View Issue Details

IDProjectCategoryView StatusLast Update
0016261CentOS-7selinux-policypublic2019-07-11 14:54
Reportercristiangirlea 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0016261: SELinux is preventing /usr/libexec/snapd/snapd from 'write' accesses on the directory dconf.
DescriptionDescription of problem:
removed with snap
SELinux is preventing /usr/libexec/snapd/snapd from 'write' accesses on the directory dconf.

***** Plugin catchall (100. confidence) suggests **************************

If you believe that snapd should be allowed write access on the dconf directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'snapd' --raw | audit2allow -M my-snapd
# semodule -i my-snapd.pp

Additional Information:
Source Context system_u:system_r:snappy_t:s0
Target Context unconfined_u:object_r:config_home_t:s0
Target Objects dconf [ dir ]
Source snapd
Source Path /usr/libexec/snapd/snapd
Port <Unknown>
Host (removed)
Source RPM Packages snapd-2.39.2-1.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.13.1-229.el7_6.12.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 3.10.0-957.el7.x86_64 #1 SMP Thu
                              Nov 8 23:39:32 UTC 2018 x86_64 x86_64
Alert Count 1
First Seen 2019-07-11 17:51:52 EEST
Last Seen 2019-07-11 17:51:52 EEST
Local ID 79b2edc9-5441-421a-bf11-7709fca4085a

Raw Audit Messages
type=AVC msg=audit(1562856712.628:4460): avc: denied { write } for pid=8269 comm="snapd" name="dconf" dev="tmpfs" ino=155355 scontext=system_u:system_r:snappy_t:s0 tcontext=unconfined_u:object_r:config_home_t:s0 tclass=dir permissive=1


type=AVC msg=audit(1562856712.628:4460): avc: denied { remove_name } for pid=8269 comm="snapd" name="user" dev="tmpfs" ino=155356 scontext=system_u:system_r:snappy_t:s0 tcontext=unconfined_u:object_r:config_home_t:s0 tclass=dir permissive=1


type=SYSCALL msg=audit(1562856712.628:4460): arch=x86_64 syscall=unlinkat success=yes exit=0 a0=ffffffffffffff9c a1=c0005d5080 a2=0 a3=0 items=0 ppid=1 pid=8269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=snapd exe=/usr/libexec/snapd/snapd subj=system_u:system_r:snappy_t:s0 key=(null)

Hash: snapd,snappy_t,config_home_t,dir,write

Version-Release number of selected component:
selinux-policy-3.13.1-229.el7_6.12.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 3.10.0-957.el7.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hash5bc0e1926afbb29497b5e1688534fd6e8d2836ef49e5faeff17039dd2d59d04c
URL

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2019-07-11 14:54 cristiangirlea New Issue