Bug 2215452
| Summary: | SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Thomas Neuber <th.neuber> | ||||||
| Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> | ||||||
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
| Severity: | unspecified | Docs Contact: | |||||||
| Priority: | medium | ||||||||
| Version: | 38 | CC: | dwalsh, lvrabec, mmalik, nknazeko, omosnacek, pkoncity, th.neuber, vmojzis, zpytela | ||||||
| Target Milestone: | --- | Keywords: | Triaged | ||||||
| Target Release: | --- | ||||||||
| Hardware: | x86_64 | ||||||||
| OS: | Unspecified | ||||||||
| Whiteboard: | abrt_hash:11ce27900a30160f8e873f79514c1dfd31f3014ebf43b6b56734ce9a399a3313;VARIANT_ID=workstation; | ||||||||
| Fixed In Version: | selinux-policy-38.20-1.fc38 | Doc Type: | If docs needed, set a value | ||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2023-07-01 01:45:55 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Attachments: |
|
||||||||
Created attachment 1971079 [details]
File: os_info
Created attachment 1971080 [details]
File: description
FEDORA-2023-ba070ee6ba has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-ba070ee6ba FEDORA-2023-ba070ee6ba has been pushed to the Fedora 38 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-ba070ee6ba` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-ba070ee6ba See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2023-ba070ee6ba has been pushed to the Fedora 38 stable repository. If problem still persists, please make note of it in this bug report. |
Description of problem: SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. ***** Plugin catchall (100. confidence) suggests ************************** Wenn Sie denken, dass es nfsidmap standardmäßig erlaubt sein sollte, write Zugriff auf io.systemd.DynamicUser sock_file zu erhalten. Then sie sollten dies als Fehler melden. Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen. Do zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen: # ausearch -c 'nfsidmap' --raw | audit2allow -M my-nfsidmap # semodule -X 300 -i my-nfsidmap.pp Additional Information: Source Context system_u:system_r:nfsidmap_t:s0 Target Context system_u:object_r:systemd_userdbd_runtime_t:s0 Target Objects io.systemd.DynamicUser [ sock_file ] Source nfsidmap Source Path nfsidmap Port <Unbekannt> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-38.15-1.fc38.noarch Local Policy RPM selinux-policy-targeted-38.15-1.fc38.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.3.7-200.fc38.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Jun 9 15:21:11 UTC 2023 x86_64 Alert Count 5684 First Seen 2023-06-01 07:00:30 CEST Last Seen 2023-06-16 06:01:04 CEST Local ID 2cb26400-3819-4f89-92e2-2c0282742e29 Raw Audit Messages type=AVC msg=audit(1686888064.174:4130): avc: denied { write } for pid=657672 comm="nfsidmap" name="io.systemd.DynamicUser" dev="tmpfs" ino=33 scontext=system_u:system_r:nfsidmap_t:s0 tcontext=system_u:object_r:systemd_userdbd_runtime_t:s0 tclass=sock_file permissive=0 Hash: nfsidmap,nfsidmap_t,systemd_userdbd_runtime_t,sock_file,write Version-Release number of selected component: selinux-policy-targeted-38.15-1.fc38.noarch Additional info: reporter: libreport-2.17.10 package: selinux-policy-targeted-38.15-1.fc38.noarch hashmarkername: setroubleshoot type: libreport reason: SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. component: selinux-policy kernel: 6.3.7-200.fc38.x86_64 component: selinux-policy