Bug 1325802 - SELinux is preventing /usr/bin/gdb from write access on the directory /usr/share/glib-2.0/gdb
Summary: SELinux is preventing /usr/bin/gdb from write access on the directory /usr/sh...
Keywords:
Status: CLOSED DUPLICATE of bug 1323638
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: abrt
Version: 6.7
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: abrt
QA Contact: BaseOS QE - Apps
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-04-11 08:52 UTC by Martin Frodl
Modified: 2016-04-21 12:48 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 1290970
Environment:
Last Closed: 2016-04-21 12:10:47 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Martin Frodl 2016-04-11 08:52:07 UTC
Bug 1290970 encountered on RHEL 6 (abrt-2.0.8-34.el6) as well:

$ /usr/bin/env LC_ALL=en_US.UTF-8 /sbin/ausearch -m AVC -m USER_AVC -m SELINUX_ERR -ts 04/08/2016 03:17:23 < /dev/null
----
time->Fri Apr  8 03:17:23 2016
type=PATH msg=audit(1460099843.445:633): item=1 name="/usr/share/glib-2.0/gdb/gobject.pyc" nametype=CREATE
type=PATH msg=audit(1460099843.445:633): item=0 name="/usr/share/glib-2.0/gdb/" inode=1051143 dev=fd:00 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:usr_t:s0 nametype=PARENT
type=CWD msg=audit(1460099843.445:633):  cwd="/var/spool/abrt/ccpp-2016-04-07-22:24:15-17031"
type=SYSCALL msg=audit(1460099843.445:633): arch=80000016 syscall=5 per=400000 success=no exit=-13 a0=3ffffb9f107 a1=2c1 a2=81a4 a3=201e0 items=2 ppid=18675 pid=18676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="gdb" exe="/usr/bin/gdb" subj=unconfined_u:system_r:abrt_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1460099843.445:633): avc:  denied  { write } for  pid=18676 comm="gdb" name="gdb" dev=dm-0 ino=1051143 scontext=unconfined_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir
----
time->Fri Apr  8 03:17:23 2016
type=PATH msg=audit(1460099843.445:634): item=1 name="/usr/share/glib-2.0/gdb/glib.pyc" nametype=CREATE
type=PATH msg=audit(1460099843.445:634): item=0 name="/usr/share/glib-2.0/gdb/" inode=1051143 dev=fd:00 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:usr_t:s0 nametype=PARENT
type=CWD msg=audit(1460099843.445:634):  cwd="/var/spool/abrt/ccpp-2016-04-07-22:24:15-17031"
type=SYSCALL msg=audit(1460099843.445:634): arch=80000016 syscall=5 per=400000 success=no exit=-13 a0=3ffffb9b66f a1=2c1 a2=81a4 a3=3f60 items=2 ppid=18675 pid=18676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="gdb" exe="/usr/bin/gdb" subj=unconfined_u:system_r:abrt_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1460099843.445:634): avc:  denied  { write } for  pid=18676 comm="gdb" name="gdb" dev=dm-0 ino=1051143 scontext=unconfined_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir

Comment 3 Karel Volný 2016-04-21 12:10:47 UTC
this is exact duplicate of bug #1323638, which might be in turn duplicate of the bug #621605 ...

*** This bug has been marked as a duplicate of bug 1323638 ***


Note You need to log in before you can comment on or make changes to this bug.