On 08/21/2018 12:27 PM, Nataraj wrote:
I have a web application which uses sudo to invoke python scripts as the
user under which the application runs (NO root access). Is there any
reason why sudo would would require sys_ptrace access for this? I only
get this violation intermittenly, and not with every call to sudo.
Here's the violation:
Most likely you can just dontaudit this access. sys_ptrace is often
caused by processes trying to read content in /proc.
Summary:
SELinux is preventing sudo (httpd_t) "sys_ptrace" to <Unknown> (httpd_t).
Detailed Description:
SELinux denied access requested by sudo. It is not expected that this access is
required by sudo and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.
Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context system_u:system_r:httpd_t
Target Context system_u:system_r:httpd_t
Target Objects None [ capability ]
Source sudo
Source Path /usr/bin/sudo
Port <Unknown>
Host myhost.mydomain.com
Source RPM Packages sudo-1.7.2p1-29.el5_10
Target RPM Packages
Policy RPM selinux-policy-2.4.6-351.el5
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall
Host Name myhost.mydomain.com
Platform Linux myhost.mydomain.com 2.6.18-419.el5 #1 SMP Fri Feb
24 22:06:09 UTC 2017 i686 i686
Alert Count 359
First Seen Tue Oct 8 09:24:50 2013
Last Seen Tue Aug 21 10:26:26 2018
Local ID 717eb9a4-cc7f-4ed1-b638-5db1a841abe4
Line Numbers
Raw Audit Messages
host=myhost.mydomain.com type=AVC msg=audit(1534872386.726:9642): avc: denied { sys_ptrace } for pid=8458 comm="sudo" capability=19 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability
host=myhost.mydomain.com type=SYSCALL msg=audit(1534872386.726:9642): arch=40000003 syscall=3 success=yes exit=166 a0=1a a1=b7ff4000 a2=400 a3=89cabf0 items=0 ppid=8979 pid=8458 auid=4294967295 uid=48 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) ses=4294967295 comm="sudo" exe="/usr/bin/sudo" subj=system_u:system_r:httpd_t:s0 key=(null)
Thank You,
Nataraj
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos