Fixed in selinux-policy-2.4.6-45.el5
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
Up to now, together with Petr Muller, we were not lucky reproducing/triggering this bug as described in the comment #0. Could you please let me know whether you are still experiencing the problem with the latest selinux-policy available at the link below? Thank you. http://porkchop.devel.redhat.com/brewroot/packages/selinux-policy/2.4.6/ 93.el5/noarch/ Checking rules related to the reported AVC message shows 1 newly added rule (the first one in the list below) that should fix the bug: .qa.[root@pipa02 tps]# sesearch --all -s bluetooth_t -t bluetooth_t --class capability --perms net_bind_service Found 3 av rules: allow bluetooth_t bluetooth_t : capability { net_bind_service net_admin net_raw ipc_lock sys_tty_config }; dontaudit bluetooth_t bluetooth_t : capability net_bind_service ; allow bluetooth_t bluetooth_t : capability net_bind_service ;
The latest policy is available here: http://porkchop.devel.redhat.com/brewroot/packages/selinux-policy/2.4.6/99.el5/ noarch/
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2007-0544.html