Bug 2228265

Summary: SELinux is preventing snapd from 'connectto' accesses on the unix_stream_socket /run/user/1000/snapd-session-agent.socket.
Product: [Fedora] Fedora Reporter: phillip.jahelka
Component: snapdAssignee: Zygmunt Krynicki <me>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 38CC: go-sig, maciek.borzecki, me, ngompa13, phillip.jahelka
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:85b684cc5a256768ecd5eb5541c6d8fb915e42a6f07279bc0d378703bf4ed28f;VARIANT_ID=kde;
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-05-28 13:39:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: description
none
File: os_info none

Description phillip.jahelka 2023-08-01 21:04:04 UTC
Description of problem:
Start the Slack Snap generated an SELinux report
SELinux is preventing snapd from 'connectto' accesses on the unix_stream_socket /run/user/1000/snapd-session-agent.socket.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that snapd should be allowed connectto access on the snapd-session-agent.socket unix_stream_socket by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'snapd' --raw | audit2allow -M my-snapd
# semodule -X 300 -i my-snapd.pp

Additional Information:
Source Context                system_u:system_r:snappy_t:s0
Target Context                unconfined_u:unconfined_r:unconfined_t:s0-
                              s0:c0.c1023
Target Objects                /run/user/1000/snapd-session-agent.socket [
                              unix_stream_socket ]
Source                        snapd
Source Path                   snapd
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-38.21-1.fc38.noarch
Local Policy RPM              snapd-selinux-2.58.3-1.fc38.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.4.6-200.fc38.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Mon Jul 24 20:51:12 UTC 2023
                              x86_64
Alert Count                   1
First Seen                    2023-08-01 14:02:22 PDT
Last Seen                     2023-08-01 14:02:22 PDT
Local ID                      d1ff1553-01a3-416b-b969-51c2ca53e489

Raw Audit Messages
type=AVC msg=audit(1690923742.687:318): avc:  denied  { connectto } for  pid=6307 comm="snapd" path="/run/user/1000/snapd-session-agent.socket" scontext=system_u:system_r:snappy_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1


Hash: snapd,snappy_t,unconfined_t,unix_stream_socket,connectto

Version-Release number of selected component:
selinux-policy-targeted-38.21-1.fc38.noarch

Additional info:
reporter:       libreport-2.17.11
reason:         SELinux is preventing snapd from 'connectto' accesses on the unix_stream_socket /run/user/1000/snapd-session-agent.socket.
package:        selinux-policy-targeted-38.21-1.fc38.noarch
component:      snapd
hashmarkername: setroubleshoot
type:           libreport
kernel:         6.4.6-200.fc38.x86_64
comment:        Start the Slack Snap generated an SELinux report
component:      snapd



Potential duplicate: bug 2104281

Comment 1 phillip.jahelka 2023-08-01 21:04:06 UTC
Created attachment 1981230 [details]
File: description

Comment 2 phillip.jahelka 2023-08-01 21:04:07 UTC
Created attachment 1981231 [details]
File: os_info

Comment 3 Criss 2023-10-06 18:11:05 UTC
The alert was generated when trying to open the video downloader application


reason:         SELinux is preventing snapd from 'connectto' accesses on the unix_stream_socket /run/user/1000/snapd-session-agent.socket.
package:        selinux-policy-targeted-38.28-1.fc38.noarch
hashmarkername: setroubleshoot
type:           libreport
kernel:         6.5.5-200.fc38.x86_64
comment:        The alert was generated when trying to open the video downloader application

Comment 4 Aoife Moloney 2024-05-28 13:39:28 UTC
Fedora Linux 38 entered end-of-life (EOL) status on 2024-05-21.

Fedora Linux 38 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.