Bug 338411

Summary: SELinux denies /usr/sbin/load_policy (load_policy_t) "write" to pipe (rpm_t).
Product: [Fedora] Fedora Reporter: Julian Sikorski <belegdol>
Component: selinux-policy-targetedAssignee: Daniel Walsh <dwalsh>
Status: CLOSED RAWHIDE QA Contact: Ben Levenson <benl>
Severity: low Docs Contact:
Priority: low    
Version: rawhide   
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-10-21 12:40:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Julian Sikorski 2007-10-18 17:18:07 UTC
Description of problem:
This happens every selinux-policy update. Today I updated it again (3.0.8-22 to
3.0.8-24) and the alert was still present

avc: denied { write } for comm=load_policy dev=pipefs egid=0 euid=0
exe=/usr/sbin/load_policy exit=0 fsgid=0 fsuid=0 gid=0 items=0 path=pipe:[59649]
pid=6681 scontext=system_u:system_r:load_policy_t:s0 sgid=0
subj=system_u:system_r:load_policy_t:s0 suid=0 tclass=fifo_file
tcontext=system_u:system_r:rpm_t:s0 tty=pts0 uid=0 

Version-Release number of selected component (if applicable):
selinux-policy-3.0.8-22.fc8

How reproducible:
every policy update

Steps to Reproduce:
1. yum update selinux-policy-targeted
  
Actual results:
SELinux denial occurs

Expected results:
No denial

Comment 1 Daniel Walsh 2007-10-18 19:30:46 UTC
Fixed in selinux-policy-targeted-3.0.8-25