Bug 720077

Summary: SELinux is preventing /usr/sbin/asterisk from read access on the chr_file random
Product: [Fedora] Fedora Reporter: Anthony Messina <amessina>
Component: selinux-policy-targetedAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Ben Levenson <benl>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: dwalsh
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: selinux-policy-3.9.16-35.fc15 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-02 02:04:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Anthony Messina 2011-07-09 01:55:24 UTC
It appears that configuring asterisk (1.8.4.4) to use TLS in sip.conf will require access to the random device:


Raw Audit Messages
type=AVC msg=audit(1310084681.831:51): avc:  denied  { read } for  pid=2833 comm="asterisk" name="random" dev=devtmpfs ino=4352 scontext=system_u:system_r:asterisk_t:s0 tcontext=system_u:object_r:random_device_t:s0 tclass=chr_file


type=SYSCALL msg=audit(1310084681.831:51): arch=x86_64 syscall=access success=yes exit=0 a0=3128c66144 a1=4 a2=0 a3=0 items=0 ppid=1 pid=2833 auid=4294967295 uid=494 gid=493 euid=494 suid=494 fsuid=494 egid=493 sgid=493 fsgid=493 tty=(none) ses=4294967295 comm=asterisk exe=/usr/sbin/asterisk subj=system_u:system_r:asterisk_t:s0 key=(null)

Hash: asterisk,asterisk_t,random_device_t,chr_file,read

audit2allow

#============= asterisk_t ==============
allow asterisk_t random_device_t:chr_file read;

audit2allow -R

#============= asterisk_t ==============
allow asterisk_t random_device_t:chr_file read;

Comment 1 Miroslav Grepl 2011-07-11 14:12:47 UTC
Fixed in selinux-policy-3.9.16-33.fc15

Comment 2 Anthony Messina 2011-07-12 06:07:51 UTC
I confirm the fix with the following from Koji:
selinux-policy-3.9.16-33.fc15.noarch.rpm
selinux-policy-targeted-3.9.16-33.fc15.noarch.rpm


Thank you.

Comment 3 Fedora Update System 2011-07-21 06:01:46 UTC
selinux-policy-3.9.16-35.fc15 has been submitted as an update for Fedora 15.
https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-35.fc15

Comment 4 Fedora Update System 2011-07-23 01:54:59 UTC
Package selinux-policy-3.9.16-35.fc15:
* should fix your issue,
* was pushed to the Fedora 15 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-35.fc15'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-35.fc15
then log in and leave karma (feedback).

Comment 5 Fedora Update System 2011-08-02 02:03:27 UTC
selinux-policy-3.9.16-35.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.