| Summary: | SELinux is preventing /usr/bin/nspluginscan from using the 'dac_override' capabilities. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | haim <linux_os> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED WONTFIX | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 19 | CC: | dominick.grift, dwalsh, lvrabec, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:f64a0e2659f14cbb53938e6d88ae6205d8fabca0c0745f5125821e3e500ef8d4 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2013-12-11 21:33:37 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Running firefox as root is not supported and is very dangerous. Please run firefox as a non root user. |
Description of problem: SELinux is preventing /usr/bin/nspluginscan from using the 'dac_override' capabilities. ***** Plugin mozplugger (87.7 confidence) suggests ************************* If you want to use the plugin package Then you must turn off SELinux controls on the Firefox plugins. Do # setsebool -P unconfined_mozilla_plugin_transition 0 ***** Plugin dac_override (12.1 confidence) suggests *********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (1.66 confidence) suggests *************************** If you believe that nspluginscan should have the dac_override capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep nspluginscan /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Objects [ capability ] Source nspluginscan Source Path /usr/bin/nspluginscan Port <Unknown> Host (removed) Source RPM Packages kde-baseapps-4.11.2-1.fc19.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-74.9.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.11.4-201.fc19.x86_64 #1 SMP Thu Oct 10 14:11:18 UTC 2013 x86_64 x86_64 Alert Count 63 First Seen 2013-10-04 13:08:49 IDT Last Seen 2013-10-16 15:50:20 IDT Local ID 01d6b5a0-2b40-4abe-abf0-fb10161730bc Raw Audit Messages type=AVC msg=audit(1381927820.47:473): avc: denied { dac_override } for pid=1871 comm="nspluginscan" capability=1 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1381927820.47:473): arch=x86_64 syscall=access success=no exit=EACCES a0=102d278 a1=2 a2=200 a3=1 items=0 ppid=1577 pid=1871 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm=nspluginscan exe=/usr/bin/nspluginscan subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) Hash: nspluginscan,mozilla_plugin_t,mozilla_plugin_t,capability,dac_override Additional info: reporter: libreport-2.1.9 hashmarkername: setroubleshoot kernel: 3.11.10-200.fc19.x86_64 type: libreport