To resolve this issue, update the selinux-policy and selinux-policy-targeted packages from the Linux vendor. Update these two packages to the latest version available for your Linux release. If the issue persists, then consider the following workaround.
Note: The issue has been corrected in the following Linux releases and their respective selinux-* packages:
RHEL 7.7 (beta)
- selinux-policy-targeted-3.13.1-246.el7.noarch
- selinux-policy-3.13.1-246.el7.noarch
RHEL 8.1 (beta)
- selinux-policy-targeted-3.14.3-9.el8.noarch
- selinux-policy-3.14.3-9.el8.noarch
Fedora30
- selinux-policy-3.14.3-42.fc30.noarch
- selinux-policy-targeted-3.14.3-42.fc30.noarch
Workaround:
To work around this issue, create an exemption for the vmtools/NetworkManager denied access by using the
audit2allow command to generate a local loadable SELinux policy module.
Note: The following commands require
root priviledges to be executed.
- Run this command
grep denied /var/log/audit/audit.log | grep vmtools | tail -1 | \ audit2allow -a -M fix-vmtools-NetworkMgr.
This should generate two files:
fix-vmtools-NetworkMgr.te - type enforcement file
fix-vmtools-NetworkMgr.pp - packaged policy module
The fix-vmtools-NetworkMgr.te contents should be similar to:
module fix-vmtools-NetworkMgr 1.0;
require {
type vmtools_unconfined_t;
type NetworkManager_t;
class dbus send_msg;
}
#============= NetworkManager_t ==============
allow NetworkManager_t vmtools_unconfined_t:dbus send_msg;
- Now install the policy module by running this command:
semodule -i fix-vmtools-NetworkMgr.pp
- To remove this local policy module, run this command:
semodule -r fix-vmtools-NetworkMgr