Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 669577 Details for
Bug 889659
SELinux is preventing /usr/sbin/ldconfig to access Plex
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
SELinux details
file_889659.txt (text/plain), 4.51 KB, created by
Aleksander Zdyb
on 2012-12-27 12:31:21 UTC
(
hide
)
Description:
SELinux details
Filename:
MIME Type:
Creator:
Aleksander Zdyb
Created:
2012-12-27 12:31:21 UTC
Size:
4.51 KB
patch
obsolete
>SELinux is preventing /usr/sbin/ldconfig from read access on the file /var/lib/plexmediaserver/Library/Application Support/Plex Media Server/Plug-ins/Framework.bundle/Contents/Resources/Versions/2/Python/Framework/__init__.py. > >***** Plugin leaks (86.2 confidence) suggests ****************************** > >If you want to ignore ldconfig trying to read access the __init__.py file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/sbin/ldconfig /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests *************************** > >If you believe that ldconfig should be allowed read access on the __init__.py file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep ldconfig /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Additional Information: >Source Context system_u:system_r:ldconfig_t:s0 >Target Context system_u:object_r:var_lib_t:s0 >Target Objects /var/lib/plexmediaserver/Library/Application > Support/Plex Media Server/Plug-ins/Framework.bundl > e/Contents/Resources/Versions/2/Python/Framework/_ > _init__.py [ file ] >Source ldconfig >Source Path /usr/sbin/ldconfig >Port <Unknown> >Host senmova >Source RPM Packages glibc-2.15-58.fc17.x86_64 glibc-2.15-58.fc17.i686 >Target RPM Packages >Policy RPM selinux-policy-3.10.0-161.fc17.noarch >Selinux Enabled True >Policy Type targeted >Enforcing Mode Enforcing >Host Name senmova >Platform Linux senmova 3.6.10-2.psmouse.fc17.x86_64 #1 SMP > Sun Dec 16 17:46:50 CET 2012 x86_64 x86_64 >Alert Count 194 >First Seen 2012-12-19 17:53:38 CET >Last Seen 2012-12-27 12:49:15 CET >Local ID 2e483e10-60c7-41a0-b225-beb8669789fa > >Raw Audit Messages >type=AVC msg=audit(1356608955.751:910): avc: denied { read } for pid=5484 comm="ldconfig" path=2F7661722F6C69622F706C65786D656469617365727665722F4C6962726172792F4170706C69636174696F6E20537570706F72742F506C6578204D65646961205365727665722F506C75672D696E732F4672616D65776F726B2E62756E646C652F436F6E74656E74732F5265736F75726365732F56657273696F6E732F322F507974686F6E2F4672616D65776F726B2F5F5F696E69745F5F2E7079 dev="dm-1" ino=1708320 scontext=system_u:system_r:ldconfig_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file > > >type=AVC msg=audit(1356608955.751:910): avc: denied { read } for pid=5484 comm="ldconfig" path=2F7661722F6C69622F706C65786D656469617365727665722F4C6962726172792F4170706C69636174696F6E20537570706F72742F506C6578204D65646961205365727665722F506C75672D696E732F4672616D65776F726B2E62756E646C652F436F6E74656E74732F5265736F75726365732F56657273696F6E732F322F507974686F6E2F4672616D65776F726B2F6170692F5F5F696E69745F5F2E7079 dev="dm-1" ino=1708325 scontext=system_u:system_r:ldconfig_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file > > >type=AVC msg=audit(1356608955.751:910): avc: denied { read } for pid=5484 comm="ldconfig" path=2F7661722F6C69622F706C65786D656469617365727665722F4C6962726172792F4170706C69636174696F6E20537570706F72742F506C6578204D65646961205365727665722F506C75672D696E732F4672616D65776F726B2E62756E646C652F436F6E74656E74732F5265736F75726365732F56657273696F6E732F322F507974686F6E2F4672616D65776F726B2F6170692F7574696C6B69742E7079 dev="dm-1" ino=1708332 scontext=system_u:system_r:ldconfig_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file > > >type=SYSCALL msg=audit(1356608955.751:910): arch=x86_64 syscall=execve success=yes exit=0 a0=107ca00 a1=107d2b0 a2=107cad0 a3=18 items=0 ppid=5483 pid=5484 auid=4294967295 uid=991 gid=988 euid=991 suid=991 fsuid=991 egid=988 sgid=988 fsgid=988 tty=(none) ses=4294967295 comm=ldconfig exe=/usr/sbin/ldconfig subj=system_u:system_r:ldconfig_t:s0 key=(null) > >Hash: ldconfig,ldconfig_t,var_lib_t,file,read > >audit2allow > >#============= ldconfig_t ============== >allow ldconfig_t var_lib_t:file read; > >audit2allow -R > >#============= ldconfig_t ============== >allow ldconfig_t var_lib_t:file read;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 889659
: 669577