Bug 1772619

Summary: SELinux prevents confined users from running fwupdmgr
Product: Red Hat Enterprise Linux 8 Reporter: Milos Malik <mmalik>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: medium    
Version: 8.2CC: lvrabec, mmalik, plautrba, ssekidde, zpytela
Target Milestone: rc   
Target Release: 8.2   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-28 16:41:41 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1778780    

Description Milos Malik 2019-11-14 18:50:41 UTC
Description of problem:

Version-Release number of selected component (if applicable):
fwupd-1.1.4-1.el8.x86_64
selinux-policy-3.14.3-26.el8.noarch
selinux-policy-devel-3.14.3-26.el8.noarch
selinux-policy-targeted-3.14.3-26.el8.noarch

How reproducible:
 * always

Steps to Reproduce:
1. get a RHEL-8.1 machine (targeted policy is active)
2. log in as a confined user (user_u, staff_u, guest_u, xguest_u, sysadm_u)
3. run: fwupdmgr get-devices
4. search for SELinux denials

Actual results:
----
type=USER_AVC msg=audit(11/14/2019 13:40:25.030:491) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=GetAll dest=:1.43 spid=20336 tpid=20182 scontext=user_u:user_r:user_t:s0 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(11/14/2019 13:40:25.030:492) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.fwupd member=GetDevices dest=:1.43 spid=20336 tpid=20182 scontext=user_u:user_r:user_t:s0 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(11/14/2019 13:40:36.225:555) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=GetAll dest=:1.43 spid=20504 tpid=20182 scontext=guest_u:guest_r:guest_t:s0 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(11/14/2019 13:40:36.225:556) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.fwupd member=GetDevices dest=:1.43 spid=20504 tpid=20182 scontext=guest_u:guest_r:guest_t:s0 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(11/14/2019 13:40:59.147:675) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=GetAll dest=:1.43 spid=20830 tpid=20182 scontext=sysadm_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(11/14/2019 13:40:59.147:676) : pid=596 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.fwupd member=GetDevices dest=:1.43 spid=20830 tpid=20182 scontext=sysadm_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fwupd_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----

Expected results:
 * no SELinux denials

Comment 3 Lukas Vrabec 2019-12-10 16:52:17 UTC
commit 8226ed25a0a9770e7aaa7cbfe645576e80b836f5 (HEAD -> rhel8.2-base)
Author: Zdenek Pytela <zpytela>
Date:   Tue Dec 10 17:05:35 2019 +0100

    Allow confined users run fwupdmgr
    
    Allow confined users dbus_chat with fwupd_t domain
    so that fwupdmgr command can be run
    
    Resolves: rhbz#1772619

Comment 10 errata-xmlrpc 2020-04-28 16:41:41 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:1773