-
Bug
-
Resolution: Unresolved
-
Normal
-
rhel-10.0.beta
-
selinux-policy-40.13.10-1.el10
-
No
-
Moderate
-
1
-
sst_security_selinux
-
ssg_security
-
12
-
1
-
QE ack
-
False
-
-
No
-
SELINUX 241016 - 241106
-
-
Pass
-
Automated
-
Unspecified Release Note Type - Unknown
-
-
All
-
None
What were you trying to do that didn't work?
https://beaker.engineering.redhat.com/recipes/16910623#task183302109
Please provide the package NVR for which bug is seen:
selinux-policy-40.13.9-1.el10.noarch
selinux-policy-devel-40.13.9-1.el10.noarch
selinux-policy-mls-40.13.9-1.el10.noarch
selinux-policy-targeted-40.13.9-1.el10.noarch
How reproducible:
always
Steps to reproduce
- get a RHEL-10 machine
- run the following automated test: /CoreOS/selinux-policy/Regression/dev-general
- look for failures in the output
Expected results
# matchpathcon /dev/papr-sysparm /dev/papr-sysparm system_u:object_r:papr_sysparm_device_t:s0 # matchpathcon /dev/papr-vpd /dev/papr-vpd system_u:object_r:papr_vpd_device_t:s0 #
Actual results
# matchpathcon /dev/papr-sysparm /dev/papr-sysparm system_u:object_r:device_t:s0 # matchpathcon /dev/papr-vpd /dev/papr-vpd system_u:object_r:device_t:s0 #
Additional information
The same issue is already fixed in RHEL-9.5.
- links to
-
RHBA-2024:140162 selinux-policy bug fix and enhancement update