Bug 669348 - A new SELinux policy is needed for /etc/security/namespace.init
Summary: A new SELinux policy is needed for /etc/security/namespace.init
Keywords:
Status: CLOSED DUPLICATE of bug 669439
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.1
Hardware: Unspecified
OS: Unspecified
low
medium
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-01-13 13:01 UTC by Miroslav Grepl
Modified: 2011-01-14 07:49 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-01-14 07:49:12 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Miroslav Grepl 2011-01-13 13:01:03 UTC
Description of problem:

When a normal user logs on for the first time with using polyinstantiation, files .bash* seem to be copied to the home dir which causes permission errors. 


Version-Release number of selected component (if applicable):

rpm -qa \*selinux\*
libselinux-devel-2.0.94-2.el6.x86_64
selinux-policy-targeted-3.7.19-63.el6.noarch
selinux-policy-doc-3.7.19-63.el6.noarch
libselinux-python-2.0.94-2.el6.x86_64
libselinux-utils-2.0.94-2.el6.x86_64
selinux-policy-minimum-3.7.19-63.el6.noarch
libselinux-2.0.94-2.el6.x86_64
selinux-policy-mls-3.7.19-63.el6.noarch
selinux-policy-3.7.19-63.el6.noarch


How reproducible:


Steps to Reproduce:
1. Setup MLS machine
2. Enable polyinstantiation in /etc/security/namespace.conf
3. Create a new user and try to log in
4. Try to setup it also for ssh, gdm
  
Actual results:

Does not work.

Expected results:

Should work with a new policy.

Additional info:

Comment 1 Daniel Walsh 2011-01-13 19:38:15 UTC
Backport changes from Rawhide.

Comment 2 Miroslav Grepl 2011-01-14 07:49:12 UTC

*** This bug has been marked as a duplicate of bug 669439 ***


Note You need to log in before you can comment on or make changes to this bug.