Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0163 - Bug Fix Advisory
Issued:
2009-01-20
Updated:
2009-01-20

RHBA-2009:0163 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

selinux-policy bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated selinux-policy packages that fix several bugs and add an
enhancement are now available.

Description

The selinux-policy packages contain the rules that govern how confined
processes run on the system.

These updated packages resolve several bugs in Security-Enhanced Linux
(SELinux) policy as shipped with Red Hat Enterprise Linux 5. The majority
of these bugs resulted in SELinux denying legitimate access.

The following is a non-exhaustive, brief list of bugs resolved by this
update:

  • denials for "iscsid" and "iscsiadm".
  • Common UNIX Printing System (CUPS) issues, such as print jobs failing

when using the Hewlett-Packard Linux Imaging and Printing (HPLIP) software.

  • Simple Network Management Protocol (SNMP) issues, such as snmpd hanging

when querying for IPv6 attributes on systems with IPv6 disabled.

  • various denials related to D-Bus, causing issues for certain

applications.

  • due to incorrect labels, Kernel-based Virtual Machine (KVM) guests that

used virtio drivers failed to mount "/boot" during rc.sysinit.

  • the "/boot/efi/" files on Itanium-based systems were labeled incorrectly.
  • "/var/lib/iscsi" and "/var/lock/iscsi" were labeled incorrectly.
  • denials in certain situations when upgrading from Red Hat Enterprise

Linux 5.1 to 5.2.

  • when SNMP support was enabled for Squid, Squid failed to start.
  • various denials when using Samba.
  • denials when using DHCP.
  • in clustered environments, errors occurred when using the Conga web

interface to view storage details. Also, luci may have reported an
incorrect service status.

  • denials when using certain procmail scripts, as well as delivery problems

when using a combination of procmail and Dovecot.

  • incorrect labeling, causing issues for "kadmind".
  • FreeRADIUS was unable to communicate with Net-SNMP.
  • corrections to the ftpd_selinux(8) manual page, with regards to using the

"semanage" tool for labeling.

  • in Kerberos master and slave environments, replications from the master

to the slave may have caused denials. In this update, a policy has been
added for kpropd (so that it runs confined), which resolves this issue.

Also, in this update, a policy has been added for the IPsec Tools racoon
daemon (so that it runs confined).

This update resolves several bugs not listed here. A more complete list of
changes is available in the selinux-policy package changelog. To view this
information, run the following command after installing or updating the
selinux-policy package:

