Bug 581640

Summary: SELinux is preventing /usr/bin/mono from executing /usr/share/system-config-services/gui.py.
Product: [Fedora] Fedora Reporter: Carl G. <carlg>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 12CC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.6.32-113.fc12 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-05-03 16:09:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Carl G. 2010-04-12 20:31:56 UTC
Résumé:

SELinux is preventing /usr/bin/mono from executing
/usr/share/system-config-services/gui.py.

Description détaillée:

SELinux has denied the gnome-do from executing
/usr/share/system-config-services/gui.py. If gnome-do is supposed to be able to
execute /usr/share/system-config-services/gui.py, this could be a labeling
problem. Most confined domains are allowed to execute files labeled bin_t. So
you could change the labeling on this file to bin_t and retry the application.
If this gnome-do is not supposed to execute
/usr/share/system-config-services/gui.py, this could signal an intrusion
attempt.

Autoriser l'accès:

If you want to allow gnome-do to execute
/usr/share/system-config-services/gui.py: chcon -t bin_t
'/usr/share/system-config-services/gui.py' If this fix works, please update the
file context on disk, with the following command: semanage fcontext -a -t bin_t
'/usr/share/system-config-services/gui.py' Please specify the full path to the
executable, Please file a bug report to make sure this becomes the default
labeling.

Informations complémentaires:

Contexte source               staff_u:staff_r:staff_mono_t:s0-s0:c0.c1023
Contexte cible                system_u:object_r:usr_t:s0
Objets du contexte            /usr/share/system-config-services/gui.py [ file ]
source                        gnome-do
Chemin de la source           /usr/bin/mono
Port                          <Inconnu>
Hôte                         (removed)
Paquetages RPM source         mono-core-2.4.3.1-1.fc12
Paquetages RPM cible          system-config-services-0.99.43-1.fc12
Politique RPM                 selinux-policy-3.6.32-108.fc12
Selinux activé               True
Type de politique             targeted
Mode strict                   Enforcing
Nom du plugin                 execute
Nom de l'hôte                (removed)
Plateforme                    Linux BubbleWork.BubbleNet
                              2.6.32.11-99.fc12.x86_64 #1 SMP Mon Apr 5 19:59:38
                              UTC 2010 x86_64 x86_64
Compteur d'alertes            1
Première alerte              lun 12 avr 2010 16:21:33 EDT
Dernière alerte              lun 12 avr 2010 16:21:33 EDT
ID local                      035e849c-8b5c-4596-8c74-cdb29371141c
Numéros des lignes           

Messages d'audit bruts        

node=BubbleWork.BubbleNet type=AVC msg=audit(1271103693.924:194): avc:  denied  { execute } for  pid=2342 comm="gnome-do" name="gui.py" dev=dm-2 ino=1181784 scontext=staff_u:staff_r:staff_mono_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file

node=BubbleWork.BubbleNet type=SYSCALL msg=audit(1271103693.924:194): arch=c000003e syscall=21 success=no exit=-13 a0=7f0e384f3430 a1=1 a2=7f0e3db602e0 a3=1 items=0 ppid=2235 pid=2342 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm="gnome-do" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_mono_t:s0-s0:c0.c1023 key=(null)

I'm getting this AVC after booting my PC.

Comment 1 Daniel Walsh 2010-04-13 13:58:09 UTC
/usr/share/system-config-services/gui\.py -- gen_context(system_u:object_r:bin_t,s0)

Comment 2 Miroslav Grepl 2010-04-16 07:19:57 UTC
Fixed in selinux-policy-3.6.32-112.fc12

Comment 3 Fedora Update System 2010-04-23 12:44:40 UTC
selinux-policy-3.6.32-113.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-113.fc12

Comment 4 Fedora Update System 2010-04-27 02:23:18 UTC
selinux-policy-3.6.32-113.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-113.fc12

Comment 5 Fedora Update System 2010-05-03 16:07:17 UTC
selinux-policy-3.6.32-113.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.