Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: grave
Justification: renders package unusable
Control: -1 = certbot
Dear Maintainer,
I have tried to run Apache server with Let's Encrypt security
certificates. I enabled SELinux in Enforcing mode.
I've installed certbot with dep
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: grave
Justification: renders package unusable
Dear Maintainer,
I am trying to use reportbug on a selinux-enabled system in enforcing mode.
It fails due to this AVC denial in the audit.log:
***
type=AVC msg=audit(1592825897.099:84
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: important
Dear Maintainer,
I 've configured my server as LAMP server for wordpress hosting.
I installed ex versions of packages:
***
root@vps:~# dpkg -l | grep "apache\|mysql\|mariadb\|php\|wordpress"
ii apache2
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Followup-For: Bug #879037
Hi,
I have the same issue, but I could provide audit.log.
When I am trying to Tab-Tab after (for example) 'systemctl status a'
I've got next messages in audit.log
***
type=USER_AVC msg=audit(1592171060.677:242):
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: important
Dear Maintainer,
Problem describtion:
I set up automounting with sshfs. My selinux is in Enforcing mode.
When triggering the automount, it fails and a SELinux Security alert shows up:
***audit.log***
type=AVC msg=audit
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Followup-For: Bug #888967
I would like to add more information.
After apply workaround:
$ echo '(allow semanage_t semanage_tmp_t (file (getattr open read execute
ioctl)))' > semanage_mmap_tmp.cil
$ sudo semodule -i semanage_mmap_tmp.cil
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Followup-For: Bug #962223
I've found release, where policy has fixed: 2.20180701
here it is the commit
https://github.com/SELinuxProject/refpolicy/commit/3ab07a0e1ee01ee62a6102acdd3957e6894bf795
-- System Information:
Debian Release: 9.1
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: important
Description of problem:
SELinux is preventing chronyd from sendto access on the chronyc's
unix_dgram_socket.
Chronyc cli is working slower in the Enforcing Selinux mode.
When you start chronyc cli it creates the socket
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Followup-For: Bug #871704
Some additional information.
I've made some investigation.
I could say, not all of service which has their name in it - failed to get
status.
***
root@vps:/tmp# for i in `ls /etc/init.d/ ` ; do ls -Z /etc/init.d/
Package: selinux-policy-default
Version: 2:2.20161023.1-9
Severity: normal
Dear Maintainer,
OpenVPN allows one to use socket files for the management interface instead of
TCP ports. This is important in servers where non-admin users are also allowed
to SSH in, because limits their access to the
10 matches
Mail list logo