Bug 1752843

Summary: SELinux interferes with various lp* commands executed by sysadm_u user
Product: Red Hat Enterprise Linux 8 Reporter: Milos Malik <mmalik>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: medium    
Version: 8.1CC: lvrabec, mmalik, nknazeko, plautrba, ssekidde, zpytela
Target Milestone: rcKeywords: AutoVerified, FutureFeature, Patch
Target Release: 8.2   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.14.3-22.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-28 16:41:06 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1778780    

Description Milos Malik 2019-09-17 11:28:45 UTC
Description of problem:

Version-Release number of selected component (if applicable):
cups-2.2.6-27.el8.x86_64
cups-client-2.2.6-27.el8.x86_64
cups-filesystem-2.2.6-27.el8.noarch
cups-filters-1.20.0-16.el8.x86_64
cups-filters-libs-1.20.0-16.el8.x86_64
cups-libs-2.2.6-27.el8.x86_64
selinux-policy-3.14.3-19.el8.noarch
selinux-policy-targeted-3.14.3-19.el8.noarch

How reproducible:
 * always

Steps to Reproduce:
1. get a RHEL-8.1 machine (targeted policy is active)
2. create a sysadm_u user and set its password
3. log in as the sysadm_u user
4. run following commands:
$ lpstat -selt
$ lpq -a -l
$ lpoptions -l
$ lpinfo -m -v

Actual results (enforcing mode):
----
type=USER_AVC msg=audit(09/17/2019 07:18:30.680:445) : pid=658 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Peer member=Ping dest=org.freedesktop.Avahi spid=6369 tpid=6300 scontext=sysadm_u:sysadm_r:lpr_t:s0-s0:c0.c1023 tcontext=system_u:system_r:avahi_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----

Expected results:
 * no SELinux denials

Additional information:
 * in order to see these SELinux denials, the avahi-daemon service needs to be running

Comment 1 Milos Malik 2019-09-17 11:32:16 UTC
Actual results (permissive mode):
----
type=USER_AVC msg=audit(09/17/2019 07:29:20.873:491) : pid=658 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Peer member=Ping dest=org.freedesktop.Avahi spid=6456 tpid=6300 scontext=sysadm_u:sysadm_r:lpr_t:s0-s0:c0.c1023 tcontext=system_u:system_r:avahi_t:s0 tclass=dbus permissive=1  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(09/17/2019 07:29:20.874:492) : pid=658 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_return dest=:1.77 spid=6300 tpid=6456 scontext=system_u:system_r:avahi_t:s0 tcontext=sysadm_u:sysadm_r:lpr_t:s0-s0:c0.c1023 tclass=dbus permissive=1  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----

Comment 3 Nikola Knazekova 2019-09-25 13:16:08 UTC
PR for Fedora: https://github.com/fedora-selinux/selinux-policy-contrib/pull/139

Comment 13 errata-xmlrpc 2020-04-28 16:41:06 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:1773