Bug 669348

Summary: A new SELinux policy is needed for /etc/security/namespace.init
Product: Red Hat Enterprise Linux 6 Reporter: Miroslav Grepl <mgrepl>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: medium Docs Contact:
Priority: low    
Version: 6.1CC: dwalsh
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-01-14 07:49:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Miroslav Grepl 2011-01-13 13:01:03 UTC
Description of problem:

When a normal user logs on for the first time with using polyinstantiation, files .bash* seem to be copied to the home dir which causes permission errors. 


Version-Release number of selected component (if applicable):

rpm -qa \*selinux\*
libselinux-devel-2.0.94-2.el6.x86_64
selinux-policy-targeted-3.7.19-63.el6.noarch
selinux-policy-doc-3.7.19-63.el6.noarch
libselinux-python-2.0.94-2.el6.x86_64
libselinux-utils-2.0.94-2.el6.x86_64
selinux-policy-minimum-3.7.19-63.el6.noarch
libselinux-2.0.94-2.el6.x86_64
selinux-policy-mls-3.7.19-63.el6.noarch
selinux-policy-3.7.19-63.el6.noarch


How reproducible:


Steps to Reproduce:
1. Setup MLS machine
2. Enable polyinstantiation in /etc/security/namespace.conf
3. Create a new user and try to log in
4. Try to setup it also for ssh, gdm
  
Actual results:

Does not work.

Expected results:

Should work with a new policy.

Additional info:

Comment 1 Daniel Walsh 2011-01-13 19:38:15 UTC
Backport changes from Rawhide.

Comment 2 Miroslav Grepl 2011-01-14 07:49:12 UTC

*** This bug has been marked as a duplicate of bug 669439 ***