Bug 2415883 - avc: denied { dyntransition } for pid=1197 comm="sshd-session" scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 [NEEDINFO]
Summary: avc: denied { dyntransition } for pid=1197 comm="sshd-session" scontext=sy...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 42
Hardware: x86_64
OS: Linux
high
medium
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-19 15:07 UTC by Michal Konecny
Modified: 2026-02-26 11:56 UTC (History)
17 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-02-26 11:56:54 UTC
Type: ---
Embargoed:
zpytela: needinfo? (michael.vogt)
fedora-admin-xmlrpc: mirror+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker FC-2677 0 None None None 2025-12-12 04:04:30 UTC

Description Michal Konecny 2025-11-19 15:07:12 UTC
After installing a new F42 machine I couldn't login to the machine using ssh and in /var/log/messages I found this:

type=AVC msg=audit(1763563281.628:454): avc:  denied  { dyntransition } for  pid=1197 comm="sshd-session" scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0


Reproducible: Always

Steps to Reproduce:
1.Install new F42 machine 
2.systemctl enable sshd
3.Try to login using ssh from another machine
Actual Results:
client_loop: send disconnect: Broken pipe


Expected Results:
Logged in

Additional Information:
openssh-server-9.9p1-11.fc42.x86_64

Comment 1 Simon de Vlieger 2025-11-19 15:09:54 UTC
We (osbuild/image-builder) started noticing the same in our CI where we are no longer able to log in to freshly built Fedora 42 systems over SSH with the same AVC denial.

Comment 2 Zdenek Pytela 2025-11-19 15:29:46 UTC
Hi,

Can you run the following commands?

rpm -qa "selinux-policy*"
getsebool unconfined_login
ls -lZa /usr/libexec/openssh/
restorecon -Rvn /usr/libexec/openssh/

This part is particularly suspicious:
comm="sshd-session" scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023

Comment 3 Zdenek Pytela 2025-11-19 15:33:23 UTC
(In reply to Simon de Vlieger from comment #1)
> We (osbuild/image-builder) started noticing the same in our CI where we are
> no longer able to log in to freshly built Fedora 42 systems over SSH with
> the same AVC denial.

As I haven't seen such denials during numerous tests, I expect it can be related to immutable mode. 
Changes made by selinux-policy-42.10-1 need to result in context changes on the filesystem.

Comment 4 Simon de Vlieger 2025-11-19 15:41:48 UTC
These AVC denials are seen on package based systems installed by an Anaconda boot.iso (not image mode/immutable). I'll see if I can get you the output.

Comment 5 Simon de Vlieger 2025-11-19 16:06:28 UTC
Ok, I installed a fresh VM from: https://fedora.mirror.liteserver.nl/linux/releases/42/Everything/x86_64/iso/Fedora-Everything-netinst-x86_64-42-1.1.iso which exhibits the behavior.

audit.log contains:
```
type=AVC msg=audit(1763568225.806:131): avc:  denied  { dyntransition } for  pid=922 comm="sshd-session" scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0
```

and for the commands you asked for:
```
[root@fedora ~]# rpm -qa "selinux-policy*"
selinux-policy-42.14-1.fc42.noarch
selinux-policy-targeted-42.14-1.fc42.noarch
[root@fedora ~]# getsebool unconfined_login
unconfined_login --> on
[root@fedora ~]# ls -lZa /usr/libexec/openssh/
total 1552
drwxr-xr-x. 1 root root system_u:object_r:bin_t:s0                 180 Nov 19 16:57 .
drwxr-xr-x. 1 root root system_u:object_r:bin_t:s0                1006 Nov 19 16:57 ..
-rwxr-xr-x. 1 root root system_u:object_r:bin_t:s0               82416 May 19  2025 sftp-server
-rwxr-xr-x. 1 root root system_u:object_r:sshd_keygen_exec_t:s0    904 May 19  2025 sshd-keygen
-rwxr-xr-x. 1 root root system_u:object_r:bin_t:s0              969512 May 19  2025 sshd-session
-rwxr--r--. 1 root root system_u:object_r:bin_t:s0                1714 May 19  2025 ssh-host-keys-migration.sh
-rwxr-xr-x. 1 root root system_u:object_r:ssh_agent_exec_t:s0   255248 May 19  2025 ssh-pkcs11-helper
-rwxr-xr-x. 1 root root system_u:object_r:bin_t:s0              263448 May 19  2025 ssh-sk-helper
[root@fedora ~]# restorecon -Rvn /usr/libexec/openssh/
Would relabel /usr/libexec/openssh/sshd-session from system_u:object_r:bin_t:s0 to system_u:object_r:sshd_session_exec_t:s0
```

Comment 6 Michal Konecny 2025-11-20 10:00:36 UTC
I can confirm that when trying `restorecon -Rv /usr/libexec/openssh/` I'm able to login to the machine using ssh.

I can also confirm that the output of the commands is the same as for Simon de Vlieger.

Comment 7 Kevin Fenzi 2025-11-21 17:38:17 UTC
I've seen this on a few f43 vm's we just installed. It seems like it might be some kind of race, as most of the time things are fine?

Comment 8 Michael Vogt 2025-11-24 08:52:04 UTC
Fwiw I also see it on f44, here is the log from one of our automatic tests:
https://gitlab.com/redhat/services/products/image-builder/ci/images/-/jobs/12182662239#L4430
```
[   20.697283] sshd-session[763]: fatal: sshd_selinux_copy_context: setcon failed with Permission denied
```
is there error.

Comment 9 Zdenek Pytela 2025-11-25 08:28:33 UTC
(In reply to Michael Vogt from comment #8)
> Fwiw I also see it on f44, here is the log from one of our automatic tests:
> https://gitlab.com/redhat/services/products/image-builder/ci/images/-/jobs/
> 12182662239#L4430
> ```
> [   20.697283] sshd-session[763]: fatal: sshd_selinux_copy_context: setcon
> failed with Permission denied
> ```
> is there error.

There are neither avc denials nor selinux_err ones, can you find them in another log?
Can you check labels of files in /usr/libexec/openssh?
New labels were assigned in selinux-policy-42.10-1 at Tue Sep 16 2025.

Comment 10 Zdenek Pytela 2026-02-26 11:56:54 UTC
As this bug has been in NEEDINFO state for an extended period of time, we are going to close this bug due to inactivity. If you want to pursue this matter further, feel free to reopen this bug and attach the needed information.


Note You need to log in before you can comment on or make changes to this bug.