rpm -q --changelog selinux-policy

All users are advised to upgrade to these updated packages, which resolve
these issues and add this enhancement.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 247510 - There is no selinux module for ipsec-tools (racoon)
  • BZ - 437722 - policygentool - missing python module dependency + wrong option
  • BZ - 441750 - ia64 selinux: Properly install files and symlinks
  • BZ - 442028 - SELinux preventing procmail recipe
  • BZ - 447014 - SELinux policy needed for kpropd
  • BZ - 447403 - selinux utilities report incorrect context for /var/lib/iscsi* objects
  • BZ - 447854 - No SELinux labeling exists for infinibandeventfs
  • BZ - 449420 - [RHEL5.2][SELinux] AVC denied messages after upgrading from 5.1 to 5.2
  • BZ - 450390 - "permission append is not defined for class chr_file" when using the macro dev_rw_null(domain)
  • BZ - 451805 - RHEL5.2 |SELINUX: Restarting portmap service shows "not registered portmapper" message
  • BZ - 452787 - squid ceased to work after upgrade to 5.2
  • BZ - 454024 - selinux denies snmpd to read from /proc/pid/fd/*
  • BZ - 455033 - kadmind is not able to write to /var/kerberos/krbkdc/principal.ok file
  • BZ - 455697 - SELinux is preventing perl (logwatch_t) "getattr" to /root (user_home_dir_t)
  • BZ - 455784 - AVC denies Conga from using storage in permissive mode
  • BZ - 456674 - Selinux does not allow samba to change file owner
  • BZ - 457307 - can't run dovecot's deliver from inside .procmailrc
  • BZ - 457455 - SELinux is complaining about Novell GroupWise library
  • BZ - 459390 - "permission ioctl is not defined for class sock_file" when using nscd_socket_use macro
  • BZ - 459570 - SELinux policy needs to be changed to support hal-set-keymap
  • BZ - 459888 - SELinux is preventing dhcdbd (dhcpc_t) "read" to /etc/dbus-1/system.d (dbusd_etc_t)
  • BZ - 460398 - iscsid needs additional SELinux allow rule for interface binding
  • BZ - 460733 - Cannot execute locally installed daemon (pysieved) from stunnel (permission denied)
  • BZ - 461040 - Selinux policy prevents freeradius to communicate with net-snmp
  • BZ - 461323 - SELinux AVCs when accessing mib .1.3.6.1.2.1.6
  • BZ - 461326 - SELinux is preventing snmpd (snmpd_t) "read" to pipe (crond_t)
  • BZ - 461624 - auditd service won't start because of "Unable to open /sbin/audispd (Permission denied)"
  • BZ - 461644 - SELinux is preventing snmpd (snmpd_t) "unlink" to master (var_t)
  • BZ - 461645 - Fails to permit hal/pm-utils to run vbetool against /var/run/video.rom on resume
  • BZ - 461769 - luci reports incorrect service status with SELinux enforcing
  • BZ - 461814 - avc: denied { read } for pid=3500 comm="cupsd" name="tmp" dev=dm-0 ino=1730098 scontext=user_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir
  • BZ - 462739 - [NetApp-S 5.3 bug] Getting selinux errors when iscsid is shutdown
  • BZ - 463267 - SELinux is preventing dbus-daemon-lau (system_dbusd_t) "execute_no_trans" to /lib/dbus-1/dbus-daemon-launch-helper (lib_t).
  • BZ - 463480 - SELinux is preventing dbus-daemon (system_dbusd_t) "execute_no_trans" to /lib/dbus-1/dbus-daemon-launch-helper (system_dbusd_exec_t)
  • BZ - 464079 - avc: denied { search / unlink } for comm="audispd"
  • BZ - 464886 - denyhosts requires selinux policy changes to work without disabling other critical services like NFS
  • BZ - 465219 - man page ftpd_selinux bugs
  • BZ - 466470 - avc: denied { getsched } for pid=12121 comm="snmpd" ...
  • BZ - 467369 - avc: denied { getattr } for comm="audispd" path="/sbin/audispd-zos-remote"
  • BZ - 467995 - avc: denied { getattr } for comm="perl" path="/root"
  • BZ - 470248 - Error installing selinux-policy-strict: libsepol.expand_terule_helper: conflicting TE rule for ...
  • BZ - 470574 - SELinux mgetty runs unconfined_t if launched with a parameter in /etc/initttab
  • BZ - 470621 - SELinux is preventing cups-deviced (cupsd_t) "signal"
  • BZ - 470857 - SELinux policy prevents hplip_t type from reading cupsd_tmp_t files
  • BZ - 471160 - RHTS test fails to run correctly - selinux messages only evidence
  • BZ - 472373 - bind cannot access to /etc/krb5.keytab
  • BZ - 472903 - [RHEL5.3] SELinux AVC Denied: Not allowing install of xen guest
  • BZ - 475273 - missing policy

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
x86_64
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178
ia64
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178
i386
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

Red Hat Enterprise Linux Workstation 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
x86_64
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178
i386
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

Red Hat Enterprise Linux Desktop 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
x86_64
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178
i386
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
s390x
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

Red Hat Enterprise Linux for Power, big endian 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
ppc
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

Red Hat Enterprise Linux Server from RHUI 5

SRPM
selinux-policy-2.4.6-203.el5.src.rpm SHA-256: e47ad26f4cc7247a62064141aef8848d188b3a2925293937e52a561fc50ac08b
x86_64
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178
i386
selinux-policy-2.4.6-203.el5.noarch.rpm SHA-256: ea81862ba7fd6d27f5985f700838a9bcbba2b5083e616e3904d36013d724a3b4
selinux-policy-devel-2.4.6-203.el5.noarch.rpm SHA-256: 60da8d7f3286b60d2745f10cd993b75c1de81e5ea96a7958cdaff458c5c2be38
selinux-policy-mls-2.4.6-203.el5.noarch.rpm SHA-256: 2517dd292606684f76a16be194299f9da75537cc7499c9125a24bfe18e9262f2
selinux-policy-strict-2.4.6-203.el5.noarch.rpm SHA-256: e4a56acb6f3735d7cdfe3edaefd4e134317ea28079dc501ccc9c39c1e8bcea22
selinux-policy-targeted-2.4.6-203.el5.noarch.rpm SHA-256: f6561ba2a3a985750606bfc1a1f971f8042c301ce4c74e9dad970eed7cb0c178

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility