Red Hat Satellite engineering is moving the tracking of its product development work on Satellite to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "Satellite project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs will be migrated starting at the end of May. If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "Satellite project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/SAT-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2077017 - pulpcore_t and pulpcore_server_t domains are prevented to access unconfined_service_t:key
Summary: pulpcore_t and pulpcore_server_t domains are prevented to access unconfined_s...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Satellite
Classification: Red Hat
Component: Pulp
Version: 6.11.0
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: Unspecified
Assignee: satellite6-bugs
QA Contact: Lukas Pramuk
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-04-20 13:32 UTC by Lukas Pramuk
Modified: 2023-09-18 04:35 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-10-19 19:33:42 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Lukas Pramuk 2022-04-20 13:32:21 UTC
This bug was initially created as a copy of Bug #2051522

I am copying this bug because: 
There are some new pulpcore denials on RHEL8 only


Description of problem:
pulpcore_t and pulpcore_server_t domains are prevented to access unconfined_service_t:key
audit.log is being filled with these denials continuously.


Version-Release number of selected component (if applicable):
Satellite 6.11.0 Snap16 EL8
pulpcore-selinux-1.3.0-1.el8pc.x86_64

How reproducible:
deterministic

Steps to Reproduce:
1. Have a Satellite
2. Check for denials

# audit2allow -a

#============= pulpcore_server_t ==============
allow pulpcore_server_t unconfined_service_t:key { read view };

#============= pulpcore_t ==============
allow pulpcore_t unconfined_service_t:key { read view };


Actual results:
selinux denials present

Expected results:
no selinux denials

Comment 2 Lukas Pramuk 2022-04-20 13:39:50 UTC
type=AVC msg=audit(1650321566.857:1258): avc:  denied  { read } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650321566.857:1259): avc:  denied  { view } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650364777.880:2144): avc:  denied  { read } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650364777.880:2145): avc:  denied  { view } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650407988.843:2922): avc:  denied  { read } for  pid=21320 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650407988.843:2923): avc:  denied  { view } for  pid=21320 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650451201.570:3716): avc:  denied  { read } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1
type=AVC msg=audit(1650451201.570:3717): avc:  denied  { view } for  pid=21313 comm="gunicorn" scontext=system_u:system_r:pulpcore_server_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=key permissive=1

Comment 3 Mike DePaulo 2022-04-20 16:00:24 UTC
Hi, I need the filepath in order to investigate this further. Or access to the system.

The filepath can probably be found with `ausearch -m avc`.

Comment 4 Brad Buckingham 2022-05-05 12:43:01 UTC
Adding a needinfo on the reporter based upon comment 3.

Comment 5 Lukas Pramuk 2022-05-17 11:04:14 UTC
I can't get a reproducer machine as I'm not able to reproduce on fresh 6.11 EL8.
I might reuse some other setup to check for selinux. LEAPPed ? Working on to set it up

Comment 8 Mike DePaulo 2022-09-06 18:30:45 UTC
Lukas,

Just reminding you that I can still work on this if you give me a reproducer.

Comment 9 Daniel Alley 2022-09-16 19:49:45 UTC
Are we able to correlate these warnings with a specific action being performed on the Satellite?

Comment 10 Daniel Alley 2022-10-19 19:33:42 UTC
Closing this as having insufficient data for now.  It may already be resolved if we can't reproduce it and aren't hearing about it :)

Comment 11 Red Hat Bugzilla 2023-09-18 04:35:52 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days


Note You need to log in before you can comment on or make changes to this bug.