Bug 119006 - usernetctl needs to be SELinux-aware
usernetctl needs to be SELinux-aware
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: initscripts (Show other bugs)
rawhide
All Linux
medium Severity medium
: ---
: ---
Assigned To: Bill Nottingham
Brock Organ
: SELinux
Depends On:
Blocks: 122683
  Show dependency treegraph
 
Reported: 2004-03-23 15:10 EST by Aleksey Nogin
Modified: 2014-03-16 22:43 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-10-03 09:42:27 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Aleksey Nogin 2004-03-23 15:10:33 EST
Currently, usernetctl does not make any attempt to cooperate with
SELinux and runs all scripts in the originating context of the caller.
As a result, SELinux would not let ordinary users (or staff_r users
for that matter) to control the USERCTL=yes devices.

initscripts-7.48-1 policy-1.9-6
Comment 1 Aleksey Nogin 2004-03-24 18:33:51 EST
Update: when running in enforcing mode with policy-1.9-11, the staff_r
can control the USERCTL=yes devices. 

Hopefully we just need to:
- Check that the user_r works too (assuming it is desirable).
- Add dontaudit for messages that get generated.
Comment 2 Bill Nottingham 2005-09-30 17:11:57 EDT
Closing bugs on older releases. Apologies for any lack of response.

Does this persist on FC3/FC4 with strict policy?
Comment 3 Aleksey Nogin 2005-10-02 03:33:49 EDT
I have no idea. I am currently using FC3 with the targeted policy.
Comment 4 Daniel Walsh 2005-10-03 09:42:27 EDT
I will cloase this bug since, NetworkManager should handle this functionality
now and most users are using targeted policy anyways.

Note You need to log in before you can comment on or make changes to this bug.