Description of problem: Detailed Description SELinux denied access requested by setsebool. It is not expected that this access is required by setsebool and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access You can generate a local policy module to allow this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package. Additional Information Source Context system_u:system_r:setsebool_t:s0 Target Context system_u:system_r:rpm_t:s0 Target Objects pipe [ fifo_file ] Affected RPM Packages Policy RPM selinux-policy-3.0.8-14.fc8 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name plugins.catchall Host Name xxxxx Platform Linux xxxxx 2.6.23-0.214.rc8.git2.fc8 #1 SMP Fri Sep 28 17:38:00 EDT 2007 i686 i686 Alert Count 1 First Seen Mon Oct 8 13:52:14 2007 Last Seen Mon Oct 8 13:52:14 2007 Local ID 6a87578c-a69e-451d-abc4-24e067b592ee Line Numbers Raw Audit Messages avc: denied { write } for comm=setsebool dev=pipefs path=pipe:[180895] pid=19404 scontext=system_u:system_r:setsebool_t:s0 tclass=fifo_file tcontext=system_u:system_r:rpm_t:s0 Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: This is one of my personal favs. :)
Fixed in selinux-policy-3.0.8-21.fc8
Bulk closing all bugs in Fedora updates in the modified state. If you bug is not fixed, please reopen.