Bug 1444990
| Summary: | SELinux is preventing /usr/bin/python2.7 from 'execute' accesses on the file /usr/bin/hostname. | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Matěj Cepl <mcepl> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED NOTABUG | QA Contact: | Milos Malik <mmalik> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.4 | CC: | khowell, lvrabec, mcepl, mgrepl, mmalik, plautrba, pvrabec, ssekidde |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | abrt_hash:16b4c96c04a8ebbf61556d3a2ae8cf0e590fbaa5e8748a14c9a4e2b49aed502d | ||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-06-28 17:42:57 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
Unfortunately, this causes inconsistencies in the facts reported by subscription-manager and its daemon (rhsmcertd). The easiest solution to bug 1447722 without regressing on bug 1401394 is to get this bug resolved, though we are open to suggestions for alternative solutions. I believe this bug is a duplicate of BZ#1445494. This was resolved by a different implementation in bug 1445494, so closing as NOTABUG, since the new implementation does not have this problem. |
Description of problem: SELinux is preventing /usr/bin/python2.7 from 'execute' accesses on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python2.7 should be allowed execute access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'rhsmcertd-worke' --raw | audit2allow -M my-rhsmcertdworke # semodule -i my-rhsmcertdworke.pp Additional Information: Source Context system_u:system_r:rhsmcertd_t:s0 Target Context system_u:object_r:hostname_exec_t:s0 Target Objects /usr/bin/hostname [ file ] Source rhsmcertd-worke Source Path /usr/bin/python2.7 Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages hostname-3.13-3.el7.x86_64 Policy RPM selinux-policy-3.13.1-144.el7.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.10.0-655.el7.x86_64 #1 SMP Wed Apr 19 00:03:43 EDT 2017 x86_64 x86_64 Alert Count 114 First Seen 2017-04-18 19:41:35 CEST Last Seen 2017-04-24 18:59:35 CEST Local ID d2a6abd4-21e5-4804-8dc8-a28cf2e75953 Raw Audit Messages type=AVC msg=audit(1493053175.973:17194): avc: denied { execute } for pid=5465 comm="rhsmcertd-worke" name="hostname" dev="dm-0" ino=272802 scontext=system_u:system_r:rhsmcertd_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file Hash: rhsmcertd-worke,rhsmcertd_t,hostname_exec_t,file,execute Version-Release number of selected component: selinux-policy-3.13.1-144.el7.noarch Additional info: reporter: libreport-2.1.11.1 hashmarkername: setroubleshoot kernel: 3.10.0-655.el7.x86_64 reproducible: Not sure how to reproduce the problem type: libreport