Bug 2129743
| Summary: | [RFE] Add targeted SELinux policy for FRR | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Michal Ruprich <mruprich> |
| Component: | frr | Assignee: | Michal Ruprich <mruprich> |
| Status: | CLOSED ERRATA | QA Contact: | František Hrdina <fhrdina> |
| Severity: | unspecified | Docs Contact: | Šárka Jana <sjanderk> |
| Priority: | unspecified | ||
| Version: | 9.2 | CC: | fhrdina, gfialova, jorton, pasik, pholica, sjanderk, zveleba |
| Target Milestone: | rc | Keywords: | AutoVerified, FutureFeature, Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | frr-8.3.1-3.el9 | Doc Type: | Enhancement |
| Doc Text: |
.The `frr` package now contains targeted SELinux policy
Due to the fast development of the `frr` package for managing dynamic routing stack, new features and access vector cache (AVC) issues arose frequently. With this enhancement, the SELinux rules are now packaged together with FRR to address any issues faster. SELinux adds an additional level of protection to the package by enforcing mandatory access control policies.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-05-09 07:32:39 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Michal Ruprich
2022-09-26 08:45:18 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: frr security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2202 |