Bug 1666088
Summary: | SELinux triggered by tumbler-0.1.31-2.el7.src.rpm | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | R P Herrold <herrold> |
Component: | tumbler | Assignee: | Kevin Fenzi <kevin> |
Status: | CLOSED EOL | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | epel7 | CC: | chipmand, igeorgex, kevin, metherid, nonamedotc |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2024-07-09 15:39:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
R P Herrold
2019-01-14 20:54:30 UTC
Is this issue still happening? Yes, this is happening to me, on Fedora 35. arget Context system_u:object_r:session_dbusd_tmp_t:s0 Target Objects bus [ sock_file ] Source tumblerd Source Path tumblerd Port <Unknown> Host fedora Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-35.10-1.fc35.noarch Local Policy RPM selinux-policy-targeted-35.10-1.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name fedora Platform Linux fedora 5.15.14-200.fc35.x86_64 #1 SMP Tue Jan 11 16:49:27 UTC 2022 x86_64 x86_64 Alert Count 2 First Seen 2022-01-19 23:10:11 EST Last Seen 2022-01-19 23:10:11 EST Local ID 2ff0dd36-ac06-4511-9eba-837a381ddedb Raw Audit Messages type=AVC msg=audit(1642651811.952:1749): avc: denied { write } for pid=768827 comm="tumblerd" name="bus" dev="tmpfs" ino=60 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:session_dbusd_tmp_t:s0 tclass=sock_file permissive=0 EPEL 7 entered end-of-life (EOL) status on 2024-06-30. EPEL 7 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. |