2017-12-13 09:10 UTC

View Issue Details Jump to Notes ]
IDProjectCategoryView StatusLast Update
0013753CentOS-7selinux-policypublic2017-11-09 10:07
Reportercryptoaddict1 
PrioritynormalSeverityminorReproducibilityhave not tried
StatusnewResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0013753: SELinux is preventing /usr/sbin/sm-notify from using the 'dac_read_search' capabilities.
DescriptionDescription of problem:
SELinux is preventing /usr/sbin/sm-notify from using the 'dac_read_search' capabilities.

***** Plugin dac_override (91.4 confidence) suggests **********************

If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system
Then turn on full auditing to get path information about the offending file and generate the error again.
Do

Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it,
otherwise report as a bugzilla.

***** Plugin catchall (9.59 confidence) suggests **************************

If you believe that sm-notify should have the dac_read_search capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'sm-notify' --raw | audit2allow -M my-smnotify
# semodule -i my-smnotify.pp

Additional Information:
Source Context system_u:system_r:rpcd_t:s0
Target Context system_u:system_r:rpcd_t:s0
Target Objects Unknown [ capability ]
Source sm-notify
Source Path /usr/sbin/sm-notify
Port <Unknown>
Host (removed)
Source RPM Packages nfs-utils-1.3.0-0.33.el7_3.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.13.1-102.el7_3.16.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 4.12.10-1.el7.elrepo.x86_64 #1 SMP
                              Wed Aug 30 13:00:07 EDT 2017 x86_64 x86_64
Alert Count 2
First Seen 2017-08-31 18:34:48 EDT
Last Seen 2017-08-31 18:34:48 EDT
Local ID 51be5087-8b27-4b1a-b9bd-0d7c6c36a535

Raw Audit Messages
type=AVC msg=audit(1504218888.769:102): avc: denied { dac_read_search } for pid=1651 comm="sm-notify" capability=2 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=capability permissive=0


type=AVC msg=audit(1504218888.769:102): avc: denied { dac_read_search } for pid=1651 comm="sm-notify" capability=2 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=capability permissive=0


type=SYSCALL msg=audit(1504218888.769:102): arch=x86_64 syscall=openat success=yes exit=EINTR a0=ffffffffffffff9c a1=559ab37fb360 a2=90800 a3=0 items=0 ppid=1 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=sm-notify exe=/usr/sbin/sm-notify subj=system_u:system_r:rpcd_t:s0 key=(null)

Hash: sm-notify,rpcd_t,rpcd_t,capability,dac_read_search

Version-Release number of selected component:
selinux-policy-3.13.1-102.el7_3.16.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 4.12.10-1.el7.elrepo.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hash9b65680e9108816e0125214400b322e955cafb670826ac0b379f65ac63f4eaf1
URL
Attached Files

-Relationships
+Relationships

-Notes

~0030548

JLambrecht (reporter)

Another user experienced a similar problem:

impossible to comprehend message

reporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 4.13.10-1.el7.elrepo.x86_64
package: selinux-policy-3.13.1-166.el7_4.5.noarch
reason: SELinux is preventing /usr/sbin/sm-notify from using the 'dac_read_search' capabilities.
reproducible: Not sure how to reproduce the problem
type: libreport
+Notes

-Issue History
Date Modified Username Field Change
2017-08-31 22:52 cryptoaddict1 New Issue
2017-11-09 10:07 JLambrecht Note Added: 0030548
+Issue History