RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 877026 (nopolicy) - Blocker for domains without SELinux Policy
Summary: Blocker for domains without SELinux Policy
Keywords:
Status: CLOSED WONTFIX
Alias: nopolicy
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: selinux-policy
Version: 7.0
Hardware: Unspecified
OS: Linux
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Lukas Vrabec
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
: 848829 (view as bug list)
Depends On: 1113161 1114490 1118803
Blocks: 828606 848833 853337 876921 876924 882191 891913 907971 953602 979084 994547 1002936 1014226 1018221 1026216 1028598 1028607 1028634 1028658 1028659 1030071 1030075 1030260 1030277 1030489 1032914 1036688 1037459 1037475 1037484 1037529 1037539 1038187 1039879 1040654 1047888 1053447 1060015 1061797 1061800 1062630 1063714 1064277 1072493 1072997 1077821 1077831 1083031 1083162 1083171 1083222 1086818 1100808 1100815 1107644 1241415 1241446 1241451 1241453 1241456 1241513 1393066
TreeView+ depends on / blocked
 
Reported: 2012-11-15 14:59 UTC by Daniel Walsh
Modified: 2017-10-12 12:18 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-10-12 12:18:13 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Daniel Walsh 2012-11-15 14:59:40 UTC
Any processes that run as initrc_t should block this bug.

Comment 1 Daniel Walsh 2012-11-15 15:13:14 UTC
*** Bug 848829 has been marked as a duplicate of this bug. ***

Comment 3 RHEL Program Management 2014-03-22 07:04:29 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.

Comment 7 Lukas Vrabec 2017-10-12 12:18:13 UTC
We're going to close this bug as WONTFIX because

 * of limited capacity of selinux-policy developers
 * the bug is related to EPEL component or 3rd party SW only
 * the bug appears in unsupported configuration 

We believe this bug can be fixed via a local policy module.
For more information please see: 

 * https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/sect-security-enhanced_linux-troubleshooting-fixing_problems#sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow

If you disagree, please re-open the bug.


Note You need to log in before you can comment on or make changes to this bug.