Bug 704827

Summary: SELinux is preventing /usr/libexec/colord from using the 'dac_override' capabilities.
Product: [Fedora] Fedora Reporter: Nicolas Mailhot <nicolas.mailhot>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: rawhideCC: dwalsh, jiker, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:2064399ff19d5569f798f2f24fe13df261f8da793ad436c592afe34326320c46
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-11-21 16:41:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Nicolas Mailhot 2011-05-15 10:47:36 UTC
SELinux is preventing /usr/libexec/colord from using the 'dac_override' capabilities.

*****  Plugin dac_override (91.4 confidence) suggests  ***********************

If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system
Then turn on full auditing to get path information about the offending file and generate the error again.
Do

Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it, 
otherwise report as a bugzilla.

*****  Plugin catchall (9.59 confidence) suggests  ***************************

If you believe that colord should have the dac_override capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep colord /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Objects                Unknown [ capability ]
Source                        colord
Source Path                   /usr/libexec/colord
Port                          <Inconnu>
Host                          (removed)
Source RPM Packages           colord-0.1.7-1.fc16
Target RPM Packages           
Policy RPM                    selinux-policy-3.9.16-23.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 2.6.39-0.rc7.git6.1.fc16.x86_64 #1
                              SMP Sat May 14 16:32:45 UTC 2011 x86_64 x86_64
Alert Count                   8
First Seen                    sam. 07 mai 2011 13:41:56 CEST
Last Seen                     dim. 15 mai 2011 12:45:48 CEST
Local ID                      1ef33176-1a8c-4cc2-915c-d16ab5f1fc48

Raw Audit Messages
type=AVC msg=audit(1305456348.805:88): avc:  denied  { dac_override } for  pid=1380 comm="colord" capability=1  scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tclass=capability


type=SYSCALL msg=audit(1305456348.805:88): arch=x86_64 syscall=open success=yes exit=EEXIST a0=cf6420 a1=0 a2=1b6 a3=0 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=colord exe=/usr/libexec/colord subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null)

Hash: colord,colord_t,colord_t,capability,dac_override

audit2allow

#============= colord_t ==============
allow colord_t self:capability dac_override;

audit2allow -R

#============= colord_t ==============
allow colord_t self:capability dac_override;

Comment 1 Miroslav Grepl 2011-05-16 05:54:34 UTC
Did you read the alert?

*****  Plugin dac_override (91.4 confidence) suggests  ***********************

If you want to help identify if domain needs this access or you have a file
with the wrong permissions on your system
Then turn on full auditing to get path information about the offending file and
generate the error again.
Do

Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it, 
otherwise report as a bugzilla.

Comment 2 Miroslav Grepl 2011-10-10 13:44:36 UTC
*** Bug 744617 has been marked as a duplicate of this bug. ***