Bug 1130086
Summary: | Daemon qpidd denial to read /etc/passwd | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Lukas Zapletal <lzap> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.0 | CC: | jhutar, lvrabec, mgrepl, mmalik, mmccune |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.13.1-2.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-03-05 10:42:37 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1131424 |
Description
Lukas Zapletal
2014-08-14 10:03:35 UTC
Actual results in permissive mode: ---- time->Thu Aug 14 16:39:10 2014 type=PATH msg=audit(1408027150.351:628): item=0 name="/etc/passwd" inode=9773183 dev=fd:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:passwd_file_t:s0 objtype=NORMAL type=CWD msg=audit(1408027150.351:628): cwd="/" type=SYSCALL msg=audit(1408027150.351:628): arch=c000003e syscall=4 success=yes exit=0 a0=7f41096189b6 a1=7fffc54f3c70 a2=7fffc54f3c70 a3=7fffc54f5b10 items=1 ppid=1 pid=15694 auid=4294967295 uid=972 gid=968 euid=972 suid=972 fsuid=972 egid=968 sgid=968 fsgid=968 tty=(none) ses=4294967295 comm="qpidd" exe="/usr/sbin/qpidd" subj=system_u:system_r:qpidd_t:s0 key=(null) type=AVC msg=audit(1408027150.351:628): avc: denied { getattr } for pid=15694 comm="qpidd" path="/etc/passwd" dev="vda3" ino=9773183 scontext=system_u:system_r:qpidd_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file ---- time->Thu Aug 14 16:39:10 2014 type=PATH msg=audit(1408027150.351:629): item=0 name="/etc/passwd" inode=9773183 dev=fd:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:passwd_file_t:s0 objtype=NORMAL type=CWD msg=audit(1408027150.351:629): cwd="/" type=SYSCALL msg=audit(1408027150.351:629): arch=c000003e syscall=2 success=yes exit=10 a0=7f41096189b6 a1=0 a2=1b6 a3=0 items=1 ppid=1 pid=15694 auid=4294967295 uid=972 gid=968 euid=972 suid=972 fsuid=972 egid=968 sgid=968 fsgid=968 tty=(none) ses=4294967295 comm="qpidd" exe="/usr/sbin/qpidd" subj=system_u:system_r:qpidd_t:s0 key=(null) type=AVC msg=audit(1408027150.351:629): avc: denied { open } for pid=15694 comm="qpidd" path="/etc/passwd" dev="vda3" ino=9773183 scontext=system_u:system_r:qpidd_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file type=AVC msg=audit(1408027150.351:629): avc: denied { read } for pid=15694 comm="qpidd" name="passwd" dev="vda3" ino=9773183 scontext=system_u:system_r:qpidd_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file ---- commit 606f6e07b0cdf6765626f99019fe634da7171299 Author: Lukas Vrabec <lvrabec> Date: Fri Aug 15 13:19:12 2014 +0200 Allow qpid to read passwd files BZ (#1130086) This will be back ported to RHEL7. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-0458.html |