FEDORA-2018-6c6faa135b

bugfix update in Fedora 27 for selinux-policy

Status: obsolete

Comments 9

This update has been submitted for testing by lvrabec.

This update has been pushed to testing.

no regressions noted

karma: +1

Even after this update,

#1598995: -1

(sent too soon)

Even after this update I get just black screen. Have to switch to permissive mode and restart xserver. After logging in, setroubleshoot tells me that this happened yet another time. I try really hard to keep selinux in enforcing mode, but it's already 4 months I have to switch to permissive after every single boot. This should not take that long to fix

#1598995: -1

Still doesn't fix the problem, sddm fails to start when using nvidia drivers. SElinux exception is needed to get a working desktop system.

karma: -1 critpath: -1 #1598995: -1

Bodhi is disabling automatic push to stable due to negative karma. The maintainer may push manually if they determine that the issue is not severe.

works for me in a VM

karma: +1

Please don't leave overall negative feedback ('Is the update generally functional?") for an update only because it does not fix your bug; it prevents others receiving the fix for their bug. Please only leave overall negative karma if the update is actually worse than the previous build. Now this update is stuck in negative karma we will never be able to push it stable, and the other five fixes it contains will never go out.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
obsolete
Test Gating
Submitted by
Update Type
bugfix
Update Severity
high
Karma
+1
stable threshold: 3
unstable threshold: -2
Autopush (karma)
Disabled
Autopush (time)
Disabled
Dates
submitted 10 months ago
in testing 10 months ago

Related Bugs 6

00 #1513704 nssdb auth doesn't work with selinux enforcing due to map permissions denials
00 #1547139 Spurious SELinux alerts: SELinux is preventing acpid from 'open' accesses on the chr_file /dev/input/event26.
-20 #1598995 SELinux is preventing sddm-greeter from 'map' accesses on the chr_file /dev/nvidiactl.
00 #1601169 selinux-policy forbid gnome-session-c access map on chr_file /dev/nvidiactl, which in return prevent GDM to show
00 #1628764 SELinux is preventing bluetoothd from read, write access on the file settings.
00 #1643790 SELinux is preventing lighttpd from 'map' accesses on the file /etc/lighttpd/conf.d/dirlisting.conf.

Automated Test Results