Skip to content

Allow xdm_t create user namespaces #2807

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: rawhide
Choose a base branch
from

Conversation

zpytela
Copy link
Contributor

@zpytela zpytela commented Aug 1, 2025

Required with the update of gdk-pixbuf2 using a new pixbuf loaders provided by glycin which are sandboxed.

The commit addresses the following AVC denial:

type=PROCTITLE msg=audit(07/16/2025 06:40:32.057:1066) : proctitle=bwrap --unshare-all --die-with-parent --chdir / --ro-bind /usr /usr --dev /dev --ro-bind-try /etc/ld.so.cache /etc/ld.so.cache -
type=SYSCALL msg=audit(07/16/2025 06:40:32.057:1066) : arch=x86_64 syscall=clone success=no exit=EACCES(Permission denied) a0=0x7e020011 a1=0x0 a2=CLONE_VM|CLONE_SIGHAND|CLONE_VFORK|CLONE_PARENT|CLONE_NEWNS|CLONE_SYSVSEM|CLONE_UNTRACED|CLONE_CHILD_SETTID|CLONE_NEWUTS a3=0x0 items=0 ppid=3561 pid=4135 auid=unset uid=gdm gid=gdm euid=gdm suid=gdm fsuid=gdm egid=gdm sgid=gdm fsgid=gdm tty=tty1 ses=unset comm=bwrap exe=/usr/bin/bwrap subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(07/16/2025 06:40:32.057:1066) : avc: denied { create } for pid=4135 comm=bwrap scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=user_namespace permissive=0

Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=2380069

Required with the update of gdk-pixbuf2 using a new pixbuf loaders
provided by glycin which are sandboxed.

The commit addresses the following AVC denial:

type=PROCTITLE msg=audit(07/16/2025 06:40:32.057:1066) : proctitle=bwrap --unshare-all --die-with-parent --chdir / --ro-bind /usr /usr --dev /dev --ro-bind-try /etc/ld.so.cache /etc/ld.so.cache -
type=SYSCALL msg=audit(07/16/2025 06:40:32.057:1066) : arch=x86_64 syscall=clone success=no exit=EACCES(Permission denied) a0=0x7e020011 a1=0x0 a2=CLONE_VM|CLONE_SIGHAND|CLONE_VFORK|CLONE_PARENT|CLONE_NEWNS|CLONE_SYSVSEM|CLONE_UNTRACED|CLONE_CHILD_SETTID|CLONE_NEWUTS a3=0x0 items=0 ppid=3561 pid=4135 auid=unset uid=gdm gid=gdm euid=gdm suid=gdm fsuid=gdm egid=gdm sgid=gdm fsgid=gdm tty=tty1 ses=unset comm=bwrap exe=/usr/bin/bwrap subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(07/16/2025 06:40:32.057:1066) : avc:  denied  { create } for  pid=4135 comm=bwrap scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=user_namespace permissive=0

Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=2380069
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant