Bug 538565
Summary: | New 'nrpe' policy prevents most NRPE checks from working | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Ben Webb <benmwebb> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 12 | CC: | dwalsh, mgrepl |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.6.32-120.fc12 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-12-07 22:46:33 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Ben Webb
2009-11-18 20:06:16 UTC
The access required is allow nrpe_t fixed_disk_device_t:blk_file read; allow nrpe_t fs_t:filesystem getattr; allow nrpe_t init_t:dir getattr; allow nrpe_t kernel_t:dir getattr; Everything is ok to add except the first one which would give nrpe the ability to read everything on the box. allow nrpe_t fixed_disk_device_t:blk_file read; I guess the question is whether this access is really necessary. The rest will be Fixed in selinux-policy-3.6.32-47.fc12.noarch Well, the Fedora-packaged check_ide_smart plugin needs access to the disk device to check the SMART status. This is why it is setuid: # ls -l /usr/lib64/nagios/plugins/check_ide_smart -rwsr-x---. 1 root nrpe 31280 2009-08-21 08:01 /usr/lib64/nagios/plugins/check_ide_smart Presumably standard Unix permissions on the nrpe user/group prevent non-setuid plugins from doing anything nefarious with that SELinux access. But the setuid plugins would appear to need it. Is there a finer-grained SELinux permission that can be added to allow checking the SMART status without allowing access to the whole disk? Or is the plugin perhaps asking for more privileges than it needs (in which case, I can certainly open a bug against that package)? For reference, the (largely unrelated) check_ide_smart bug I refer to is bug 469530. I think we need a policy type for check_ide_smart and only give it the permission to read the fixed_disk. Fixed in selinux-policy-3.6.32-48.fc12.noarch selinux-policy-3.6.32-52.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-52.fc12 selinux-policy-3.6.32-52.fc12 has been pushed to the Fedora 12 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12549 selinux-policy-3.6.32-55.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-55.fc12 selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12650 selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report. selinux-policy-3.6.32-120.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-120.fc12 selinux-policy-3.6.32-120.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report. |