Bug 2338634 - SELinux is preventing systemd-coredum from using the 'sys_admin' capabilities.
Summary: SELinux is preventing systemd-coredum from using the 'sys_admin' capabilities.
Keywords:
Status: CLOSED DUPLICATE of bug 2335200
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 41
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:3f3c41747902206a7bd50598ec7...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-01-17 17:22 UTC by kutubidzegiorgi
Modified: 2025-01-21 12:03 UTC (History)
8 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-01-21 12:03:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: description (1.93 KB, text/plain)
2025-01-17 17:22 UTC, kutubidzegiorgi
no flags Details
File: os_info (754 bytes, text/plain)
2025-01-17 17:22 UTC, kutubidzegiorgi
no flags Details

Description kutubidzegiorgi 2025-01-17 17:22:15 UTC
Description of problem:
Opening Rhythmbox:

The user launches Rhythmbox, a music player application, on their Fedora system.
Initially, the application opens without any visible issues.
First Close Attempt:

The user attempts to close Rhythmbox for the first time.
During this process, Rhythmbox crashes unexpectedly, which may trigger the system to generate a core dump for debugging purposes.
Systemd-Coredump Activation:

As part of the core dump process, systemd-coredum is invoked to handle the core dump.
systemd-coredum tries to use the sys_admin capability, which is required for certain administrative actions like managing core dumps.
SELinux Denial:

SELinux, operating in enforcing mode, denies systemd-coredum the sys_admin capability because it is not explicitly allowed by the current SELinux policy.
An AVC (Access Vector Cache) denial is recorded, and a security alert is generated.
Subsequent Behavior:

After the initial crash and denial, the issue persists whenever Rhythmbox is closed, continuing to trigger the same SELinux alert.
The user observes this behavior consistently, with the alert only appearing after Rhythmbox is closed following the crash.
Audit Log Entry:

Each time the issue occurs, an entry is made in the audit log, capturing details such as the denied capability (sys_admin), the source (systemd-coredum), and the SELinux contexts involved.
User Impact:

The SELinux alert is intrusive, and the user must manually handle or ignore the alert each time it appears.
This impacts the usability of Rhythmbox and indicates a potential bug or misconfiguration in the system or SELinux policies.
SELinux is preventing systemd-coredum from using the 'sys_admin' capabilities.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that systemd-coredum should have the sys_admin capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'systemd-coredum' --raw | audit2allow -M my-systemdcoredum
# semodule -X 300 -i my-systemdcoredum.pp

Additional Information:
Source Context                system_u:system_r:systemd_coredump_t:s0
Target Context                system_u:system_r:systemd_coredump_t:s0
Target Objects                Unknown [ capability ]
Source                        systemd-coredum
Source Path                   systemd-coredum
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-41.28-1.fc41.noarch
Local Policy RPM              selinux-policy-targeted-41.28-1.fc41.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.12.9-200.fc41.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Thu Jan 9 16:05:40 UTC 2025 x86_64
Alert Count                   9
First Seen                    2025-01-16 01:40:46 +04
Last Seen                     2025-01-17 21:12:27 +04
Local ID                      ff5d4ad1-ec0d-4975-96d8-2bda0189f7e5

Raw Audit Messages
type=AVC msg=audit(1737133947.899:1431): avc:  denied  { sys_admin } for  pid=108252 comm="systemd-coredum" capability=21  scontext=system_u:system_r:systemd_coredump_t:s0 tcontext=system_u:system_r:systemd_coredump_t:s0 tclass=capability permissive=0


Hash: systemd-coredum,systemd_coredump_t,systemd_coredump_t,capability,sys_admin

Version-Release number of selected component:
selinux-policy-targeted-41.28-1.fc41.noarch

Additional info:
reporter:       libreport-2.17.15
reason:         SELinux is preventing systemd-coredum from using the 'sys_admin' capabilities.
package:        selinux-policy-targeted-41.28-1.fc41.noarch
component:      selinux-policy
hashmarkername: setroubleshoot
type:           libreport
kernel:         6.12.9-200.fc41.x86_64
component:      selinux-policy

Comment 1 kutubidzegiorgi 2025-01-17 17:22:17 UTC
Created attachment 2066475 [details]
File: description

Comment 2 kutubidzegiorgi 2025-01-17 17:22:19 UTC
Created attachment 2066476 [details]
File: os_info

Comment 3 Zdenek Pytela 2025-01-21 12:03:13 UTC

*** This bug has been marked as a duplicate of bug 2335200 ***


Note You need to log in before you can comment on or make changes to this bug.