Bug 2295425
| Summary: | bubblewrap sandbox not usable as a confined user | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Sam Morris <sam> |
| Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 40 | CC: | dwalsh, lvrabec, mmalik, omosnacek, pkoncity, vmojzis, zpytela |
| Target Milestone: | --- | Keywords: | Desktop, SELinux |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | selinux-policy-40.29-2.fc40 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2024-11-05 04:42:49 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
FEDORA-2024-aa24e6024f (selinux-policy-40.29-1.fc40) has been submitted as an update to Fedora 40. https://bodhi.fedoraproject.org/updates/FEDORA-2024-aa24e6024f FEDORA-2024-a9588c99c1 has been pushed to the Fedora 40 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-a9588c99c1` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-a9588c99c1 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2024-a9588c99c1 (selinux-policy-40.29-2.fc40) has been pushed to the Fedora 40 stable repository. If problem still persists, please make note of it in this bug report. |
When I'm running as the context staff_u:staff_r:staff_t:s0-s0:c0.c1023, the GNOME Image Viewer (loupe) doesn't work. Opening an image displays the error message "Could not Load Image" "Loader process exited early with status '1'. "bwrap" "--unshare-all" "--clearenv" [... other args that I can't copy because the widget displaying the message doesn't let me select the text...] Reproducible: Always Steps to Reproduce: 1. Map user to staff_u 2. Log out and ensure no user processes remain 3. Log in and check context is staff_t 4. Download an image file 5. Open it with 'loupe' Actual Results: loupe outputs the following: bwrap: loopback: Failed RTM_NEWADDR: Permission denied bwrap: loopback: Failed RTM_NEWADDR: Permission denied bwrap: loopback: Failed RTM_NEWADDR: Permission denied bwrap: loopback: Failed RTM_NEWADDR: Permission denied These AVC denials are logged (after removing dontaudit rules): type=AVC msg=audit(03/07/24 14:44:11.816:3069) : avc: denied { nlmsg_write } for pid=543746 comm=bwrap scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=0 ---- type=AVC msg=audit(03/07/24 14:44:12.024:3070) : avc: denied { nlmsg_write } for pid=543762 comm=bwrap scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=0 ---- type=AVC msg=audit(03/07/24 14:44:12.036:3071) : avc: denied { nlmsg_write } for pid=543765 comm=bwrap scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=0 ---- type=AVC msg=audit(03/07/24 14:44:12.048:3072) : avc: denied { nlmsg_write } for pid=543768 comm=bwrap scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=0 If I run "bwrap ls" to I get "bwrap: Failed to make / slave: Permission denied" and this denial (not suppressed by dontaudit rules): type=AVC msg=audit(1720014613.737:3121): avc: denied { mounton } for pid=544752 comm="bwrap" path="/" dev="dm-1" ino=256 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0