policycoreutils: audit2allow gives bad policy for role violations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

        This has been reported against the Debian BTS.
=========== ROLES ===============
role system_r types ssh_exec_t;

        The above policy is given as the output of audit2allow for the
 below kernel message:

type=SELINUX_ERR msg=audit(1220928625.787:79): security_compute_sid:
invalid context unconfined_u:system_r:user_t:s0-s0:c0.c1023 for
scontext=unconfined_u:system_r:inetd_t:s0-s0:c0.c1023
tcontext=system_u:object_r:ssh_exec_t:s0 tclass=process

        One possibility is to have the following, although it might be
 best to just flag the error and let the sys-admin decide on their own
 way of solving it (there are several possibilities that are equally
 valid): 

        role_transition system_r ssh_exec_t user_r;

        manoj

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498320
-- 
Manoj Srivastava <srivasta@xxxxxxx> <http://www.golden-gryphon.com/>  
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux