Bug 1829306

Summary: Setroubleshoot plugins search for a refer to invalid SELinux types
Product: Red Hat Enterprise Linux 8 Reporter: Vit Mojzis <vmojzis>
Component: setroubleshoot-pluginsAssignee: Vit Mojzis <vmojzis>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: unspecified Docs Contact:
Priority: medium    
Version: 8.3CC: lvrabec, mmalik, plautrba, vmojzis
Target Milestone: rcKeywords: Triaged
Target Release: 8.3Flags: pm-rhel: mirror+
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-04 03:35:50 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vit Mojzis 2020-04-29 11:19:27 UTC
Description of problem:
Setroubleshoot plugins are searching for non existent types which causes the plugins not to be applied where expected (insmod/depmod/update_modules, file_t, semange_read_lock_t). Some of the types are refered to in "problem decription" (e.g. dhclient_t).

Version-Release number of selected component (if applicable):
Setroubleshoot-plugins-3.3.11-2

How reproducible:
Cause an AVC with one of the following types:
kmod_exec_t, kmod_tmp_t, semanage_read_lock_t
For each of them there is a setroubleshoot plugin which should show suggestions, but doesn't.

Steps to Reproduce:
# cat avc
type=AVC msg=audit(1587399662.357:495): avc:  denied  { write } for  pid=33024 comm="runcon" dev="sda3" ino=6832090 scontext=system_u:system_r:audisp_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kmod_exec_t:s0 tclass=file permissive=0

# sealert -a avc

Actual results:
Only the catchall plugin lists it's suggestion.

Expected results:
SELinux is preventing runcon from write access on the file labeled kmod_exec_t.

*****  Plugin kernel_modules (91.4 confidence) suggests   ********************

If you do not think runcon should try write access on Unknown.
Then you may be under attack by a hacker, since confined applications should not need this access.
Do
contact your security administrator and report this issue.

Comment 14 errata-xmlrpc 2020-11-04 03:35:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (setroubleshoot-plugins bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:4753