Bug 2184140
| Summary: | Drop --neverallow and --neverallowxperm options | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Petr Lautrbach <plautrba> |
| Component: | setools | Assignee: | Petr Lautrbach <plautrba> |
| Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
| Severity: | low | Docs Contact: | Petr Hybl <phybl> |
| Priority: | low | ||
| Version: | 9.2 | CC: | gfialova, jafiala, lvrabec, mjahoda, mmalik, phybl, plautrba, vmojzis |
| Target Milestone: | rc | Keywords: | AutoVerified, Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | setools-4.4.2-2.1.el9 | Doc Type: | Enhancement |
| Doc Text: |
Important: if this rebase also contains *enhancements* (or contains only enhancements), select the correct option from the Doc Type drop-down list.
Rebase package(s) to version:
4.4.2
Highlights and important bug fixes:
Remove neverallow options in sesearch and apol. These are not usable since they are removed in the final binary policy.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-11-07 08:53:26 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Petr Lautrbach
2023-04-03 18:07:50 UTC
For QE purposes: don't forget that neverallow* rules used to be mentioned by 2 programs.
# sesearch --help | grep never
[--dontauditxperm] [--neverallow] [--neverallowxperm] [-T]
--neverallow Search neverallow rules.
--neverallowxperm Search neverallowxperm rules.
# seinfo | grep -i never
Allow: 63129 Neverallow: 0
Allowxperm: 0 Neverallowxperm: 0
#
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (setools bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6628 |