Description of problem:
This is occurring on many RHEL 6 systems:
SELinux has prevented ip from loading a kernel module. All confined programs
that need to load kernel modules should have already had policy written for
them. If a compromised application tries to modify the kernel this AVC will be
generated. This is a serious issue. Your system may very well be compromised.
Version-Release number of selected component (if applicable):
Often, several times per day
Steps to Reproduce:
1. Try to connect to a VPN connection with NetworkManager
The connection fails
The connection should work
This happened only as a result of recent software updates in the past week. This should be marked a regression.
Created attachment 519924 [details]
selinux alert message
Created attachment 519925 [details]
yum recent log, one of these packages causes this issue
Yes this is a kernel userspace issue that we will be covering up in
Nothing was actually blocked.
If you want to try out the policy you can grab it from
What wonderful heroism, Dan. Thanks for saving the day.
Seems to be a duplicete of 726339? Can we close it?