Bug 1379352
Summary: | AVC denials when running dhpcd resource agent | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | michal novacek <mnovacek> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | 7.3 | CC: | lvrabec, mgrepl, mmalik, mnovacek, plautrba, pvrabec, ssekidde |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | Bug | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1393066 |
Description
michal novacek
2016-09-26 12:45:50 UTC
The /lib64/libnss_sss.so.2 file is mislabeled # matchpathcon /lib64/libnss_sss.so.2 /lib64/libnss_sss.so.2 system_u:object_r:lib_t:s0 # Please run following command on your machine: # restorecon -Rv /lib64 Is this something that I have broken myself or is this something that needs to be fixed in selinux-policy? It looks like that you system is/was mislabeled, so there is no need to change it in selinux-policy. Are you able to reproduce it? Where does it come from? Beaker? Thank you. *** Bug 1388442 has been marked as a duplicate of this bug. *** Is it still relevant? Do you still see SELinux denials mentioned in comment#0? If not, we will close the bug because of mislableled filesystem on your side. Mislabeled files can be repaired via restorecon -Rv ... We're going to close this bug as WONTFIX because * of limited capacity of selinux-policy developers * the bug is related to EPEL component or 3rd party SW only * the bug appears in unsupported configuration We believe this bug can be fixed via a local policy module. For more information please see: * https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/sect-security-enhanced_linux-troubleshooting-fixing_problems#sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow If you disagree, please re-open the bug. We're going to close this bug as WONTFIX because * of limited capacity of selinux-policy developers * the bug is related to EPEL component or 3rd party SW only * the bug appears in unsupported configuration We believe this bug can be fixed via a local policy module. For more information please see: * https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/sect-security-enhanced_linux-troubleshooting-fixing_problems#sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow If you disagree, please re-open the bug. The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days |