Bug 563027

Summary: SELinux is preventing consoletype (consoletype_t) "read write" pppd_t.
Product: [Fedora] Fedora Reporter: kg <gopsykg>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: low    
Version: 12CC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:edfb7ac3946172572d376d2ce0a01df0e90dc14158c64925956b6cb1d2abb8fe
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-02-09 13:17:26 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description kg 2010-02-09 02:05:20 UTC
Summary:

SELinux is preventing consoletype (consoletype_t) "read write" pppd_t.

Detailed Description:

[consoletype has a permissive type (consoletype_t). This access was not denied.]

SELinux denied access requested by consoletype. It is not expected that this
access is required by consoletype and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context                system_u:system_r:consoletype_t:s0
Target Context                system_u:system_r:pppd_t:s0
Target Objects                socket [ packet_socket ]
Source                        consoletype
Source Path                   /sbin/consoletype
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           initscripts-8.95-1
Target RPM Packages           
Policy RPM                    selinux-policy-3.6.12-39.fc11
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     (removed)
Platform                      Linux (removed) 2.6.29.4-167.fc11.i686.PAE #1 SMP
                              Wed May 27 17:28:22 EDT 2009 i686 i686
Alert Count                   5
First Seen                    Fri 13 Nov 2009 11:40:07 AM IST
Last Seen                     Tue 26 Jan 2010 06:59:04 PM IST
Local ID                      96a286cb-620c-45af-b9f1-80ca94565291
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1264512544.473:18): avc:  denied  { read write } for  pid=2558 comm="consoletype" path="socket:[17770]" dev=sockfs ino=17770 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:system_r:pppd_t:s0 tclass=packet_socket

node=(removed) type=SYSCALL msg=audit(1264512544.473:18): arch=40000003 syscall=11 success=yes exit=0 a0=98a7488 a1=98a74e8 a2=98a7168 a3=98a74e8 items=0 ppid=2557 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null)



Hash String generated from  selinux-policy-3.6.12-39.fc11,catchall,consoletype,consoletype_t,pppd_t,packet_socket,read,write
audit2allow suggests:

#============= consoletype_t ==============
allow consoletype_t pppd_t:packet_socket { read write };

Comment 1 Daniel Walsh 2010-02-09 13:17:26 UTC

*** This bug has been marked as a duplicate of bug 538428 ***