2017-12-14 09:48 UTC

View Issue Details Jump to Notes ]
IDProjectCategoryView StatusLast Update
0012565CentOS-7selinux-policypublic2017-11-09 10:13
Reporterevgeny_orel 
PrioritynormalSeverityminorReproducibilityhave not tried
StatusnewResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0012565: SELinux is preventing /usr/bin/gnome-shell from 'execute' accesses on the file /var/lib/gdm/.glvndPfLON3 (deleted).
DescriptionDescription of problem:
SELinux is preventing /usr/bin/gnome-shell from 'execute' accesses on the file /var/lib/gdm/.glvndPfLON3 (deleted).

***** Plugin catchall (100. confidence) suggests **************************

If вы считаете, что gnome-shell следует разрешить доступ execute к .glvndPfLON3 (deleted) file по умолчанию.
Then рекомендуется создать отчет об ошибке.
Чтобы разрешить доступ, можно создать локальный модуль политики.
Do
allow this access for now by executing:
# ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell
# semodule -i my-gnomeshell.pp

Additional Information:
Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
Target Context system_u:object_r:xdm_var_lib_t:s0
Target Objects /var/lib/gdm/.glvndPfLON3 (deleted) [ file ]
Source gnome-shell
Source Path /usr/bin/gnome-shell
Port <Unknown>
Host (removed)
Source RPM Packages gnome-shell-3.14.4-53.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.13.1-102.el7_3.7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 3.10.0-514.2.2.el7.x86_64 #1 SMP
                              Tue Dec 6 23:06:41 UTC 2016 x86_64 x86_64
Alert Count 6
First Seen 2016-12-31 12:09:47 MSK
Last Seen 2017-01-01 21:22:54 MSK
Local ID efbae302-6b7d-468d-8c5b-9214ce157c84

Raw Audit Messages
type=AVC msg=audit(1483294974.395:136): avc: denied { execute } for pid=2907 comm="gnome-shell" path=2F7661722F6C69622F67646D2F2E676C766E6450664C4F4E33202864656C6574656429 dev="sda6" ino=2625440 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_var_lib_t:s0 tclass=file


type=SYSCALL msg=audit(1483294974.395:136): arch=x86_64 syscall=mmap success=no exit=EACCES a0=0 a1=40000 a2=5 a3=1 items=0 ppid=2805 pid=2907 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm=gnome-shell exe=/usr/bin/gnome-shell subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)

Hash: gnome-shell,xdm_t,xdm_var_lib_t,file,execute

Version-Release number of selected component:
selinux-policy-3.13.1-102.el7_3.7.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 3.10.0-514.2.2.el7.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hashe6342cc567d30f7d6d5c8a3272035f78b7efc2ede7d82bcd015b20c011f0e7ab
URL
Attached Files

-Relationships
+Relationships

-Notes

~0030481

CdeMills (reporter)

Another user experienced a similar problem:

Hello,

I recently hardenend CentOS by enabling systemd tmp.mount; mounting /tmp as noexec, nosuid, nodev

OTOH the target for this report is /var/lib/gdm/some_deleted_file; and /var is still part of the root filesystem,
i.e. nothing special about mount options

Regards

reporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 3.10.0-693.5.2.el7.x86_64
package: selinux-policy-3.13.1-166.el7_4.5.noarch
reason: SELinux is preventing /usr/bin/gnome-shell from 'execute' accesses on the file /var/lib/gdm/.glvndVjAXoK (deleted).
reproducible: Not sure how to reproduce the problem
type: libreport

~0030551

JLambrecht (reporter)

Another user experienced a similar problem:

bizar attempt by gnome-shell

reporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 4.13.10-1.el7.elrepo.x86_64
package: selinux-policy-3.13.1-166.el7_4.5.noarch
reason: SELinux is preventing /usr/bin/gnome-shell from 'execute' accesses on the file /var/lib/gdm/.glvndlrmJw0 (deleted).
reproducible: Not sure how to reproduce the problem
type: libreport
+Notes

-Issue History
Date Modified Username Field Change
2017-01-02 01:08 evgeny_orel New Issue
2017-10-29 08:40 CdeMills Note Added: 0030481
2017-11-09 10:13 JLambrecht Note Added: 0030551
+Issue History