Permissions for insights-client added to the SELinux policy
Cause:
The insights-client service requires permissions which were not in the previous selinux-policy versions.
Consequence:
As a consequence, some components of insights-client did not work correctly and reported access vector cache (AVC) error messages.
Fix:
This update adds new permissions to the SELinux policy.
Result:
As a result, insights-client runs correctly without reporting AVC errors.
Resolves:
2190178
2207894
2214581
2224737
Description of problem:
SELinux is preventing /usr/bin/python3.9 from 'unlink' accesses on the file /insights-redhatWS.local-20230721232748.tar.gz.
***** Plugin restorecon (99.5 confidence) suggests ************************
If you want to fix the label.
/insights-redhatWS.local-20230721232748.tar.gz default label should be etc_runtime_t.
Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.
Do
# /sbin/restorecon -v /insights-redhatWS.local-20230721232748.tar.gz
***** Plugin catchall (1.49 confidence) suggests **************************
If you believe that python3.9 should be allowed unlink access on the insights-redhatWS.local-20230721232748.tar.gz file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'platform-python' --raw | audit2allow -M my-platformpython
# semodule -X 300 -i my-platformpython.pp
Additional Information:
Source Context system_u:system_r:insights_client_t:s0
Target Context unconfined_u:object_r:user_tmp_t:s0
Target Objects /insights-redhatWS.local-20230721232748.tar.gz [
file ]
Source platform-python
Source Path /usr/bin/python3.9
Port <Unknown>
Host (removed)
Source RPM Packages python3-3.9.16-1.el9_2.1.x86_64
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-38.1.11-2.el9_2.3.noarch
Local Policy RPM selinux-policy-targeted-38.1.11-2.el9_2.3.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 5.14.0-284.18.1.el9_2.x86_64 #1
SMP PREEMPT_DYNAMIC Wed May 31 10:39:18 EDT 2023
x86_64 x86_64
Alert Count 1
First Seen 2023-07-22 10:05:15 CDT
Last Seen 2023-07-22 10:05:15 CDT
Local ID fcb63b67-1ea1-4c81-8c9a-b124f5712e3c
Raw Audit Messages
type=AVC msg=audit(1690038315.47:95883): avc: denied { unlink } for pid=128561 comm="platform-python" name="insights-redhatWS.local-20230721232748.tar.gz" dev="nvme0n1p3" ino=538517710 scontext=system_u:system_r:insights_client_t:s0 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=1
type=SYSCALL msg=audit(1690038315.47:95883): arch=x86_64 syscall=unlinkat success=yes exit=0 a0=4 a1=7f237dfdec30 a2=0 a3=7f238dc2fb20 items=2 ppid=127570 pid=128561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=platform-python exe=/usr/bin/python3.9 subj=system_u:system_r:insights_client_t:s0 key=(null)
type=CWD msg=audit(1690038315.47:95883): cwd=/
type=PATH msg=audit(1690038315.47:95883): item=0 name=/ inode=538517751 dev=103:03 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
type=PATH msg=audit(1690038315.47:95883): item=1 name=insights-redhatWS.local-20230721232748.tar.gz inode=538517710 dev=103:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=DELETE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Hash: platform-python,insights_client_t,user_tmp_t,file,unlink
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1.
2.
3.
Actual results:
Expected results:
Additional info:
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory (selinux-policy bug fix and enhancement update), and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHBA-2023:6617
Description of problem: SELinux is preventing /usr/bin/python3.9 from 'unlink' accesses on the file /insights-redhatWS.local-20230721232748.tar.gz. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /insights-redhatWS.local-20230721232748.tar.gz default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /insights-redhatWS.local-20230721232748.tar.gz ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that python3.9 should be allowed unlink access on the insights-redhatWS.local-20230721232748.tar.gz file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'platform-python' --raw | audit2allow -M my-platformpython # semodule -X 300 -i my-platformpython.pp Additional Information: Source Context system_u:system_r:insights_client_t:s0 Target Context unconfined_u:object_r:user_tmp_t:s0 Target Objects /insights-redhatWS.local-20230721232748.tar.gz [ file ] Source platform-python Source Path /usr/bin/python3.9 Port <Unknown> Host (removed) Source RPM Packages python3-3.9.16-1.el9_2.1.x86_64 Target RPM Packages SELinux Policy RPM selinux-policy-targeted-38.1.11-2.el9_2.3.noarch Local Policy RPM selinux-policy-targeted-38.1.11-2.el9_2.3.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.14.0-284.18.1.el9_2.x86_64 #1 SMP PREEMPT_DYNAMIC Wed May 31 10:39:18 EDT 2023 x86_64 x86_64 Alert Count 1 First Seen 2023-07-22 10:05:15 CDT Last Seen 2023-07-22 10:05:15 CDT Local ID fcb63b67-1ea1-4c81-8c9a-b124f5712e3c Raw Audit Messages type=AVC msg=audit(1690038315.47:95883): avc: denied { unlink } for pid=128561 comm="platform-python" name="insights-redhatWS.local-20230721232748.tar.gz" dev="nvme0n1p3" ino=538517710 scontext=system_u:system_r:insights_client_t:s0 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=1 type=SYSCALL msg=audit(1690038315.47:95883): arch=x86_64 syscall=unlinkat success=yes exit=0 a0=4 a1=7f237dfdec30 a2=0 a3=7f238dc2fb20 items=2 ppid=127570 pid=128561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=platform-python exe=/usr/bin/python3.9 subj=system_u:system_r:insights_client_t:s0 key=(null) type=CWD msg=audit(1690038315.47:95883): cwd=/ type=PATH msg=audit(1690038315.47:95883): item=0 name=/ inode=538517751 dev=103:03 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 type=PATH msg=audit(1690038315.47:95883): item=1 name=insights-redhatWS.local-20230721232748.tar.gz inode=538517710 dev=103:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=DELETE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Hash: platform-python,insights_client_t,user_tmp_t,file,unlink Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: