-
Bug
-
Resolution: Duplicate
-
Normal
-
rhel-10.0.beta
-
None
-
Moderate
-
1
-
rhel-sst-security-selinux
-
ssg_security
-
11
-
1
-
QE ack
-
False
-
-
No
-
Red Hat Enterprise Linux
-
SELINUX 241016 - 241106
-
-
None
-
Automated
-
Bug Fix
-
-
Proposed
-
None
What were you trying to do that didn't work?
Users mapped to sysadm_u cannot execute `sudo tcpdump` command because `tcpdump` executes in `sysadm_sudo_t` context due to missing rule to transition.
Please provide the package NVR for which bug is seen:
selinux-policy-40.13.9-1.el10.noarch
selinux-policy-devel-40.13.9-1.el10.noarch
selinux-policy-targeted-40.13.9-1.el10.noarch
tcpdump-4.99.4-9.el10.x86_64
How reproducible:
Always
Steps to reproduce
- Execute `sudo tcpdump` from a confined user mapped to `sysadm_u`
Expected results
- tcpdump produces an output
- no SELinux denials appear
Actual results
- tcpdump produces no output
- SELinux denials appear
- clones
-
RHEL-15432 Confined sysadm cannot execute "sudo tcpdump" command [rhel-9]
- Closed
- duplicates
-
RHEL-9947 Users mapped to sysadm_u cannot execute `sudo traceroute` command
- Closed
- links to