Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1701338

Summary: /usr/libexec/rhsmcertd-worker (rhsmcertd_t) sends signull to arbitrary processes
Product: Red Hat Enterprise Linux 7 Reporter: Robert Scheck <redhat-bugzilla>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: high    
Version: 7.6CC: lvrabec, mmalik, mmezynsk, nmavrogi, plautrba, robert.scheck, ssekidde, vmojzis, zpytela
Target Milestone: rcKeywords: AutoVerified
Target Release: 7.8   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.13.1-253.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-03-31 19:10:50 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1711916    

Description Robert Scheck 2019-04-18 16:58:18 UTC
Description of problem:
type=AVC msg=audit(1555565475.160:6561409): avc:  denied  { signull } for  pid=8362 comm="rhsmcertd-worke" scontext=system_u:system_r:rhsmcertd_t:s0 tcontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tclass=process permissive=0
type=SYSCALL msg=audit(1555565475.160:6561409): arch=x86_64 syscall=kill success=no exit=EACCES a0=2f41 a1=0 a2=20aa a3=0 items=0 ppid=4350 pid=8362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=rhsmcertd-worke exe=/usr/bin/python2.7 subj=system_u:system_r:rhsmcertd_t:s0 key=(null)

Version-Release number of selected component (if applicable):
selinux-policy-3.13.1-229.el7_6.9.noarch

How reproducible:
Not sure, likely an RHSM internal routine.

Actual results:
SELinux Troubleshoot mail

Expected results:
No SELinux Troubleshoot mail

Additional info:
Quite similar like bug #1379781, bug #1490961, bug #1576555 or bug #1588119, but not a duplicate.

The real issue beyond is likely that the Red Hat Subscription Manager developers are having a IMHO quite bad development style by sending "random" SIGNULL signals around to figure out whether a process is running (or so) and the SELinux policy maintainers are only adding minimalistic dontaudit rules to the policy for whatever I report (rather than all simply a dontaudit for domains). Any chance to get this really addressed?

Comment 2 Robert Scheck 2019-04-18 17:01:48 UTC
Cross-filed ticket 02364810 at the Red Hat customer portal.

Comment 4 Lukas Vrabec 2019-06-27 07:52:20 UTC
*** Bug 1722902 has been marked as a duplicate of this bug. ***

Comment 5 Nikos Mavrogiannopoulos 2019-06-27 10:35:55 UTC
Thank you for reporting that Robert. You are right, this will be addressed generally as part of this bug. I've modified the title to reflect that.

Comment 19 errata-xmlrpc 2020-03-31 19:10:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:1007