-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: fapolicyd bug fix update Advisory ID: RHSA-2020:5607-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5607 Issue date: 2020-12-17 ===================================================================== 1. Summary: An update for fapolicyd is now available for Red Hat Enterprise Linux 8. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The fapolicyd software framework introduces a form of file access control based on a user-defined policy. The application file access control feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es): * When an update replaces the binary of a running application, the kernel modifies the application binary path in memory by appending the " (deleted)" suffix. Previously, the fapolicyd file access policy daemon treated such applications as untrusted, and prevented them from opening and executing any other files. As a consequence, the system was sometimes unable to boot after applying updates. With this update, fapolicyd ignores the suffix in the binary path so the binary can match the trust database. As a result, fapolicyd enforces the rules correctly and the update process can finish. (BZ#1906472) * Adding DISA STIG during OS installation causes 'ipa-server-install' to fail (BZ#1905895) Note: The issue from BZ#1906472 was previously addressed in erratum RHBA-2020:5242 linked to from the References section. Due to the high impact of the issue that can cause systems to become unable to boot, we are releasing the same fix again in a security erratum to ensure proper visibility to users who only install security updates. This fix has not been changed in any way since the original bug fix erratum. This erratum does not provide any security fixes. For more details about the issue, see the Knowledgebase article linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1905895 - Adding DISA STIG during OS installation causes 'ipa-server-install' to fail [rhel-8.3.0.z] 1906472 - Erratum RHBA-2020:4969 is of no help when upgrading partially RHEL 8.2 systems [rhel-8.3.0.z] 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: fapolicyd-1.0-3.el8_3.4.src.rpm aarch64: fapolicyd-1.0-3.el8_3.4.aarch64.rpm fapolicyd-debuginfo-1.0-3.el8_3.4.aarch64.rpm fapolicyd-debugsource-1.0-3.el8_3.4.aarch64.rpm noarch: fapolicyd-selinux-1.0-3.el8_3.4.noarch.rpm ppc64le: fapolicyd-1.0-3.el8_3.4.ppc64le.rpm fapolicyd-debuginfo-1.0-3.el8_3.4.ppc64le.rpm fapolicyd-debugsource-1.0-3.el8_3.4.ppc64le.rpm s390x: fapolicyd-1.0-3.el8_3.4.s390x.rpm fapolicyd-debuginfo-1.0-3.el8_3.4.s390x.rpm fapolicyd-debugsource-1.0-3.el8_3.4.s390x.rpm x86_64: fapolicyd-1.0-3.el8_3.4.x86_64.rpm fapolicyd-debuginfo-1.0-3.el8_3.4.x86_64.rpm fapolicyd-debugsource-1.0-3.el8_3.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/errata/RHBA-2020:5242 https://access.redhat.com/solutions/5542661 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX9sNQdzjgjWX9erEAQiM2RAAh86ks3RrW8QLPyRBwXh9/EQjKrAHxNeT S3ttKdPuJOdtPsJniXeJdZtODNRVZnZQet/aJUlQ+5xrmYXPmlhwf0r9+2HpnLap WtUYEczIPkf5siZrX6crnB4x2m6Nf4vYhUviSQDf/C49lhH3R8v9Xj4aTi43lPYF I8pBFjyZLgFeQR8tKhBuZOQpgtPHUOZumqC0jLXAL12/TpY3OIDLzJ0QjciEhk7v TtDeOp9wYw8NYyV76mYnVVVR1TXrjIGUOQm2BvSYZAL7lFtrEeiSMZeqS63FWvAH dKb5O8S8blL2c8Zx/djyjm8iCXoFULxeclkePbBl8waRZssX3EbLqrUrxs3GJd3w /EhKqpP8qdB07W2I47HZf2ggfoxva7vG2U91YyMSsm1ria2YJr9pqjm5ZSGjTVMK M6QYUfhQnkczZ+Dg18AS0o/ElkY+fP3z/W80oNBRclo+r9qZ6aB6Bccnr344MtCf c6chiBdeNpfpuayvPu6zpfKgo7tTJWMxWGkMpagOdVZaDjrumQIBbc0L1SLvs9UP fzclbR8hmb7MGDcE1s1dMZy2nBh7vN43unLlQmRsboEJGcll9rIvh1LZz2OON53L AuyPhGGw9/qN96MVBxo+RuC5EMfyNySonuYFzU/IFEBLdY4vl5V9g//Lkme6bddf YZqFLp6PfoE= =RXdS -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce