SELinux is preventing pyzor from getattr access on the file /usr/bin/rpm
Daniel J Walsh
dwalsh at redhat.com
Mon Sep 7 11:44:48 UTC 2015
On 09/03/2015 12:29 PM, Tom Rivers wrote:
> On 9/2/2015 17:25, Jason L Tibbitts III wrote
>> TR> If that is the case, then my question is this: why is SELinux
>> TR> blaming pyzor for something abrt is doing?
>>
>> Because it all happens in the context of the script. abrt basically
>> hooks into the backtrace generation logic and runs some extra code.
>> This doesn't happen in a separate process.
>
> It's the whole "abrt basically hooks into the backtrace generation
> logic" thing that I find particularly interesting. Your explanation
> makes it sound as if a separate program is able to gain access to an
> existing process and hide its true identity. I must be
> misunderstanding the nuts and bolts of this because malware does the
> exact same thing.
>
> It makes sense to me that if a running process invokes an external
> program then that request will be under the context of the running
> process because it is what is making the request. However, a program
> that has the ability to take on the guise of some other process and
> make a request under a context that is not its own means it can hide.
> I don't see how that is a good thing especially with respect to
> programs like SELinux who must be able to clearly identify who is
> doing what in order to perform its role effectively.
>
>
> Tom
> --
> selinux mailing list
> selinux at lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/selinux
SELinux does will not prevent a process with the proper rights from
taking over another policy. unconfined_t or kernel_t are both allowed
to do pretty much anything they want from an SELinux point of view. A
confined process would obviously be blocked from doing this.
More information about the selinux
mailing list