Bug 1743093
| Summary: | SELinux is preventing /usr/sbin/ip from write access on the file /var/log/vmware-imc/toolsDeployPkg.log | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Sandeep MJ <sjayapra> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 7.7 | CC: | daniele.raffo, lvrabec, mmalik, plautrba, ssekidde, vmojzis, zpytela |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1721943 | Environment: | |
| Last Closed: | 2019-08-21 10:52:49 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1721943 | ||
| Bug Blocks: | |||
|
Description
Sandeep MJ
2019-08-19 05:38:23 UTC
Customer is hitting this after the latest update:
~~~
time->Thu Aug 15 09:22:54 2019
type=PROCTITLE msg=audit(1565824974.994:183): proctitle=2F7573722F7362696E2F697000616464720073686F77
type=PATH msg=audit(1565824974.994:183): item=1 name="/lib64/ld-linux-x86-64.so.2" inode=1506 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:ld_so_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
type=PATH msg=audit(1565824974.994:183): item=0 name="/usr/sbin/ip" inode=14019 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:ifconfig_exec_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
type=CWD msg=audit(1565824974.994:183): cwd="/"
type=EXECVE msg=audit(1565824974.994:183): argc=3 a0="/usr/sbin/ip" a1="addr" a2="show"
type=SYSCALL msg=audit(1565824974.994:183): arch=c000003e syscall=59 success=yes exit=0 a0=1808c10 a1=1808ba0 a2=11a31f0 a3=7fffc54569e0 items=2 ppid=1399 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:ifconfig_t:s0 key=(null)
type=AVC msg=audit(1565824974.994:183): avc: denied { read write } for pid=1457 comm="ip" path="/dev/dri/renderD128" dev="devtmpfs" ino=10948 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0
type=AVC msg=audit(1565824974.994:183): avc: denied { write } for pid=1457 comm="ip" path="/var/log/vmware-imc/toolsDeployPkg.log" dev="dm-3" ino=92 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:object_r:vmware_log_t:s0 tclass=file permissive=0
type=AVC msg=audit(1565824974.994:183): avc: denied { read write } for pid=1457 comm="ip" path="socket:[23476]" dev="sockfs" ino=23476 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:system_r:vmtools_t:s0 tclass=socket permissive=0
type=AVC msg=audit(1565824974.994:183): avc: denied { write } for pid=1457 comm="ip" path="/var/log/vmware-vmsvc.log" dev="dm-3" ino=74 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:object_r:vmware_log_t:s0 tclass=file permissive=0
~~~
This issue was not selected to be included in Red Hat Enterprise Linux 7 because it is seen either as low or moderate impact to a small number of use-cases. The next minor release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable. |