-
Bug
-
Resolution: Not a Bug
-
Undefined
-
None
-
rhel-10.0
-
No
-
None
-
rhel-sst-security-selinux
-
ssg_security
-
None
-
False
-
-
None
-
None
-
None
-
None
-
Unspecified
-
Unspecified
-
Unspecified
-
None
What were you trying to do that didn't work?
The following AVC denial was spotted in a freshly installed RHEL-10.0-20250304.2 system, as part of our test:
SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Memory protection checking: actual (secure) Max kernel policy version: 33 selinux-policy-40.13.26-1.el10.noarch ---- time->Wed Mar 5 09:06:26 2025 type=AVC msg=audit(1741183586.779:25): avc: denied { map } for pid=764 comm="rpcbind" path="/etc/ld.so.cache" dev="dm-0" ino=67240098 scontext=system_u:system_r:rpcbind_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
I believe this bug will be closed immediately as I unfortunately don't have more detailed information, which is understandable, but at least the issue can be tracked here.
What is the impact of this issue to you?
I didn't spot any tangible impact.
Please provide the package NVR for which the bug is seen:
selinux-policy-40.13.26-1.el10.noarch
How reproducible is this bug?:
unknown
Steps to reproduce
unknown
Expected results
No unexpected AVC denials.