Bug 508627 - SELinux is preventing ifconfig (ifconfig_t) "read" security_t
SELinux is preventing ifconfig (ifconfig_t) "read" security_t
Status: CLOSED DUPLICATE of bug 508099
Product: Fedora
Classification: Fedora
Component: net-tools (Show other bugs)
All Linux
low Severity medium
: ---
: ---
Assigned To: Radek Vokal
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2009-06-29 04:11 EDT by Egon Kastelijn
Modified: 2009-07-01 08:28 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-07-01 08:28:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Egon Kastelijn 2009-06-29 04:11:56 EDT
Description of problem:

SELinux is preventing ifconfig (ifconfig_t) "read" security_t.

Additional Information:

Source Context                system_u:system_r:ifconfig_t:s0
Target Context                system_u:object_r:security_t:s0
Target Objects                mls [ file ]                   
Source                        ifconfig                       
Source Path                   /sbin/ifconfig                 
Port                          <Unknown>                      
Host                          srv0002                        
Source RPM Packages           net-tools-1.60-92.fc11         
Target RPM Packages                                          
Policy RPM                    selinux-policy-3.6.12-50.fc11  
Selinux Enabled               True                           
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     srv0002
Platform                      Linux srv0002 #1 SMP Wed
                              May 27 17:27:08 EDT 2009 x86_64 x86_64
Alert Count                   2159
First Seen                    Thu Jun 25 17:19:46 2009
Last Seen                     Mon Jun 29 07:39:10 2009
Local ID                      1204a68b-ac7b-492c-baad-f35454e7f11d
Line Numbers

Raw Audit Messages

node=srv0002 type=AVC msg=audit(1246253950.771:1401): avc:  denied  { read } for  pid=25729 comm="ifconfig" name="mls" dev=selinuxfs ino=12 scontext=system_u:system_r:ifconfig_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file

node=srv0002 type=SYSCALL msg=audit(1246253950.771:1401): arch=c000003e syscall=2 success=no exit=558333912 a0=7fffbf59a060 a1=0 a2=7fffbf59a06c a3=fffffff8 items=0 ppid=1690 pid=25729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ifconfig" exe="/sbin/ifconfig" subj=system_u:system_r:ifconfig_t:s0 key=(null)

Version-Release number of selected component (if applicable):

How reproducible:
Multiple of these SE-Linux messages are produced in my /var/log/messages every 30 minutes.

Steps to Reproduce:
1. tail -f /var/log/messages
Actual results:

Expected results:

Additional info:
There is a Puppet-client running on the specified host.
I think that Puppet is doing something with ifconfig that triggers this problem.
Comment 1 Egon Kastelijn 2009-06-29 04:13:24 EDT
There are two other open bugs with the same title:

They both talk about 'vpnc'.
On my system vpnc is not installed.
Comment 2 Jiri Popelka 2009-07-01 08:28:12 EDT
Fixed in selinux-policy-3.6.12-57.fc11

*** This bug has been marked as a duplicate of bug 508099 ***

Note You need to log in before you can comment on or make changes to this bug.