Bug 676742

Summary: SELinux is preventing the modification of the running policy.
Product: Red Hat Enterprise Linux 6 Reporter: Red Hat Case Diagnostics <case-diagnostics>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED NOTABUG QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: cww, dwalsh, jwest
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: setroubleshoot_trace_hash:4d1879e0881effd04bf9a80b85db1761b59117f0b85f9047484f0ed6599447d8
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-10 10:15:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Red Hat Case Diagnostics 2011-02-11 00:34:10 UTC
Summary:

SELinux is preventing the modification of the running policy.

Detailed Description:

SELinux has denied the management tools from modifying the way the SELinux
policy runs. This machine is hardened, so if you did not run any SELinux tools,
this probably signals an intrusion.

Allowing Access:

If you want to modify the way SELinux is running on your machine you need to
bring the machine to single user mode with enforcing turned off. The turn off
the secure_mode_policyload boolean: "setsebool -P secure_mode_policyload=0".

Additional Information:

Source Context                unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1
                              023
Target Context                system_u:object_r:security_t:s0
Target Objects                None [ security ]
Source                        /usr/share/syst
Source Path                   /usr/bin/python
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           python-2.6.5-3.el6
Target RPM Packages           
Policy RPM                    selinux-policy-3.7.19-54.el6_0.3
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   secure_mode_policyload
Host Name                     (removed)
Platform                      Linux (removed) 2.6.32-71.14.1.el6.x86_64 #1 SMP
                              Wed Jan 5 17:01:01 EST 2011 x86_64 x86_64
Alert Count                   1
First Seen                    Thu 10 Feb 2011 06:27:59 PM CST
Last Seen                     Thu 10 Feb 2011 06:27:59 PM CST
Local ID                      1a1fac17-89d9-4810-a7ce-e492f4bb856a
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1297384079.729:25291): avc:  denied  { setenforce } for  pid=2552 comm="/usr/share/syst" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security

node=(removed) type=SYSCALL msg=audit(1297384079.729:25291): arch=c000003e syscall=1 success=no exit=-13 a0=10 a1=7fff19baf4d0 a2=1 a3=fffffff8 items=0 ppid=2545 pid=2552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="/usr/share/syst" exe="/usr/bin/python" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  secure_mode_policyload,/usr/share/syst,unconfined_t,security_t,security,setenforce
audit2allow suggests:

#============= unconfined_t ==============
#!!!! This avc can be allowed using the boolean 'secure_mode_policyload'

allow unconfined_t security_t:security setenforce;

Comment 3 Daniel Walsh 2011-02-11 16:10:31 UTC
Did you turn on the secure_mode_policyload boolean?