Bug 1976783
Summary: | AVC denials on new instance of 6.10 snap 6 | ||
---|---|---|---|
Product: | Red Hat Satellite | Reporter: | Stephen Wadeley <swadeley> |
Component: | Pulp | Assignee: | satellite6-bugs <satellite6-bugs> |
Status: | CLOSED ERRATA | QA Contact: | Stephen Wadeley <swadeley> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.10.0 | CC: | bmbouter, ggainey, lzap, mdepaulo, mikedep333, osousa, pcreech, rchan, ttereshc |
Target Milestone: | 6.10.0 | Keywords: | Triaged |
Target Release: | Unused | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | pulpcore-selinux-1.2.5 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-11-16 14:12:12 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Stephen Wadeley
2021-06-28 08:39:37 UTC
These are all pulp-related services, flipping over to the Pulp component as the team maintains the policy themselves. What would be useful is to turn it into permissive mode, install SELinux development tools and then: sepolgen-ifgen audit2allow -Ral To generate reverse rules to see them, thanks! (In reply to Lukas Zapletal from comment #1) > These are all pulp-related services, flipping over to the Pulp component as > the team maintains the policy themselves. > > What would be useful is to turn it into permissive mode, install SELinux > development tools and then: > > sepolgen-ifgen > audit2allow -Ral > > To generate reverse rules to see them, thanks! ~]# sepolgen-ifgen ~]# audit2allow -Ral require { type pulpcore_server_t; class unix_dgram_socket { connect create }; } #============= pulpcore_server_t ============== allow pulpcore_server_t self:unix_dgram_socket { connect create }; apache_search_config(pulpcore_server_t) kernel_dgram_send(pulpcore_server_t) Thank you Another bz related to SELinux is bug 1991030. My proposed fix is here (Thank you Lukas, but I made additions per below): After investigation, I determined that: 1. This is unrelated to the change in hostname. 2. This did not occur in pulp_installer because our service files do not have type=notify I created a PR so that it does: https://github.com/pulp/pulp_installer/pull/735 3. There is another denial, present on both my test system and on evgeni's Katello system [1]. 4. This creates a need for sendto and kernel_t in the auto-generated policy: require { type kernel_t; type pulpcore_server_t; class unix_dgram_socket { connect create sendto }; } My proposed fix is here: https://github.com/pulp/pulpcore-selinux/pull/37 [1] type=AVC msg=audit(1626392980.545:2751): avc: denied { sendto } for pid=31039 comm="gunicorn" path="/run/systemd/notify" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1 The Pulp upstream bug status is at ASSIGNED. Updating the external tracker on this bug. The Pulp upstream bug priority is at Normal. Updating the external tracker on this bug. Upstream released: https://github.com/pulp/pulpcore-selinux/releases/tag/1.2.5 Note that there was much discussion of the nature of the bug and how to properly fix it, and it was conducted on the upstream PR: https://github.com/pulp/pulpcore-selinux/pull/37 Note that pulp_installer will utilize Type=notify from now on: https://github.com/pulp/pulp_installer/pull/735 The Pulp upstream bug status is at MODIFIED. Updating the external tracker on this bug. The Pulp upstream bug status is at CLOSED - CURRENTRELEASE. Updating the external tracker on this bug. The Pulp upstream bug priority is at Normal. Updating the external tracker on this bug. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Satellite 6.10 Release), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:4702 |