Bug 671226

Summary: SELinux is preventing /usr/bin/pinentry-qt4 "read" access on cache-laptop2.sawyernet.
Product: [Fedora] Fedora Reporter: Walt <waltsaw>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 13CC: dwalsh, mgrepl, waltsaw
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:aa07625c292b3cc7186b5b06a5b693d864dc38c05601cc1b64e1f4461b7e4b27
Fixed In Version: selinux-policy-3.7.19-89.fc13 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-03-17 18:49:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Walt 2011-01-20 19:12:45 UTC
Summary:

SELinux is preventing /usr/bin/pinentry-qt4 "read" access on
cache-(removed).

Detailed Description:

SELinux denied access requested by pinentry-qt. It is not expected that this
access is required by pinentry-qt and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Additional Information:

Source Context                user_u:user_r:gpg_pinentry_t:s0
Target Context                unconfined_u:object_r:user_home_t:s0
Target Objects                cache-(removed) [ lnk_file ]
Source                        pinentry-qt
Source Path                   /usr/bin/pinentry-qt4
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           pinentry-qt-0.8.0-3.fc13
Target RPM Packages           
Policy RPM                    selinux-policy-3.7.19-76.fc13
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     (removed)
Platform                      Linux (removed) 2.6.34.7-66.fc13.i686 #1
                              SMP Wed Dec 15 07:40:25 UTC 2010 i686 i686
Alert Count                   756
First Seen                    Tue 04 Jan 2011 07:20:25 AM EST
Last Seen                     Tue 18 Jan 2011 10:04:00 PM EST
Local ID                      1a272d45-0b94-49a8-bb9a-8cf723583bb4
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1295406240.951:121531): avc:  denied  { read } for  pid=32491 comm="pinentry-qt" name="cache-(removed)" dev=dm-0 ino=400021 scontext=user_u:user_r:gpg_pinentry_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file

node=(removed) type=SYSCALL msg=audit(1295406240.951:121531): arch=40000003 syscall=33 success=no exit=-13 a0=9875388 a1=2 a2=76af12c a3=bfc43978 items=0 ppid=5015 pid=32491 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="pinentry-qt" exe="/usr/bin/pinentry-qt4" subj=user_u:user_r:gpg_pinentry_t:s0 key=(null)



Hash String generated from  catchall,pinentry-qt,gpg_pinentry_t,user_home_t,lnk_file,read
audit2allow suggests:

#============= gpg_pinentry_t ==============
allow gpg_pinentry_t user_home_t:lnk_file read;

Comment 1 Daniel Walsh 2011-01-20 20:09:11 UTC
Miroslav I thinnk we need to add this label.

HOME_DIR/\.kde(/.*)?	gen_context(system_u:object_r:config_home_t,s0)

Then allow gpg_pinentry to read this label.

Comment 2 Daniel Walsh 2011-01-20 20:10:44 UTC
optional_policy(`
	gnome_read_home_config(gpg_pinentry_t)
')


Also add

	read_lnk_files_pattern($1, config_home_t, config_home_t)


To gnome_read_home_config

Comment 3 Daniel Walsh 2011-01-20 20:11:13 UTC
*** Bug 671225 has been marked as a duplicate of this bug. ***

Comment 4 Miroslav Grepl 2011-01-27 14:00:36 UTC
Fixed in selinux-policy-3.7.19-87.fc13

Comment 5 Fedora Update System 2011-02-04 10:31:50 UTC
selinux-policy-3.7.19-89.fc13 has been submitted as an update for Fedora 13.
https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13

Comment 6 Fedora Update System 2011-02-04 19:48:55 UTC
selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13

Comment 7 Fedora Update System 2011-03-17 18:48:36 UTC
selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.