-
Bug
-
Resolution: Done-Errata
-
Normal
-
rhel-9.2.0
-
selinux-policy-38.1.30-1.el9
-
None
-
Moderate
-
rhel-sst-security-selinux
-
ssg_security
-
20
-
None
-
QE ack
-
False
-
-
Yes
-
Red Hat Enterprise Linux
-
None
-
-
Pass
-
Automated
-
Bug Fix
-
-
Done
-
None
What were you trying to do that didn't work?
Users mapped to sysadm_u cannot execute `sudo tcpdump` command because `tcpdump` executes in `sysadm_sudo_t` context due to missing rule to transition.
Please provide the package NVR for which bug is seen:
selinux-policy
How reproducible:
Always
Steps to reproduce
- Execute `sudo tcpdump` from a confined user mapped to `sysadm_u`
Expected results
Works
Actual results
Fails
- clones
-
RHEL-15398 Confined sysadm cannot execute "sudo tcpdump" command [rhel-8]
- Closed
- is cloned by
-
RHEL-57604 Confined sysadm cannot execute "sudo tcpdump" command [rhel-10]
- Closed
- links to
-
RHBA-2023:121166 selinux-policy bug fix and enhancement update