-
Bug
-
Resolution: Duplicate
-
Normal
-
None
-
6.18.0
-
False
-
Moderate
-
sat-proton
-
None
-
None
-
None
-
None
Environment:
Red Hat Satellite 6.18.0 ( stream 106 )
Steps:
- install satellite
- Have some hosts connected with it
- Insights --> Inventory Upload --> Expand the Organization and then click on "Generate and Upload report"
- Monitor /var/log/messages or audit.log
Results:
- The task successfully completed
- But several selinux errors w.r.t tar command used to generate the archive
==> /var/log/messages <== Jun 18 20:37:46 satellite618 SetroubleshootPrivileged.py[36232]: failed to retrieve rpm info for path '/var/lib/selinux/targeted/active/modules/400/foreman': Jun 18 20:37:46 satellite618 setroubleshoot[36217]: SELinux is preventing /usr/bin/tar from read access on the directory userdb. For complete SELinux messages run: sealert -l 38886a8e-b77c-440a-be6c-609eba9e432b Jun 18 20:37:46 satellite618 setroubleshoot[36217]: SELinux is preventing /usr/bin/tar from read access on the directory userdb.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that tar should be allowed read access on the userdb directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'tar' --raw | audit2allow -M my-tar#012# semodule -X 300 -i my-tar.pp#012 Jun 18 20:37:46 satellite618 setroubleshoot[36217]: SELinux is preventing /usr/bin/tar from read access on the directory userdb. For complete SELinux messages run: sealert -l 38886a8e-b77c-440a-be6c-609eba9e432b Jun 18 20:37:46 satellite618 setroubleshoot[36217]: SELinux is preventing /usr/bin/tar from read access on the directory userdb.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that tar should be allowed read access on the userdb directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'tar' --raw | audit2allow -M my-tar#012# semodule -X 300 -i my-tar.pp#012 ==> /var/log/audit/audit.log type=AVC msg=audit(1750259266.122:3468): avc: denied { read } for pid=36214 comm="tar" name="userdb" dev="tmpfs" ino=40 scontext=system_u:system_r:foreman_rails_t:s0 tcontext=system_u:object_r:systemd_userdbd_runtime_t:s0 tclass=dir permissive=0 type=AVC msg=audit(1750259266.122:3469): avc: denied { read } for pid=36214 comm="tar" name="userdb" dev="tmpfs" ino=40 scontext=system_u:system_r:foreman_rails_t:s0 tcontext=system_u:object_r:systemd_userdbd_runtime_t:s0 tclass=dir permissive=0
Expected Results:
No such selinux denials
- duplicates
-
SAT-35340 SELinux Error for Foreman User, systemd_userdbd_runtime_t context, userdb, tar command
-
- New
-