RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1216094 - /usr/libexec/sssd/selinux_child crashes and gets avc denial when ssh
Summary: /usr/libexec/sssd/selinux_child crashes and gets avc denial when ssh
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: sssd
Version: 6.7
Hardware: Unspecified
OS: Unspecified
medium
unspecified
Target Milestone: rc
: ---
Assignee: SSSD Maintainers
QA Contact: Kaushik Banerjee
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-04-28 13:28 UTC by Xiyang Dong
Modified: 2020-05-02 18:04 UTC (History)
10 users (show)

Fixed In Version: sssd-1.12.4-40.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-07-22 06:44:22 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
full abrt email (18.64 KB, text/plain)
2015-04-28 13:28 UTC, Xiyang Dong
no flags Details
avc log (6.33 KB, text/plain)
2015-04-28 13:29 UTC, Xiyang Dong
no flags Details
avc log 2 (22.03 KB, text/plain)
2015-06-08 14:05 UTC, Xiyang Dong
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 3690 0 None None None 2020-05-02 18:04:05 UTC
Red Hat Product Errata RHBA-2015:1448 0 normal SHIPPED_LIVE sssd bug fix and enhancement update 2015-07-20 18:43:53 UTC

Description Xiyang Dong 2015-04-28 13:28:00 UTC
Created attachment 1019677 [details]
full abrt email

Description of problem:
/usr/libexec/sssd/selinux_child crashes and gets avc denial when ssh

abrt_version:   2.0.8
backtrace_rating: 0
cgroup:         
cmdline:        /usr/libexec/sssd/selinux_child --debug-microseconds=0 --debug-timestamps=1 --debug-fd=21 --debug-level=0x0010
crash_function: semanage_disconnect
executable:     /usr/libexec/sssd/selinux_child
hostname:       ibm-x3650m4-01-vm-06.testrelm.test
kernel:         2.6.32-504.el6.x86_64
last_occurrence: 1430165842
open_fds:       
pid:            9809
pwd:            /
time:           Mon 27 Apr 2015 04:17:22 PM EDT
uid:            0
username:       root

Version-Release number of selected component (if applicable):
sssd-1.12.4-31.el6

How reproducible:
Always

Steps to Reproduce:
1.Upgrades from 6.6 to 6.7
2.ssh check as I pasted on additional info 

Actual results:
/usr/libexec/sssd/selinux_child crashes and gets avc denial when ssh

Expected results:
no crash and no avc denial

Additional info:

