Description of problem: SELinux is preventing reporter-urepor from 'write' accesses on the fichier user. ***** Plugin catchall (100. confidence) suggests ************************** Si vous pensez que reporter-urepor devrait être autorisé à accéder write sur user file par défaut. Then vous devriez rapporter ceci en tant qu'anomalie. Vous pouvez générer un module de stratégie local pour autoriser cet accès. Do autoriser cet accès pour le moment en exécutant : # ausearch -c "reporter-urepor" --raw | audit2allow -M my-reporterurepor # semodule -X 300 -i my-reporterurepor.pp Additional Information: Source Context system_u:system_r:abrt_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:cache_home_t:s0 Target Objects user [ file ] Source reporter-urepor Source Path reporter-urepor Port <Inconnu> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-36.10-1.fc36.noarch Local Policy RPM selinux-policy-targeted-36.10-1.fc36.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.17.13-300.fc36.x86_64 #1 SMP PREEMPT Mon Jun 6 14:29:43 UTC 2022 x86_64 x86_64 Alert Count 260 First Seen 2022-05-30 17:11:54 CEST Last Seen 2022-06-13 13:37:24 CEST Local ID 016a1623-207a-4773-8b1f-179bb1f488b1 Raw Audit Messages type=AVC msg=audit(1655120244.675:831): avc: denied { write } for pid=154193 comm=64636F6E6620776F726B6572 name="user" dev="sda7" ino=18482199 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:cache_home_t:s0 tclass=file permissive=0 Hash: reporter-urepor,abrt_t,cache_home_t,file,write Version-Release number of selected component: selinux-policy-targeted-36.10-1.fc36.noarch Additional info: component: selinux-policy reporter: libreport-2.17.1 hashmarkername: setroubleshoot kernel: 5.17.13-300.fc36.x86_64 type: libreport
It is required to turn this boolean on to allow abrt additional permissions and be able to troubleshoot further: # setsebool -P abrt_handle_event on and subsequently report another bug for the affected component. Refer to abrt_handle_event_selinux(8) for more information. Closing as dup of bz#1896648. *** This bug has been marked as a duplicate of bug 1896648 ***