Bug 1469167

Summary: RFE: create a plugin which analyzes execmem denials
Product: Red Hat Enterprise Linux 7 Reporter: Milos Malik <mmalik>
Component: setroubleshoot-pluginsAssignee: Vit Mojzis <vmojzis>
Status: CLOSED WONTFIX QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: low    
Version: 7.4CC: lvrabec, mgrepl, mmalik, mthacker, plautrba, zpytela
Target Milestone: rcKeywords: FutureFeature
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1649842 (view as bug list) Environment:
Last Closed: 2019-02-27 13:59:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Milos Malik 2017-07-10 14:44:49 UTC
Description of problem:
* there are setroubleshoot plugins which are able to analyze execheap, execmod and execstack AVCs, but there is no plugin which would be able to correctly analyze execmem AVCs and which would provide a relevant advice
* selinux-policy brings several booleans related to execmem AVCs

Version-Release number of selected component (if applicable):
setroubleshoot-server-3.2.28-3.el7.x86_64
setroubleshoot-3.2.28-3.el7.x86_64
setroubleshoot-plugins-3.0.65-1.el7.noarch

How reproducible:
* always

Actual results:
* allow_execmem plugin does not exist

Expected results:
* allow_execmem plugin exists

Additional info:
# getsebool -a | grep execmem
boinc_execmem --> off
cluster_use_execmem --> off
cups_execmem --> off
deny_execmem --> off
glance_use_execmem --> off
httpd_execmem --> on
virt_use_execmem --> on
xserver_execmem --> off
#

Comment 2 Milos Malik 2017-07-10 14:57:28 UTC
Filed with upstream as https://github.com/fedora-selinux/setroubleshoot/issues/55

Comment 3 Zdenek Pytela 2019-02-27 13:59:23 UTC
This issue was not selected to be included in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small number of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available.

We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable.