Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 614179 Details for
Bug 858523
SELinux is preventing /usr/sbin/pwconv from 'write' accesses on the file /tmp/ffijq61m4 (deleted).
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: description
description (text/plain), 3.65 KB, created by
Mikhail
on 2012-09-19 02:36:22 UTC
(
hide
)
Description:
File: description
Filename:
MIME Type:
Creator:
Mikhail
Created:
2012-09-19 02:36:22 UTC
Size:
3.65 KB
patch
obsolete
>SELinux is preventing /usr/sbin/pwconv from 'write' accesses on the file /tmp/ffijq61m4 (deleted). > >***** Plugin leaks (86.2 confidence) suggests ****************************** > >If you want to ignore pwconv trying to write access the ffijq61m4 (deleted) file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/sbin/pwconv /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests *************************** > >If you believe that pwconv should be allowed write access on the ffijq61m4 (deleted) file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep pwconv /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Additional Information: >Source Context unconfined_u:unconfined_r:sysadm_passwd_t:s0-s0:c0 > .c1023 >Target Context unconfined_u:object_r:user_tmp_t:s0 >Target Objects /tmp/ffijq61m4 (deleted) [ file ] >Source pwconv >Source Path /usr/sbin/pwconv >Port <Unknown> >Host (removed) >Source RPM Packages shadow-utils-4.1.5-5.fc18.i686 >Target RPM Packages >Policy RPM selinux-policy-3.11.1-18.fc18.noarch >Selinux Enabled True >Policy Type targeted >Enforcing Mode Permissive >Host Name (removed) >Platform Linux (removed) 3.6.0-0.rc2.git2.1.fc18.i686 #1 > SMP Wed Aug 22 12:22:10 UTC 2012 i686 i686 >Alert Count 1 >First Seen 2012-09-19 05:34:50 EDT >Last Seen 2012-09-19 05:34:50 EDT >Local ID 67cbf58f-dcf7-4f94-a2e9-49fe5984a420 > >Raw Audit Messages >type=AVC msg=audit(1348047290.836:328): avc: denied { write } for pid=10912 comm="pwconv" path=2F746D702F6666696A7136316D34202864656C6574656429 dev="tmpfs" ino=29126 scontext=unconfined_u:unconfined_r:sysadm_passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file > > >type=AVC msg=audit(1348047290.836:328): avc: denied { read } for pid=10912 comm="pwconv" path="/proc/2070/mounts" dev="proc" ino=28706 scontext=unconfined_u:unconfined_r:sysadm_passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file > > >type=AVC msg=audit(1348047290.836:328): avc: denied { read write } for pid=10912 comm="pwconv" path="/dev/mapper/control" dev="devtmpfs" ino=1190 scontext=unconfined_u:unconfined_r:sysadm_passwd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file > > >type=SYSCALL msg=audit(1348047290.836:328): arch=i386 syscall=execve success=yes exit=0 a0=9b99258 a1=9b993f0 a2=9b992d8 a3=9b993f0 items=0 ppid=10901 pid=10912 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm=pwconv exe=/usr/sbin/pwconv subj=unconfined_u:unconfined_r:sysadm_passwd_t:s0-s0:c0.c1023 key=(null) > >Hash: pwconv,sysadm_passwd_t,user_tmp_t,file,write > >audit2allow > >#============= sysadm_passwd_t ============== >allow sysadm_passwd_t lvm_control_t:chr_file { read write }; >allow sysadm_passwd_t unconfined_t:file read; >allow sysadm_passwd_t user_tmp_t:file write; > >audit2allow -R > >#============= sysadm_passwd_t ============== >allow sysadm_passwd_t lvm_control_t:chr_file { read write }; >allow sysadm_passwd_t unconfined_t:file read; >allow sysadm_passwd_t user_tmp_t:file write; >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 858523
:
614177
|
614178
| 614179