ssh check tests:
:: [ 16:17:18 ] :: {{{{{{{{{{{{{{{{{{{ starting ipa_quicktest_ssh_check ipa_upgrade_master_replica_client_all_1 }}}}}}}}}}}}}}}}}}}
:: [ 16:17:18 ] :: 
:: [ 16:17:18 ] :: 
:: [  BEGIN   ] :: Running 'ssh-keyscan -t dsa ibm-x3650m4-01-vm-06.testrelm.test > /tmp/ssh_host_dsa_key_ibm-x3650m4-01-vm-06.testrelm.test.pub 2>/dev/null'
:: [   PASS   ] :: Command 'ssh-keyscan -t dsa ibm-x3650m4-01-vm-06.testrelm.test > /tmp/ssh_host_dsa_key_ibm-x3650m4-01-vm-06.testrelm.test.pub 2>/dev/null' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ssh-keyscan -t rsa ibm-x3650m4-01-vm-06.testrelm.test > /tmp/ssh_host_rsa_key_ibm-x3650m4-01-vm-06.testrelm.test.pub 2>/dev/null'
:: [   PASS   ] :: Command 'ssh-keyscan -t rsa ibm-x3650m4-01-vm-06.testrelm.test > /tmp/ssh_host_rsa_key_ibm-x3650m4-01-vm-06.testrelm.test.pub 2>/dev/null' (Expected 0, got 0)
:: [ 16:17:19 ] :: Checking for User SSH Public Key
:: [  BEGIN   ] :: Running 'ipa user-show sshuser1 | grep 1A:50:63:B9:52:12:50:50:F1:4C:DD:AE:87:DD:F1:27'
  SSH public key fingerprint: 1A:50:63:B9:52:12:50:50:F1:4C:DD:AE:87:DD:F1:27 root.test (ssh-rsa)
:: [   PASS   ] :: Command 'ipa user-show sshuser1 | grep 1A:50:63:B9:52:12:50:50:F1:4C:DD:AE:87:DD:F1:27' (Expected 0, got 0)
:: [ 16:17:20 ] :: Checking for Host SSH Public DSA Key
:: [  BEGIN   ] :: Running 'ipa host-show ibm-x3650m4-01-vm-06.testrelm.test | grep 18:7A:09:11:6E:B2:DA:0C:05:74:54:A3:59:45:AA:67'
  SSH public key fingerprint: 18:7A:09:11:6E:B2:DA:0C:05:74:54:A3:59:45:AA:67 (ssh-dss), E7:7E:D5:03:92:C7:82:84:50:0A:D0:CB:DB:A6:A8:D7 (ssh-rsa)
:: [   PASS   ] :: Command 'ipa host-show ibm-x3650m4-01-vm-06.testrelm.test | grep 18:7A:09:11:6E:B2:DA:0C:05:74:54:A3:59:45:AA:67' (Expected 0, got 0)
:: [ 16:17:21 ] :: Checking for Host SSH Public RSA Key
:: [  BEGIN   ] :: Running 'ipa host-show ibm-x3650m4-01-vm-06.testrelm.test | grep E7:7E:D5:03:92:C7:82:84:50:0A:D0:CB:DB:A6:A8:D7'
  SSH public key fingerprint: 18:7A:09:11:6E:B2:DA:0C:05:74:54:A3:59:45:AA:67 (ssh-dss), E7:7E:D5:03:92:C7:82:84:50:0A:D0:CB:DB:A6:A8:D7 (ssh-rsa)
:: [   PASS   ] :: Command 'ipa host-show ibm-x3650m4-01-vm-06.testrelm.test | grep E7:7E:D5:03:92:C7:82:84:50:0A:D0:CB:DB:A6:A8:D7' (Expected 0, got 0)
:: [  BEGIN   ] :: Running 'ssh -o StrictHostKeyChecking=no -i /tmp/id_rsa_sshuser1 sshuser1.test hostname'
Could not chdir to home directory /home/sshuser1: No such file or directory
ibm-x3650m4-01-vm-06.testrelm.test
:: [   PASS   ] :: Command 'ssh -o StrictHostKeyChecking=no -i /tmp/id_rsa_sshuser1 sshuser1.test hostname' (Expected 0, got 0)
:: [ 16:17:22 ] :: 

I also attached full abrt email and avc log

Comment 1 Xiyang Dong 2015-04-28 13:29:18 UTC
Created attachment 1019678 [details]
avc log

Comment 3 Jakub Hrozek 2015-04-28 13:51:26 UTC
Can I get access to a system that reproduces the crash or at least the full abrt tarball?

Comment 6 Jakub Hrozek 2015-05-06 13:56:14 UTC
Upstream ticket:
https://fedorahosted.org/sssd/ticket/2649

Comment 7 Jakub Hrozek 2015-05-11 08:04:13 UTC
* master: 589a8760b38d9e2dfa278764af12d59e1487fe07
* sssd-1-12: 2ed3ac5190cd8f92d671e00837a360bd92cf150c

Comment 9 Xiyang Dong 2015-06-08 14:04:13 UTC
Crash is gone but still gets avc denial on sssd-1.12.4-45.el6.x86_64

Comment 10 Xiyang Dong 2015-06-08 14:05:15 UTC
Created attachment 1036377 [details]
avc log 2

Comment 11 Jakub Hrozek 2015-06-08 14:11:48 UTC
(In reply to Xiyang Dong from comment #10)
> Created attachment 1036377 [details]
> avc log 2

Are you running the latest 6.7 selinux policy version? If yes, then please open a bug against selinux policy.

Comment 12 Xiyang Dong 2015-06-08 17:06:48 UTC
Thanks, found that selinux didn't get updated to latest in the test.
With newest selinux-policy, the avc denial messages disappear too.

Verified on: 
sssd-1.12.4-45.el6.
selinux-policy-3.7.19-272.el6.

No crash or avc denial found.

Comment 14 errata-xmlrpc 2015-07-22 06:44:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-1448.html


Note You need to log in before you can comment on or make changes to this bug.