2017-12-16 20:27 UTC

View Issue Details Jump to Notes ]
IDProjectCategoryView StatusLast Update
0013949CentOS-7selinux-policypublic2017-12-09 03:10
Reporterdcatkin 
PrioritynormalSeverityminorReproducibilityhave not tried
StatusnewResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0013949: SELinux is preventing systemd from 'kill' accesses on the cap_userns Unknown.
DescriptionDescription of problem:
SELinux is preventing systemd from 'kill' accesses on the cap_userns Unknown.

***** Plugin catchall (100. confidence) suggests **************************

If you believe that systemd should be allowed kill access on the Unknown cap_userns by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'systemd' --raw | audit2allow -M my-systemd
# semodule -i my-systemd.pp

Additional Information:
Source Context system_u:system_r:init_t:s0
Target Context system_u:system_r:init_t:s0
Target Objects Unknown [ cap_userns ]
Source systemd
Source Path systemd
Port <Unknown>
Host (removed)
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.13.1-166.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 4.13.4-1.el7.elrepo.x86_64 #1 SMP
                              Wed Sep 27 13:32:23 EDT 2017 x86_64 x86_64
Alert Count 3
First Seen 2017-09-30 07:12:37 MDT
Last Seen 2017-09-30 07:12:37 MDT
Local ID d293f75d-b726-403c-bcf3-0452995f7b15

Raw Audit Messages
type=AVC msg=audit(1506777157.444:1042): avc: denied { kill } for pid=1 comm="systemd" capability=5 scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=cap_userns permissive=0


Hash: systemd,init_t,init_t,cap_userns,kill

Version-Release number of selected component:
selinux-policy-3.13.1-166.el7.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 4.13.4-1.el7.elrepo.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hash37f15940fab3055a8cedaf87dd0411475303c0b1d8763db8ba8b991c22ebb5dd
URL
Attached Files

-Relationships
+Relationships

-Notes

~0030549

JLambrecht (reporter)

Another user experienced a similar problem:

what is cap_userns = unknown ? rather disturbing

reporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 4.13.10-1.el7.elrepo.x86_64
package: selinux-policy-3.13.1-166.el7_4.5.noarch
reason: SELinux is preventing systemd from 'kill' accesses on the cap_userns Unknown.
reproducible: Not sure how to reproduce the problem
type: libreport
+Notes

-Issue History
Date Modified Username Field Change
2017-09-30 13:13 dcatkin New Issue
2017-11-09 10:08 JLambrecht Note Added: 0030549
+Issue History