'getattr' accesses on the filesystem /.
        https://bugzilla.redhat.com/show_bug.cgi?id=2385046
  [ 6 ] Bug #2385913 - SELinux is preventing tuned-ppd from 'write' accesses on the file /etc/tuned/ppd_base_profile.
        https://bugzilla.redhat.com/show_bug.cgi?id=2385913
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-d93e219f23' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux