Bug 1210421
Summary: | SELinux is preventing kadmind from unlink and write access on the file kadmin_0 | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Brian J. Murrell <brian> | |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> | |
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> | |
Severity: | high | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 6.6 | CC: | brian, dominick.grift, dwalsh, extras-qa, lvrabec, mgrepl, mkosek, mmalik, nalin, plautrba, pvoborni, pvrabec, robatino, sgallagh, ssekidde | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | x86_64 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | selinux-policy-3.7.19-266.el6 | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | ||
Clone Of: | 1161592 | |||
: | 1220763 (view as bug list) | Environment: | ||
Last Closed: | 2015-07-22 07:13:19 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: |
Description
Brian J. Murrell
2015-04-09 16:54:18 UTC
Brian, what is your reproducer on RHEL6? It happened to me because I switched a system from selinux disabled to selinux enforcing. But I did invoke an autorelabel between those two states. It seems like a bug that /var/tmp/kadmin_0 can be left around and not relabeled by an autolabel. matchpathcon /var/tmp/kadmin_0 /var/tmp/kadmin_0 <<none>> Looks like we have no label for this. I talked to pkis, who is a kerberos QE, and he told me that following file will most likely suffer from the same problem: # matchpathcon /var/tmp/kiprop_0 /var/tmp/kiprop_0 <<none>> # (In reply to Milos Malik from comment #5) > I talked to pkis, who is a kerberos QE, and he told me that following file > will most likely suffer from the same problem: > > # matchpathcon /var/tmp/kiprop_0 > /var/tmp/kiprop_0 <<none>> > # And should we use also kadmind_tmp_t labeling for it? It would be better to label the /var/tmp/kiprop_0 as krb5kdc_tmp_t, because: # sesearch -s kpropd_t -t tmp_t -T Found 2 semantic te rules: type_transition kpropd_t tmp_t : file krb5kdc_tmp_t; type_transition kpropd_t tmp_t : dir krb5kdc_tmp_t; # commit 2d83c73a710ba8fe59e62cdea02446b4c2071d1e Author: Miroslav Grepl <mgrepl> Date: Tue May 12 09:00:46 2015 +0200 Add labeling for /var/tmp/kadmin_0 and /var/tmp/kiprop_0. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-1375.html |