Bug 1432115

Summary: AVCs caused by FreeIPA code change
Product: Red Hat Enterprise Linux 7 Reporter: Martin Bašti <mbasti>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: medium    
Version: 7.4CC: dominick.grift, dwalsh, extras-qa, lvrabec, mbasti, mgrepl, mmalik, plautrba, pmoore, pvrabec, rharwood, spoore, ssekidde
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.13.1-145.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1426646 Environment:
Last Closed: 2017-08-01 15:24:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
IdM sealert AVCs
none
IdM sealert AVCs 2
none
IdM sealert AVCs3 none

Comment 3 Scott Poore 2017-03-29 21:21:37 UTC
*** Bug 1434526 has been marked as a duplicate of this bug. ***

Comment 4 Martin Bašti 2017-04-11 10:34:38 UTC
I extracted a new set of AVC from our test suites, majority of AVCs is caused by dogtag component.

Comment 5 Martin Bašti 2017-04-11 10:35:42 UTC
Created attachment 1270740 [details]
IdM sealert AVCs

Comment 6 Lukas Vrabec 2017-04-12 10:37:21 UTC
Martin, 

It looks like you tested it with old version of selinux-policy rpm package. (-139.el7), please test it with -141.el7 release. 

Thanks.

Comment 7 Martin Bašti 2017-04-12 15:31:19 UTC
Created attachment 1271193 [details]
IdM sealert AVCs 2

Comment 8 Martin Bašti 2017-04-12 15:33:04 UTC
Hello,

re-tested with 
selinux-policy-3.13.1-141
ipa-server-4.5.0-5.el7.x86_64

please see attachment.

Martin

Comment 16 Martin Bašti 2017-04-20 10:49:23 UTC
New AVCs found by additional test run

Comment 17 Martin Bašti 2017-04-20 10:50:22 UTC
Created attachment 1272910 [details]
IdM sealert AVCs3

Comment 18 Martin Bašti 2017-04-20 10:51:49 UTC
Please also note following AVC that is not reproducible in permissive mode

type=AVC msg=audit(1491941544.278:552): avc:  denied  { dac_read_search } for  pid=6803 comm="gssproxy" capability=2  scontext=system_u:system_r:gssproxy_t:s0 tcontext=system_u:system_r:gssproxy_t:s0 tclass=capability

Comment 19 Martin Bašti 2017-04-20 10:52:20 UTC
*** Bug 1441376 has been marked as a duplicate of this bug. ***

Comment 21 Lukas Vrabec 2017-04-24 12:49:21 UTC
Fixed issue with /tmp/ca.p12 file.

Comment 25 Milos Malik 2017-06-22 13:29:53 UTC
Could you re-run your scenario after installing the latest selinux-policy packages (3.13.1-164.el7)? Do you still see SELinux denials?

Comment 26 Martin Bašti 2017-06-22 13:32:07 UTC
IMO fixes are tested by our QE, and AFAIK no critical AVCs were found.

Comment 28 errata-xmlrpc 2017-08-01 15:24:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:1861