Description of problem: Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. Define my connection Wireles (DHCP) throught tools RT2500 Wireless RutiiT 2. On the list I check my connection SSID example <Test> 3. Click on <Connect> 4. Select my Profile <Test> 5. Then I click on connect Again => the msg from selinux (see attached file) appears Actual results: Expected results: Additional info:
Created attachment 297315 [details] setroubleshoot file
This is a leaked file descriptor from RT2500 Wireless RutiiT. All open file descrioptors should be closed on exec before executing the confined application. SELinux will just close the open file descriptors and the app should run properly. You should report this as a bug to the RT2500 Wireless RutiiT. They should call fcntl(fd, F_SETFD, FD_CLOEXEC) on their open descriptors. If you want to just get rid of the AVC you can use audit2allow to write a policy module to allow the access. # grep dhcp /var/log/audit/audit.log | audit2allow -M mydhcp # semodule -i mydhcp.pp Closing wontfix since this is not our bug.