Hide Forgot
Description of problem: This is occurring on many RHEL 6 systems: SELinux has prevented ip from loading a kernel module. All confined programs that need to load kernel modules should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. Version-Release number of selected component (if applicable): iproute-2.6.32-16.el6.x86_64 kernel-2.6.32-131.4.1.el6.x86_64 selinux-policy-3.7.19-93.el6_1.2.noarch How reproducible: Often, several times per day Steps to Reproduce: 1. Try to connect to a VPN connection with NetworkManager 2. 3. Actual results: The connection fails Expected results: The connection should work Additional info: This happened only as a result of recent software updates in the past week. This should be marked a regression.
Created attachment 519924 [details] selinux alert message
Created attachment 519925 [details] yum recent log, one of these packages causes this issue
Yes this is a kernel userspace issue that we will be covering up in selinux-policy-3.7.19-107.el6 Nothing was actually blocked. If you want to try out the policy you can grab it from http://people.redhat.com/dwalsh/SELinux/RHEL6
What wonderful heroism, Dan. Thanks for saving the day.
Seems to be a duplicete of 726339? Can we close it?
go ahead