$ sealert -l 3e0f34bc-787a-4288-bde3-8bca65306491
SELinux is preventing /sbin/ifconfig from read access on the file /var/run/vmware-active-nics.
***** Plugin restorecon (99.5 confidence) suggests *************************
If you want to fix the label.
/var/run/vmware-active-nics default label should be vmware_host_pid_t.
Then you can run restorecon.
Do
# /sbin/restorecon -v /var/run/vmware-active-nics
***** Plugin catchall (1.49 confidence) suggests ***************************
If you believe that ifconfig should be allowed read access on the vmware-active-nics file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep /sbin/ifconfig /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
setroubleshoot: SELinux is preventing /sbin/ifconfig from read access on the file /var/run/vmware-active-nics
SELinux is preventing /sbin/ifconfig "search" access for ddclient
per https://bugzilla.redhat.com/show_bug.cgi?id=657947
sudo semanage permissive -a ddclient_t
Subscribe to:
Posts (Atom)