Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 750601 - pam_namespace cannot verify status of SELinux in MLS
pam_namespace cannot verify status of SELinux in MLS
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: pam (Show other bugs)
6.1
All Linux
medium Severity medium
: rc
: ---
Assigned To: Tomas Mraz
Dalibor Pospíšil
:
Depends On:
Blocks: 782183 836160
  Show dependency treegraph
 
Reported: 2011-11-01 14:00 EDT by Josh
Modified: 2013-02-21 05:36 EST (History)
5 users (show)

See Also:
Fixed In Version: pam-1.1.1-12.el6
Doc Type: Bug Fix
Doc Text:
Cause: The 'require_selinux' option handling in the pam_namespace module was broken. Consequence: It was not possible to prevent log-in when SELinux was switched off with using pam_namespace require_selinux option. Fix: The 'require_selinux' option handling in the pam_namespace module was fixed. Result: It is now possible to query to prevent log-in when SELinux is switched off with using pam_namespace require_selinux option.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-02-21 05:36:43 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0521 normal SHIPPED_LIVE Moderate: pam security, bug fix, and enhancement update 2013-02-20 16:28:50 EST

  None (edit)
Description Josh 2011-11-01 14:00:17 EDT
Description of problem:
adding session    required     pam_namespace.so require_selinux prevents login from happening when using the MLS selinux policy

Version-Release number of selected component (if applicable):
pam-1.1.1-8.el6.x86_64
selinux-policy-mls-3.7.19-120.el6.noarch

How reproducible:
Always

Steps to Reproduce:
1. add session    required     pam_namespace.so require_selinux to /etc/pam.d/sshd
2. try to log in to the system over ssh
  
Actual results:
Nov  1 13:53:31 rhel6-wsweb sshd[22113]: pam_namespace(sshd:session): selinux_required option given and selinux is disabled


Expected results:
login successful

Additional info:
Comment 2 Daniel Walsh 2011-11-01 15:12:01 EDT
josh do you see any avc messages related to sshd_t?

And you do have allow_polyinstantiation boolean turned on?

setsebool -P allow_polyinstantiation 1
Comment 3 Josh 2011-11-01 15:22:01 EDT
polyinstantiation is enabled and there are no AVC messages related to sshd_t or anything
Comment 4 Josh 2011-11-01 15:24:39 EDT
(In reply to comment #3)
> polyinstantiation is enabled and there are no AVC messages related to sshd_t or
> anything

running with semodule -DB does not provide any other denials other than noatsecure siginh rlimitinh
Comment 5 Tomas Mraz 2011-11-01 15:39:34 EDT
Josh, are you really running the genuine RHEL-6 rpms?
Also, do you see the same problem when running with targeted policy?
Comment 6 Josh 2011-11-01 15:48:01 EDT
(In reply to comment #5)
> Josh, are you really running the genuine RHEL-6 rpms?
> Also, do you see the same problem when running with targeted policy?

Yep, genuine RHEL-6 rpms from 6.1

Just tried it with targeted and I AM seeing the same problem

PS: the option is require_selinux but the logged error message is selinux_required
Comment 7 Tomas Mraz 2011-11-01 15:58:35 EDT
Ah, I forgot about this bug. This is actually a real pam_namespace bug that is fixed already in the current upstream releases (and Fedora).
Comment 8 Josh 2011-11-01 17:01:37 EDT
(In reply to comment #7)
> Ah, I forgot about this bug. This is actually a real pam_namespace bug that is
> fixed already in the current upstream releases (and Fedora).

Any way it can find its way in to RHEL6.2?
Comment 9 Tomas Mraz 2011-11-02 03:20:02 EDT
I cannot give you any definitive information in regards to RHEL6.2 but I can say it is highly improbable that it would be fixed there.
Comment 11 Suzanne Yeghiayan 2012-02-14 18:19:22 EST
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unfortunately unable to
address this request at this time. Red Hat invites you to
ask your support representative to propose this request, if
appropriate and relevant, in the next release of Red Hat
Enterprise Linux. If you would like it considered as an
exception in the current release, please ask your support
representative.
Comment 14 Karel Srot 2012-07-31 09:32:52 EDT
Is this limited to MLS? I am unable to connect even in targeted policy.
Comment 15 Tomas Mraz 2012-08-06 05:41:19 EDT
No, this is not limited to MLS. It is sufficient to test it with targeted policy.
Comment 19 errata-xmlrpc 2013-02-21 05:36:43 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2013-0521.html

Note You need to log in before you can comment on or make changes to this bug.