If you followed SELinux policy bugs being reported in bugzilla you might have noticed a spike in messages about random domains being denied DAC_READ_SEARCH.
Let's quickly look at what the DAC_READ_SEARCH capability is. In Linux the power of "root" was broken down into 64 distinct capabilities. Things like being able to load kernel modules or bind to ports less then 1024. Well DAC_READ_SEARCH is one of these.
DAC stands for Discretionary Access Control, which is what most people understand as standard Linux permissions, Every process has owner/group. All file system objects are assigned owner, group and permission flags. DAC_READ_SEARCH allows a privilege process to ignore parts of DAC for read and search.
* Bypass file read permission checks and directory read and execute permission checks;
There is another CAPABILITY called DAC_OVERRIDE
Bypass file read, write, and execute permission checks.
As you can see DAC_OVERRIDE is more powerful then DAC_READ_SEARCH, in that it can write and execute content ignoring DAC rules, as opposed to just reading the content.
Well why did we suddenly see a spike in confined domains needing DAC_READ_SEARCH?( Collapse )