SELinux is preventing "/usr/libexec/rhsmcertd-worker (rhsmcertd_t)" from using the signull access on a process
Issue
- SELinux is preventing
rhsmcertd-worker
from using thesignull
access on a process.
Additional Information:
Source Context system_u:system_r:rhsmcertd_t:s0
Target Context system_u:system_r:kernel_t:s0
Target Objects Unknown [ process ]
Source rhsmcertd-worker
Source Path rhsmcertd-worker
Port <Unknown>
Host test.redhat.com
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.13.1-102.el7_3.7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name test.redhat.com
Platform Linux test.redhat.com
3.10.0-514.2.2.el7.x86_64 #1 SMP Wed Nov 16
13:15:13 EST 2016 x86_64 x86_64
Alert Count 1
First Seen 2017-02-03 19:31:35 CET
Last Seen 2017-02-03 19:31:35 CET
Local ID 18fa7bfa-0a23-4325-96eb-05d7dafd8e07
Raw Audit Messages
type=AVC msg=audit(1486146695.424:959971): avc: denied { signull } for pid=23231 comm="rhsmcertd-worker" scontext=system_u:system_r:rhsmcertd_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process
Hash: rhsmcertd-worker,rhsmcertd_t,kernel_t,process,signull
Environment
Red Hat Enterprise Linux 7.3
selinux-policy-3.13.1-102.el7_3.7.noarch
selinux-policy-targeted-3.13.1-102.el7_3.7.noarch
subscription-manager-1.17.15-1.el7.x86_64
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.