Bug 496507 - SELinux is preventing links (staff_t) "read write" gpmctl_t.
SELinux is preventing links (staff_t) "read write" gpmctl_t.
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: links (Show other bugs)
rawhide
All Linux
low Severity medium
: ---
: ---
Assigned To: Lubomir Rintel
Fedora Extras Quality Assurance
: SELinux
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-04-19 15:02 EDT by Matěj Cepl
Modified: 2009-04-20 08:26 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-04-20 08:26:26 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Matěj Cepl 2009-04-19 15:02:28 EDT
(links is the original source code from which elinks were forked, so I guess it needs basically the same set of rules as elinks).

SELinux is preventing links (staff_t) "read write" gpmctl_t.

Podrobný popis:

SELinux denied access requested by links. It is not expected that this access is
required by links and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Povolení přístupu:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Další informace:

Kontext zdroje                staff_u:staff_r:staff_t:s0-s0:c0.c1023
Kontext cíle                 system_u:object_r:gpmctl_t:s0
Objekty cíle                 gpmctl [ sock_file ]
Zdroj                         links
Cesta zdroje                  /usr/bin/links2
Port                          <Neznámé>
Počítač                    viklef.ceplovi.cz
RPM balíčky zdroje          links-2.2-7.fc11
RPM balíčky cíle           
RPM politiky                  selinux-policy-3.6.12-2.fc11
Selinux povolen               True
Typ politiky                  targeted
MLS povoleno                  True
Vynucovací režim            Enforcing
Název zásuvného modulu     catchall
Název počítače            viklef.ceplovi.cz
Platforma                     Linux viklef.ceplovi.cz 2.6.29.1-54.fc11.x86_64 #1
                              SMP Tue Apr 7 05:26:42 EDT 2009 x86_64 x86_64
Počet upozornění           2
Poprvé viděno               Út 14. duben 2009, 13:43:30 CEST
Naposledy viděno             Út 14. duben 2009, 15:23:24 CEST
Místní ID                   ac3be610-7332-426b-8c33-75d2225b1ffc
Čísla řádků              

Původní zprávy auditu      

node=viklef.ceplovi.cz type=AVC msg=audit(1239715404.700:88): avc:  denied  { read write } for  pid=6015 comm="links" name="gpmctl" dev=tmpfs ino=21338 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:gpmctl_t:s0 tclass=sock_file

node=viklef.ceplovi.cz type=SYSCALL msg=audit(1239715404.700:88): arch=c000003e syscall=2 success=no exit=-1740357672 a0=3454c04550 a1=2 a2=8 a3=344a56812c items=0 ppid=5934 pid=6015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=tty3 ses=9 comm="links" exe="/usr/bin/links2" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
Comment 1 Daniel Walsh 2009-04-20 08:26:26 EDT
Fixed in selinux-policy-3.6.12-9.fc11.noarch

Note You need to log in before you can comment on or make changes to this bug.