Bug 2433446 - SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket.
Summary: SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file ...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 43
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:8b7bdca2cc7744fbc63c8c8b564...
: 2435695 2435813 2435815 2435816 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 17:33 UTC by ParisTexas
Modified: 2026-02-07 00:58 UTC (History)
10 users (show)

Fixed In Version: selinux-policy-42.23-1.fc43
Clone Of:
Environment:
Last Closed: 2026-02-07 00:58:27 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: description (1.97 KB, text/plain)
2026-01-27 17:33 UTC, ParisTexas
no flags Details
File: os_info (739 bytes, text/plain)
2026-01-27 17:33 UTC, ParisTexas
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Github fedora-selinux selinux-policy pull 3038 0 None open Allow thumbnailer connect to abrt over a unix stream socket 2026-01-28 09:49:48 UTC

Description ParisTexas 2026-01-27 17:33:42 UTC
Description of problem:
SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that exe-thumbnailer should be allowed write access on the abrt.socket sock_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'exe-thumbnailer' --raw | audit2allow -M my-exethumbnailer
# semodule -X 300 -i my-exethumbnailer.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023
Target Context                system_u:object_r:abrt_var_run_t:s0
Target Objects                abrt.socket [ sock_file ]
Source                        exe-thumbnailer
Source Path                   exe-thumbnailer
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-42.19-1.fc43.noarch
Local Policy RPM              selinux-policy-targeted-42.19-1.fc43.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.17.11-300.fc43.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Mon Dec 8 23:20:36 UTC 2025 x86_64
Alert Count                   8
First Seen                    2026-01-27 11:31:19 EST
Last Seen                     2026-01-27 12:22:29 EST
Local ID                      23371ecf-25d3-49fb-84fa-58a58695c287

Raw Audit Messages
type=AVC msg=audit(1769534549.819:253): avc:  denied  { write } for  pid=12587 comm="exe-thumbnailer" name="abrt.socket" dev="tmpfs" ino=3187 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:abrt_var_run_t:s0 tclass=sock_file permissive=0


Hash: exe-thumbnailer,thumb_t,abrt_var_run_t,sock_file,write
SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that exe-thumbnailer should be allowed write access on the abrt.socket sock_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'exe-thumbnailer' --raw | audit2allow -M my-exethumbnailer
# semodule -X 300 -i my-exethumbnailer.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023
Target Context                system_u:object_r:abrt_var_run_t:s0
Target Objects                abrt.socket [ sock_file ]
Source                        exe-thumbnailer
Source Path                   exe-thumbnailer
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-42.19-1.fc43.noarch
Local Policy RPM              selinux-policy-targeted-42.19-1.fc43.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 6.17.11-300.fc43.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Mon Dec 8 23:20:36 UTC 2025 x86_64
Alert Count                   8
First Seen                    2026-01-27 11:31:19 EST
Last Seen                     2026-01-27 12:22:29 EST
Local ID                      23371ecf-25d3-49fb-84fa-58a58695c287

Raw Audit Messages
type=AVC msg=audit(1769534549.819:253): avc:  denied  { write } for  pid=12587 comm="exe-thumbnailer" name="abrt.socket" dev="tmpfs" ino=3187 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:abrt_var_run_t:s0 tclass=sock_file permissive=0


Hash: exe-thumbnailer,thumb_t,abrt_var_run_t,sock_file,write

Version-Release number of selected component:
selinux-policy-targeted-42.19-1.fc43.noarch

Additional info:
reporter:       libreport-2.17.15
reason:         SELinux is preventing exe-thumbnailer from 'write' accesses on the sock_file abrt.socket.
package:        selinux-policy-targeted-42.19-1.fc43.noarch
component:      selinux-policy
hashmarkername: setroubleshoot
type:           libreport
kernel:         6.17.11-300.fc43.x86_64
component:      selinux-policy

Comment 1 ParisTexas 2026-01-27 17:33:45 UTC
Created attachment 2123964 [details]
File: description

Comment 2 ParisTexas 2026-01-27 17:33:47 UTC
Created attachment 2123965 [details]
File: os_info

Comment 3 Zdenek Pytela 2026-02-02 16:40:37 UTC
*** Bug 2435695 has been marked as a duplicate of this bug. ***

Comment 4 Zdenek Pytela 2026-02-02 16:40:51 UTC
*** Bug 2435813 has been marked as a duplicate of this bug. ***

Comment 5 Zdenek Pytela 2026-02-02 16:41:00 UTC
*** Bug 2435815 has been marked as a duplicate of this bug. ***

Comment 6 Zdenek Pytela 2026-02-02 16:41:07 UTC
*** Bug 2435816 has been marked as a duplicate of this bug. ***

Comment 7 Fedora Update System 2026-02-05 11:05:41 UTC
FEDORA-2026-3439e5656a (selinux-policy-42.23-1.fc43) has been submitted as an update to Fedora 43.
https://bodhi.fedoraproject.org/updates/FEDORA-2026-3439e5656a

Comment 8 Fedora Update System 2026-02-07 00:58:27 UTC
FEDORA-2026-3439e5656a (selinux-policy-42.23-1.fc43) has been pushed to the Fedora 43 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.