-
Bug
-
Resolution: Unresolved
-
Normal
-
rhel-10.0.beta
-
selinux-policy-40.13.12-1.el10
-
No
-
Moderate
-
1
-
rhel-sst-security-selinux
-
ssg_security
-
11
-
1
-
QE ack
-
False
-
-
No
-
SELINUX 241016 - 241106
-
-
Pass
-
Automated
-
Unspecified Release Note Type - Unknown
-
-
x86_64
-
None
What were you trying to do that didn't work?
Found during the review of Tier2 test results.
What is the impact of this issue to you?
SELinux denials are the only problem visible to me
Please provide the package NVR for which the bug is seen:
lldpd-1.0.18-2.el10.x86_64
selinux-policy-40.13.9-1.el10.noarch
selinux-policy-targeted-40.13.9-1.el10.noarch
systemd-container-256-14.el10.x86_64
How reproducible is this bug?:
always
Steps to reproduce
- get a CentOS-stream-10 machine (targeted policy is active)
- start the systemd-machined service
- start the lldpd service
- search for SELinux denials
Expected results
- no SELinux denials
Actual results
---- type=PROCTITLE msg=audit(10/07/2024 07:49:24.188:343) : proctitle=/usr/sbin/lldpd type=PATH msg=audit(10/07/2024 07:49:24.188:343) : item=0 name=/run/systemd/userdb/io.systemd.Machine inode=1657 dev=00:1a mode=socket,666 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:systemd_userdbd_runtime_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(10/07/2024 07:49:24.188:343) : cwd=/ type=SOCKADDR msg=audit(10/07/2024 07:49:24.188:343) : saddr={ saddr_fam=local path=/run/systemd/userdb/io.systemd.Machine } type=SYSCALL msg=audit(10/07/2024 07:49:24.188:343) : arch=x86_64 syscall=connect success=no exit=EACCES(Permission denied) a0=0x8 a1=0x7ffc6b195350 a2=0x29 a3=0x555d4c223010 items=1 ppid=1 pid=4850 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=lldpd exe=/usr/sbin/lldpd subj=system_u:system_r:lldpad_t:s0 key=(null) type=AVC msg=audit(10/07/2024 07:49:24.188:343) : avc: denied { connectto } for pid=4850 comm=lldpd path=/run/systemd/userdb/io.systemd.Machine scontext=system_u:system_r:lldpad_t:s0 tcontext=system_u:system_r:systemd_machined_t:s0 tclass=unix_stream_socket permissive=0 ----
- links to
-
RHBA-2024:140162 selinux-policy bug fix and enhancement update
- mentioned on
(1 mentioned on)