Bug 498358
Summary: | SELinux is preventing ip6tables-resto (iptables_t) "read write" unconfined_t. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Dave <dcatkin> |
Component: | selinux-policy | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 10 | CC: | dwalsh, jkubin, mgrepl, pjones |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-08-21 21:03:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Dave
2009-04-30 03:34:58 UTC
How did you trigger this? It looks like a leaked file descriptor potentially from konsole? Are you using the kde konsole for terminal access? Or did you use some gui tool to trigger this avc. It can safely be ignored as I am sure the iptables command succeeded, and SELinux just closed the leak. |