Summary SELinux is preventing /usr/sbin/setsebool (setsebool_t) "setbool" to <Unknown> (security_t). Detailed Description SELinux denied access requested by /usr/sbin/setsebool. It is not expected that this access is required by /usr/sbin/setsebool and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access You can generate a local policy module to allow this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package. Additional Information Source Context system_u:system_r:setsebool_t:SystemLow-SystemHigh Target Context system_u:object_r:security_t Target Objects None [ security ] Affected RPM Packages policycoreutils-2.0.33-3.fc8 [application] Policy RPM selinux-policy-3.0.8-72.fc8 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name plugins.catchall Host Name home.supercaregistry.info Platform Linux home.supercaregistry.info 2.6.23.9-85.fc8 #1 SMP Fri Dec 7 15:49:59 EST 2007 i686 i686 Alert Count 2 First Seen Fri 04 Jan 2008 09:58:14 PM MST Last Seen Fri 04 Jan 2008 10:04:21 PM MST Local ID fb913695-15e3-44ec-8667-63bd2fe57fb3 Line Numbers Raw Audit Messages avc: denied { setbool } for comm=setsebool egid=0 euid=0 exe=/usr/sbin/setsebool exit=-13 fsgid=0 fsuid=0 gid=0 items=0 pid=7842 scontext=system_u:system_r:setsebool_t:s0-s0:c0.c1023 sgid=0 subj=system_u:system_r:setsebool_t:s0-s0:c0.c1023 suid=0 tclass=security tcontext=system_u:object_r:security_t:s0 tty=pts1 uid=0
Did you set one of the secure_mode booleans? getsebool -a | grep secure
I am assuming you did since this is the only way I can see this avc happening closing as notabug, reopen if you still have the problem.