Bug 1908122 - SELinux is preventing unix_chkpwd from 'getattr' accesses on the souborový systém /proc.
Summary: SELinux is preventing unix_chkpwd from 'getattr' accesses on the souborový sy...
Keywords:
Status: CLOSED DUPLICATE of bug 1892401
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:a253ba2092eff29c10bcc36f4d8...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-12-15 21:11 UTC by Vít Ondruch
Modified: 2021-01-04 18:26 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-01-04 18:26:11 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Vít Ondruch 2020-12-15 21:11:20 UTC
Description of problem:
SELinux is preventing unix_chkpwd from 'getattr' accesses on the souborový systém /proc.

*****  Plugin catchall (100. confidence) suggests   **************************

Pokud jste přesvědčeni, že má unix_chkpwd mít ve výchozím stavu přístup getattr na proc filesystem.
Then měli byste tento problém nahlásit jako chybu.
Abyste přístup povolili, můžete vygenerovat lokální modul pravidel.
Do
prozatím tento přístup povolíte příkazy:
# ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd
# semodule -X 300 -i my-unixchkpwd.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:chkpwd_t:s0-s0:c0.c1023
Target Context                system_u:object_r:proc_t:s0
Target Objects                /proc [ filesystem ]
Source                        unix_chkpwd
Source Path                   unix_chkpwd
Port                          <Neznámé>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           filesystem-3.14-4.fc34.x86_64
SELinux Policy RPM            selinux-policy-targeted-3.14.7-11.fc34.noarch
Local Policy RPM              selinux-policy-targeted-3.14.7-11.fc34.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 5.9.14-200.fc33.x86_64 #1 SMP Fri
                              Dec 11 14:30:56 UTC 2020 x86_64 x86_64
Alert Count                   7
First Seen                    2020-12-15 22:01:10 CET
Last Seen                     2020-12-15 22:03:10 CET
Local ID                      1c7acd77-06ea-4386-91a2-5f5298acb0fa

Raw Audit Messages
type=AVC msg=audit(1608066190.430:715): avc:  denied  { getattr } for  pid=3134 comm="unix_chkpwd" name="/" dev="proc" ino=1 scontext=unconfined_u:unconfined_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem permissive=0


Hash: unix_chkpwd,chkpwd_t,proc_t,filesystem,getattr

Version-Release number of selected component:
selinux-policy-targeted-3.14.7-11.fc34.noarch

Additional info:
component:      selinux-policy
reporter:       libreport-2.14.0
hashmarkername: setroubleshoot
kernel:         5.9.14-200.fc33.x86_64
type:           libreport

Comment 1 Zdenek Pytela 2021-01-04 18:26:11 UTC

*** This bug has been marked as a duplicate of bug 1892401 ***


Note You need to log in before you can comment on or make changes to this bug.