| Summary: | SELinux is preventing /usr/bin/abrt-dump-oops (deleted) from using the 'dac_override' capabilities. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Nicolas Mailhot <nicolas.mailhot> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | rawhide | CC: | dominick.grift, dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:ad1049984c0a6b28d27ebaeaada445ac0dc43c7fcb996784228ed0c8bc13e6a2 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-07-19 07:24:03 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
*** This bug has been marked as a duplicate of bug 723006 *** |
SELinux is preventing /usr/bin/abrt-dump-oops (deleted) from using the 'dac_override' capabilities. ***** Plugin dac_override (91.4 confidence) suggests *********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests *************************** If you believe that abrt-dump-oops (deleted) should have the dac_override capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep abrt-dump-oops /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:abrt_helper_t:s0 Target Context system_u:system_r:abrt_helper_t:s0 Target Objects Unknown [ capability ] Source abrt-dump-oops Source Path /usr/bin/abrt-dump-oops (deleted) Port <Inconnu> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.10.0-5.fc16 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 3.0-0.rc7.git3.1.fc16.x86_64 #1 SMP Fri Jul 15 22:56:12 UTC 2011 x86_64 x86_64 Alert Count 2 First Seen lun. 18 juil. 2011 19:52:58 CEST Last Seen lun. 18 juil. 2011 19:53:08 CEST Local ID d6cd8fed-44f9-4440-98cb-ad9455ba6273 Raw Audit Messages type=AVC msg=audit(1311011588.557:3992): avc: denied { dac_override } for pid=6368 comm="abrt-dump-oops" capability=1 scontext=system_u:system_r:abrt_helper_t:s0 tcontext=system_u:system_r:abrt_helper_t:s0 tclass=capability type=SYSCALL msg=audit(1311011588.557:3992): arch=x86_64 syscall=mkdir success=yes exit=0 a0=e316f0 a1=1ed a2=0 a3=3130322d73706f6f items=0 ppid=1 pid=6368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=abrt-dump-oops exe=2F7573722F62696E2F616272742D64756D702D6F6F7073202864656C6574656429 subj=system_u:system_r:abrt_helper_t:s0 key=(null) Hash: abrt-dump-oops,abrt_helper_t,abrt_helper_t,capability,dac_override audit2allow #============= abrt_helper_t ============== allow abrt_helper_t self:capability dac_override; audit2allow -R #============= abrt_helper_t ============== allow abrt_helper_t self:capability dac_override;