Bug 1861337 - SELinux is preventing (ecron.pl) from 'execute' accesses on the file cron.pl.
Summary: SELinux is preventing (ecron.pl) from 'execute' accesses on the file cron.pl.
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 32
Hardware: x86_64
OS: Unspecified
low
low
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:844ed7f2b337e9dd851decc8c9b...
Depends On: 1812955
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-07-28 10:25 UTC by David Novák
Modified: 2021-05-25 18:51 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-05-25 18:51:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description David Novák 2020-07-28 10:25:26 UTC
Description of problem:
I ran installation script for IDrive Linux scripts.
This is caused by IDrive service scripts for Linux, which is legitimate SW.

SELinux is preventing (ecron.pl) from 'execute' accesses on the file cron.pl.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that (ecron.pl) should be allowed execute access on the cron.pl file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c '(ecron.pl)' --raw | audit2allow -M my-ecronpl
# semodule -X 300 -i my-ecronpl.pp

Additional Information:
Source Context                system_u:system_r:init_t:s0
Target Context                unconfined_u:object_r:user_home_t:s0
Target Objects                cron.pl [ file ]
Source                        (ecron.pl)
Source Path                   (ecron.pl)
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-3.14.5-42.fc32.noarch
Local Policy RPM              selinux-policy-targeted-3.14.5-42.fc32.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 5.7.10-201.fc32.x86_64 #1 SMP Thu
                              Jul 23 00:58:39 UTC 2020 x86_64 x86_64
Alert Count                   1
First Seen                    2020-07-28 12:12:41 CEST
Last Seen                     2020-07-28 12:12:41 CEST
Local ID                      2ace219e-ce5a-4f94-8e72-6f256be8445a

Raw Audit Messages
type=AVC msg=audit(1595931161.602:435): avc:  denied  { execute } for  pid=23919 comm="(ecron.pl)" name="cron.pl" dev="dm-1" ino=2884402 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0


Hash: (ecron.pl),init_t,user_home_t,file,execute

Version-Release number of selected component:
selinux-policy-targeted-3.14.5-42.fc32.noarch

Additional info:
component:      selinux-policy
reporter:       libreport-2.13.1
hashmarkername: setroubleshoot
kernel:         5.7.10-201.fc32.x86_64
type:           libreport

Comment 1 Zdenek Pytela 2020-07-28 11:58:05 UTC
Hi,

Could you please add some details how it works?
- which script executes other
- disclose the file path as it is not logged
- how systemd is involved
etc.

Comment 2 David Novák 2020-07-28 12:09:11 UTC
Hi,
if it helps, the scripts can be downloaded here: https://www.idrivedownloads.com/downloads/linux/download-for-linux/IDriveForLinux.zip

I ran account_setting.pl as suggested in readme.txt.

File path can be anything - user unpacks the archive. Mine was ~/IDriveForLinux/scripts.

I suspect it tries to add cron jobs (or get access to cron) for backup schedules.

Comment 3 Fedora Program Management 2021-04-29 17:23:08 UTC
This message is a reminder that Fedora 32 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 32 on 2021-05-25.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '32'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 32 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 4 Ben Cotton 2021-05-25 18:51:13 UTC
Fedora 32 changed to end-of-life (EOL) status on 2021-05-25. Fedora 32 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.