Bug 742630
Summary: | /usr/bin/passwd produces lots of selinux errors | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | igor.redhat <igor.redhat> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 16 | CC: | dominick.grift, dwalsh, mgrepl |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.10.0-38.fc16 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2011-10-09 19:36:49 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
igor.redhat@gmail.com
2011-09-30 19:55:26 UTC
i can confirm this: # ausearch -m avc -ts yesterday | grep passwd_t | audit2allow #============= passwd_t ============== allow passwd_t agp_device_t:chr_file getattr; allow passwd_t apm_bios_t:chr_file getattr; allow passwd_t autofs_device_t:chr_file getattr; allow passwd_t clock_device_t:chr_file getattr; allow passwd_t device_t:chr_file getattr; allow passwd_t event_device_t:chr_file getattr; allow passwd_t fixed_disk_device_t:blk_file getattr; allow passwd_t framebuf_device_t:chr_file getattr; allow passwd_t fuse_device_t:chr_file getattr; allow passwd_t initctl_t:fifo_file getattr; allow passwd_t kmsg_device_t:chr_file getattr; allow passwd_t loop_control_device_t:chr_file getattr; allow passwd_t lvm_control_t:chr_file getattr; allow passwd_t memory_device_t:chr_file getattr; allow passwd_t netcontrol_device_t:chr_file getattr; allow passwd_t nvram_device_t:chr_file getattr; allow passwd_t ppp_device_t:chr_file getattr; allow passwd_t printer_device_t:chr_file getattr; allow passwd_t proc_kcore_t:file getattr; allow passwd_t ptmx_t:chr_file getattr; allow passwd_t scsi_generic_device_t:chr_file getattr; allow passwd_t tpm_device_t:chr_file getattr; allow passwd_t usbmon_device_t:chr_file getattr; allow passwd_t v4l_device_t:chr_file getattr; allow passwd_t watchdog_device_t:chr_file getattr; allow passwd_t wireless_device_t:chr_file getattr; allow passwd_t xserver_misc_device_t:chr_file getattr; #============= passwd_t ============== #!!!! This avc has a dontaudit rule in the current policy allow passwd_t event_device_t:chr_file getattr; sh-4.2# rpm -q selinux-policy selinux-policy-3.10.0-33.fc16.noarch selinux-policy-3.10.0-36.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-36.fc16 Package selinux-policy-3.10.0-36.fc16: * should fix your issue, * was pushed to the Fedora 16 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-36.fc16' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-36.fc16 then log in and leave karma (feedback). selinux-policy-3.10.0-38.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. |