Red Hat Bugzilla – Bug 1477887
SELinux policy for Tomcat should not allow access to rpm database by default
Last modified: 2018-04-10 08:37:48 EDT
Description of problem: SELinux policy for Tomcat should not allow access to rpm database by default Version-Release number of selected component (if applicable): selinux-policy-3.13.1-166.el7 How reproducible: always Steps to Reproduce: 1. From some application deployed in Tomcat application server attempt to access rpm database (initially observed on Spacewalk) Actual results: Application running in Tomcat is allowed to access rpm database Expected results: This should not be allowed (at least by default). When needed, should be allowed by application specific policy. Additional info: Opening this bug after discussion with Miroslav Grepl in bug 1451318.
Please attach SELinux denials that are triggered by your scenario. # ausearch -m avc -m user_avc -m selinux_err -m user_selinux_err -i -ts today
Please see bug 1451318 for details. Problem here is policy allows something which should be denied.
(In reply to Jan Hutař from comment #2) > Please see bug 1451318 for details. Problem here is policy allows something > which should be denied. I think it is a misinterpretation. Ii could be allowed by another way (a booelan maybe) and this bug is for a discussion of that from my point of view. Is it OK?
Yep, I'm not against discussion. With comment #0 and comment #2 I just wanted to state the problem.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0763