Bug 704431

Summary: This bug was cloned from 698697 because 698697 was discovered in product Fedora whereas this problem was found in product Red Hat Enterprise Linux 6
Product: Red Hat Enterprise Linux 6 Reporter: Red Hat Case Diagnostics <case-diagnostics>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED NEXTRELEASE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: atodorov, dwalsh, mgrepl
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: setroubleshoot_trace_hash:2ab5ac511add39f9d56336a7864f02df17aad8f108fd3e5ed2565d029f8db35d
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-05-13 13:04:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 698697    
Bug Blocks:    

Description Red Hat Case Diagnostics 2011-05-13 06:23:53 UTC
+++ This bug was initially created as a clone of Bug 698697 +++


Resúmen:

¡Su sistema puede estar seriamente comprometido! /usr/sbin/wpa_supplicant
intentó cargar un módulo del kernel.

Descripción Detallada:

SELinux le ha negado a wpa_supplicant acceso para cargar un módulo del kernel.
Todos los programas confinados que necesiten cargar módulos del kernel deberían
tener políticas definidas que les permitan hacerlo. Si una aplicación vulnerada
intenta modificar el kernel, este AVC será generado. Este es un problema serio.
Su equipo puede estar comprometido

Permitiendo Acceso:

Contact your security administrator and report this issue.

Información Adicional:

Contexto Fuente               system_u:system_r:NetworkManager_t:s0-s0:c0.c1023
Contexto Destino              system_u:system_r:NetworkManager_t:s0-s0:c0.c1023
Objetos Destino               None [ capability ]
Fuente                        wpa_supplicant
Dirección de Fuente           /usr/sbin/wpa_supplicant
Puerto                        <Desconocido>
Nombre de Equipo              (eliminado)
Paquetes RPM Fuentes          wpa_supplicant-0.6.8-10.fc14
Paquetes RPM Destinos         
RPM de Políticas              selinux-policy-3.9.7-37.fc14
SELinux Activado              True
Tipo de Política              targeted
Modo Obediente                Enforcing
Nombre de Plugin              sys_module
Nombre de Equipo              (eliminado)
Plataforma                    Linux (eliminado)
                              2.6.35.12-88.fc14.i686.PAE #1 SMP Thu Mar 31
                              21:54:35 UTC 2011 i686 i686
Cantidad de Alertas           2
Visto por Primera Vez         dom 17 abr 2011 16:58:52 MDT
Visto por Última Vez          dom 17 abr 2011 16:58:52 MDT
ID Local                      ef8dc87a-d214-413c-a585-d1f1de8d3efe
Números de Línea              

Mensajes de Auditoría Crudos  

node=(eliminado) type=AVC msg=audit(1303081132.424:10): avc:  denied  { sys_module } for  pid=1388 comm="wpa_supplicant" capability=16  scontext=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 tcontext=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 tclass=capability

node=(eliminado) type=SYSCALL msg=audit(1303081132.424:10): arch=40000003 syscall=54 success=no exit=-19 a0=b a1=8933 a2=bfbf735c a3=b items=0 ppid=1 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="wpa_supplicant" exe="/usr/sbin/wpa_supplicant" subj=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  sys_module,wpa_supplicant,NetworkManager_t,NetworkManager_t,capability,sys_module
audit2allow suggests:

#============= NetworkManager_t ==============
allow NetworkManager_t self:capability sys_module;

--- Additional comment from mgrepl onThu Apr 21 14:42:05 EDT 2011 ---
Fixed in selinux-policy-3.9.7-40.fc14

--- Additional comment from updates onThu Apr 21 14:50:59 EDT 2011 ---
selinux-policy-3.9.7-40.fc14 has been submitted as an update for Fedora 14.
https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-40.fc14

--- Additional comment from updates onThu Apr 21 22:26:36 EDT 2011 ---
Package selinux-policy-3.9.7-40.fc14:
* should fix your issue,
* was pushed to the Fedora 14 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.7-40.fc14'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-40.fc14
then log in and leave karma (feedback).

--- Additional comment from updates onSun Apr 24 23:59:43 EDT 2011 ---
selinux-policy-3.9.7-40.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Miroslav Grepl 2011-05-13 12:55:53 UTC
*** Bug 704090 has been marked as a duplicate of this bug. ***

Comment 5 Miroslav Grepl 2011-05-13 13:04:16 UTC
This has been fixed in RHEL6.1 policy.