Bug 2435815
| Summary: | SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket. | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Davide Repetto <red> | ||||||
| Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> | ||||||
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
| Severity: | unspecified | Docs Contact: | |||||||
| Priority: | unspecified | ||||||||
| Version: | 43 | CC: | dwalsh, lvrabec, mmalik, omosnacek, pkoncity, red, vmojzis, zpytela | ||||||
| Target Milestone: | --- | ||||||||
| Target Release: | --- | ||||||||
| Hardware: | x86_64 | ||||||||
| OS: | Unspecified | ||||||||
| Whiteboard: | abrt_hash:8b7bdca2cc7744fbc63c8c8b564639023300c2659575b972055f9a2edbb8535d;VARIANT_ID=matecompiz; | ||||||||
| Fixed In Version: | Doc Type: | --- | |||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2026-02-02 16:41:00 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Attachments: |
|
||||||||
Created attachment 2127738 [details]
File: description
Created attachment 2127739 [details]
File: os_info
*** This bug has been marked as a duplicate of bug 2433446 *** |
Description of problem: SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket. ***** Plugin catchall (100. confidence) suggests ************************** Se si ritiene che a exe-thumbnailer debba essere consentito l'accesso write su sock_file abrt.socket per impostazione predefinita. Then si dovrebbe segnalare il problema come bug. È possibile generare un modulo di politica locale per consentire questo accesso. Do consentire questo accesso per ora eseguendo: # ausearch -c 'exe-thumbnailer' --raw | audit2allow -M my-$MODULE_NOME # semodule -X 300 -i mio-exethumbnailer.pp Additional Information: Source Context unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 Target Context system_u:object_r:abrt_var_run_t:s0 Target Objects abrt.socket [ sock_file ] Source exe-thumbnailer Source Path exe-thumbnailer Port <Sconosciuto> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-42.22-1.fc43.noarch Local Policy RPM selinux-policy-targeted-42.22-1.fc43.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 6.18.7-200.fc43.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Jan 23 16:42:34 UTC 2026 x86_64 Alert Count 1 First Seen 2026-02-01 18:43:27 CET Last Seen 2026-02-01 18:43:27 CET Local ID 0c867d3c-0ed4-47c7-bd01-9e9ff607ef70 Raw Audit Messages type=AVC msg=audit(1769967807.838:452): avc: denied { write } for pid=42530 comm="exe-thumbnailer" name="abrt.socket" dev="tmpfs" ino=3804 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:abrt_var_run_t:s0 tclass=sock_file permissive=1 Hash: exe-thumbnailer,thumb_t,abrt_var_run_t,sock_file,write Version-Release number of selected component: selinux-policy-targeted-42.22-1.fc43.noarch Additional info: reporter: libreport-2.17.15 reason: SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket. package: selinux-policy-targeted-42.22-1.fc43.noarch component: selinux-policy hashmarkername: setroubleshoot type: libreport kernel: 6.18.7-200.fc43.x86_64 component: selinux-policy