Bug 741757

Summary: SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls.
Product: [Fedora] Fedora Reporter: doctore
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: rawhideCC: doctore, dominick.grift, dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:bca0b63a5c08ffb0f8fa3ee5a08573e92d69a0dabb1bf508d881266bf5cebcc0
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-09-28 14:47:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description doctore 2011-09-27 20:04:25 UTC
SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls.

*****  Plugin catchall (100. confidence) suggests  ***************************

If aby bash powinno mieć domyślnie execute dostęp do ls file.
Then proszę to zgłosić jako błąd.
Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp.
Do
można tymczasowo zezwolić na ten dostęp wykonując polecenia:
# grep sh /var/log/audit/audit.log | audit2allow -M moja_polityka
# semodule -i moja_polityka.pp

Additional Information:
Source Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Context                system_u:object_r:bin_t:s0
Target Objects                /bin/ls [ file ]
Source                        sh
Source Path                   /bin/bash
Port                          <Nieznane>
Host                          (removed)
Source RPM Packages           bash-4.2.10-4.fc15
Target RPM Packages           coreutils-8.10-2.fc15
Policy RPM                    selinux-policy-3.9.16-38.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 2.6.40.4-5.fc15.x86_64 #1 SMP
                              Tue Aug 30 14:38:32 UTC 2011 x86_64 x86_64
Alert Count                   63
First Seen                    nie, 26 cze 2011, 16:07:42
Last Seen                     wto, 27 wrz 2011, 21:56:32
Local ID                      9bd4b2c2-fcdf-4c60-9a28-0b2c2baa16d7

Raw Audit Messages
type=AVC msg=audit(1317153392.532:31): avc:  denied  { execute } for  pid=1187 comm="sh" name="ls" dev=dm-1 ino=5599 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file


type=SYSCALL msg=audit(1317153392.532:31): arch=x86_64 syscall=access success=yes exit=0 a0=c33820 a1=1 a2=0 a3=1 items=0 ppid=1179 pid=1187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=sh exe=/bin/bash subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null)

Hash: sh,colord_t,bin_t,file,execute

audit2allow

#============= colord_t ==============
allow colord_t bin_t:file execute;

audit2allow -R

#============= colord_t ==============
allow colord_t bin_t:file execute;

Comment 1 Daniel Walsh 2011-09-28 14:47:47 UTC

*** This bug has been marked as a duplicate of bug 741755 ***