| Summary: | cockpit-session cannot change limits | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Zdenek Pytela <zpytela> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 7.3 | CC: | jlee, lvrabec, mgrepl, mmalik, orion, plautrba, pvrabec, rhowe, ssekidde, th.neuber |
| Target Milestone: | rc | Keywords: | Regression |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-08-01 15:17:42 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | |||
| Bug Blocks: | 1420851 | ||
|
Description
Zdenek Pytela
2016-12-07 08:59:34 UTC
Audit entries:
type=SERVICE_START msg=audit(1480694554.810:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=cockpit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
type=USER_AUTH msg=audit(1480694554.876:142): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:authentication grantors=pam_unix acct="username" exe="/usr/libexec/cockpit-session" hostname=192.168.22.1 addr=192.168.22.1 terminal=? res=success'
type=USER_ACCT msg=audit(1480694554.877:143): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="username" exe="/usr/libexec/cockpit-session" hostname=192.168.22.1 addr=192.168.22.1 terminal=? res=success'
type=CRED_ACQ msg=audit(1480694554.878:144): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:setcred grantors=pam_unix acct="username" exe="/usr/libexec/cockpit-session" hostname=192.168.22.1 addr=192.168.22.1 terminal=? res=success'
type=LOGIN msg=audit(1480694554.878:145): pid=2304 uid=0 subj=system_u:system_r:cockpit_session_t:s0 old-auid=4294967295 auid=1000 old-ses=4294967295 ses=4 res=1
type=USER_ROLE_CHANGE msg=audit(1480694554.954:146): pid=2304 uid=0 auid=1000 ses=4 subj=system_u:system_r:cockpit_session_t:s0 msg='pam: default-context=unconfined_u:unconfined_r:unconfined_t:s0 selected-context=unconfined_u:unconfined_r:unconfined_t:s0 exe="/usr/libexec/cockpit-session" hostname=192.168.22.1 addr=192.168.22.1 terminal=? res=success'
type=AVC msg=audit(1480694554.971:147): avc: denied { setrlimit } for pid=2304 comm="cockpit-session" scontext=system_u:system_r:cockpit_session_t:s0 tcontext=system_u:system_r:cockpit_session_t:s0 tclass=process
type=SYSCALL msg=audit(1480694554.971:147): arch=c000003e syscall=160 success=no exit=-13 a0=4 a1=7fff74105f30 a2=7f98435af768 a3=0 items=0 ppid=2300 pid=2304 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="cockpit-session" exe="/usr/libexec/cockpit-session" subj=system_u:system_r:cockpit_session_t:s0 key=(null)
type=USER_START msg=audit(1480694554.988:148): pid=2304 uid=0 auid=1000 ses=4 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:session_open grantors=? acct="username" exe="/usr/libexec/cockpit-session" hostname=192.168.22.1 addr=192.168.22.1 terminal=? res=failed'
type=SERVICE_STOP msg=audit(1480694644.846:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=cockpit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Looks like some changes were made in the policy:
rhel72# sesearch -s cockpit_session_t -t cockpit_session_t -c process -A
Found 4 semantic av rules:
allow cockpit_session_t cockpit_session_t : process { fork sigchld sigkill sigstop signull signal getsched setsched getsession getcap getattr setexec setrlimit setkeycreate } ;
allow login_pgm domain : process sigkill ;
allow cockpit_session_t cockpit_session_t : process setfscreate ;
allow cockpit_session_t cockpit_session_t : process setfscreate ;
rhel73# sesearch -s cockpit_session_t -t cockpit_session_t -c process -A
Found 4 semantic av rules:
allow login_pgm domain : process sigkill ;
allow cockpit_session_t cockpit_session_t : process { fork sigchld sigkill sigstop signull signal getsched setsched getcap setexec setkeycreate } ;
allow cockpit_session_t cockpit_session_t : process setfscreate ;
allow cockpit_session_t cockpit_session_t : process setfscreate ;
f22 and f25 looks the same like rhel73
Related to bug 1402495 *** Bug 1402495 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:1861 |