Description of problem: Version-Release number of selected component (if applicable): iputils-20190515-5.fc32.x86_64 iputils-ninfod-20190515-5.fc32.x86_64 selinux-policy-3.14.5-28.fc32.noarch selinux-policy-targeted-3.14.5-28.fc32.noarch How reproducible: * always Steps to Reproduce: 1. get a Fedora 32 (targeted policy is active) 2. start the ninfod service 3. search for SELinux denials Actual results (enforcing mode): ---- type=PROCTITLE msg=audit(03/02/2020 02:59:04.675:368) : proctitle=/usr/sbin/ninfod -d type=PATH msg=audit(03/02/2020 02:59:04.675:368) : item=1 name=/lib64/ld-linux-x86-64.so.2 inode=151766 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ld_so_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 type=PATH msg=audit(03/02/2020 02:59:04.675:368) : item=0 name=/usr/sbin/ninfod inode=135730 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ninfod_exec_t:s0 nametype=NORMAL cap_fp=net_raw cap_fi=none cap_fe=1 cap_fver=2 cap_frootid=0 type=CWD msg=audit(03/02/2020 02:59:04.675:368) : cwd=/ type=EXECVE msg=audit(03/02/2020 02:59:04.675:368) : argc=2 a0=/usr/sbin/ninfod a1=-d type=BPRM_FCAPS msg=audit(03/02/2020 02:59:04.675:368) : fver=2 fp=net_raw fi=none fe=1 old_pp=chown,dac_override,dac_read_search,fowner,fsetid,kill,setgid,setuid,setpcap,linux_immutable,net_bind_service,net_broadcast,net_admin,net_raw,ipc_lock,ipc_owner,sys_module,sys_rawio,sys_chroot,sys_ptrace,sys_pacct,sys_admin,sys_boot,sys_nice,sys_resource,sys_time,sys_tty_config,mknod,lease,audit_write,audit_control,setfcap,mac_override,mac_admin,syslog,wake_alarm,block_suspend,audit_read old_pi=net_raw old_pe=none old_pa=net_raw pp=net_raw pi=net_raw pe=net_raw pa=none frootid=0 type=SYSCALL msg=audit(03/02/2020 02:59:04.675:368) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x557c53fed2f0 a1=0x557c54235a30 a2=0x557c5424bb00 a3=0x557c54000750 items=2 ppid=1 pid=1182 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:init_t:s0 key=(null) type=SELINUX_ERR msg=audit(03/02/2020 02:59:04.675:368) : op=security_bounded_transition seresult=denied oldcontext=system_u:system_r:init_t:s0 newcontext=system_u:system_r:ninfod_t:s0 type=AVC msg=audit(03/02/2020 02:59:04.675:368) : avc: denied { nnp_transition } for pid=1182 comm=(ninfod) scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:ninfod_t:s0 tclass=process2 permissive=0 ---- type=PROCTITLE msg=audit(03/02/2020 02:59:04.681:369) : proctitle=/usr/sbin/ninfod -d type=SYSCALL msg=audit(03/02/2020 02:59:04.681:369) : arch=x86_64 syscall=socket success=no exit=EACCES(Permission denied) a0=inet6 a1=SOCK_RAW a2=ipv6-icmp a3=0x7fc2567df0eb items=0 ppid=1 pid=1182 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:init_t:s0 key=(null) type=AVC msg=audit(03/02/2020 02:59:04.681:369) : avc: denied { create } for pid=1182 comm=ninfod scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=rawip_socket permissive=0 ---- Expected results: * no SELinux denials * the ninfod service starts successfully
Caught in permissive mode: ---- type=PROCTITLE msg=audit(03/02/2020 07:42:13.194:727) : proctitle=/usr/sbin/ninfod -d type=PATH msg=audit(03/02/2020 07:42:13.194:727) : item=1 name=/lib64/ld-linux-x86-64.so.2 inode=151766 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ld_so_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 type=PATH msg=audit(03/02/2020 07:42:13.194:727) : item=0 name=/usr/sbin/ninfod inode=147711 dev=fc:01 mode=file,755 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:ninfod_exec_t:s0 nametype=NORMAL cap_fp=net_raw cap_fi=none cap_fe=1 cap_fver=2 cap_frootid=0 type=CWD msg=audit(03/02/2020 07:42:13.194:727) : cwd=/ type=EXECVE msg=audit(03/02/2020 07:42:13.194:727) : argc=2 a0=/usr/sbin/ninfod a1=-d type=BPRM_FCAPS msg=audit(03/02/2020 07:42:13.194:727) : fver=2 fp=net_raw fi=none fe=1 old_pp=chown,dac_override,dac_read_search,fowner,fsetid,kill,setgid,setuid,setpcap,linux_immutable,net_bind_service,net_broadcast,net_admin,net_raw,ipc_lock,ipc_owner,sys_module,sys_rawio,sys_chroot,sys_ptrace,sys_pacct,sys_admin,sys_boot,sys_nice,sys_resource,sys_time,sys_tty_config,mknod,lease,audit_write,audit_control,setfcap,mac_override,mac_admin,syslog,wake_alarm,block_suspend,audit_read old_pi=net_raw old_pe=none old_pa=net_raw pp=net_raw pi=net_raw pe=net_raw pa=none frootid=0 type=SYSCALL msg=audit(03/02/2020 07:42:13.194:727) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x557219e8f2f0 a1=0x557219e4b380 a2=0x557219e32db0 a3=0x557219ffa3e0 items=2 ppid=1 pid=18255 auid=unset uid=ninfod gid=unknown(64371) euid=ninfod suid=ninfod fsuid=ninfod egid=unknown(64371) sgid=unknown(64371) fsgid=unknown(64371) tty=(none) ses=unset comm=ninfod exe=/usr/sbin/ninfod subj=system_u:system_r:ninfod_t:s0 key=(null) type=AVC msg=audit(03/02/2020 07:42:13.194:727) : avc: denied { nnp_transition } for pid=18255 comm=(ninfod) scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:ninfod_t:s0 tclass=process2 permissive=1 ----
commit 80bcde108ad679e1a7c4bb14a463947cae720b0c (HEAD -> rawhide, origin/rawhide, origin/HEAD) Author: Patrik Koncity <pkoncity> Date: Fri Mar 20 15:43:05 2020 +0100 Update ninfod policy to add nnp transition from systemd to ninfod Allow SELinux Domain trasition from systemd into confined domain with NoNewPrivileges Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1808987
FEDORA-2020-2fad1f552d has been submitted as an update to Fedora 32. https://bodhi.fedoraproject.org/updates/FEDORA-2020-2fad1f552d
FEDORA-2020-2fad1f552d has been pushed to the Fedora 32 testing repository. In short time you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-2fad1f552d` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-2fad1f552d See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
This message is a reminder that Fedora 32 is nearing its end of life. Fedora will stop maintaining and issuing updates for Fedora 32 on 2021-05-25. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a Fedora 'version' of '32'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora 32 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete.
Fedora 32 changed to end-of-life (EOL) status on 2021-05-25. Fedora 32 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed.