Bug 521942 - setroubleshoot: SELinux is preventing abrtd "add_name" access on kerneloops-1252437827-1.lock.
Summary: setroubleshoot: SELinux is preventing abrtd "add_name" access on kernelo...
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:848c0535598...
: 521943 521944 521945 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-09-08 19:31 UTC by Moisés Ramos
Modified: 2009-09-08 23:31 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-09-08 23:30:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Moisés Ramos 2009-09-08 19:31:11 UTC
The following was filed automatically by setroubleshoot:

Resúmen:

SELinux is preventing abrtd "add_name" access on kerneloops-1252437827-1.lock.

Descripción Detallada:

[abrtd has a permissive type (initrc_t). This access was not denied.]

SELinux denied access requested by abrtd. It is not expected that this access is
required by abrtd and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Permitiendo Acceso:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug
report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package.

Información Adicional:

Contexto Fuente               system_u:system_r:initrc_t:s0
Contexto Destino              system_u:object_r:var_t:s0
Objetos Destino               kerneloops-1252437827-1.lock [ dir ]
Fuente                        abrtd
Dirección de Fuente          /usr/sbin/abrtd
Puerto                        <Desconocido>
Nombre de Equipo              (removed)
Paquetes RPM Fuentes          abrt-0.0.8.5-1.fc12
Paquetes RPM Destinos         
RPM de Políticas             selinux-policy-3.6.30-4.fc12
SELinux Activado              True
Tipo de Política             targeted
MLS Activado                  True
Modo Obediente                Enforcing
Nombre de Plugin              catchall
Nombre de Equipo              (removed)
Plataforma                    Linux (removed) 2.6.31-0.204.rc9.fc12.x86_64 #1
                              SMP Sat Sep 5 20:45:55 EDT 2009 x86_64 x86_64
Cantidad de Alertas           3
Visto por Primera Vez         mar 08 sep 2009 21:23:47 CEST
Visto por Última Vez         mar 08 sep 2009 21:23:47 CEST
ID Local                      9d69cc09-1702-4ee7-a88a-d635fbb7d149
Números de Línea            

Mensajes de Auditoría Crudos 

node=(removed) type=AVC msg=audit(1252437827.208:44): avc:  denied  { add_name } for  pid=1480 comm="abrtd" name="kerneloops-1252437827-1.lock" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir

node=(removed) type=AVC msg=audit(1252437827.208:44): avc:  denied  { create } for  pid=1480 comm="abrtd" name="kerneloops-1252437827-1.lock" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file

node=(removed) type=AVC msg=audit(1252437827.208:44): avc:  denied  { write open } for  pid=1480 comm="abrtd" name="kerneloops-1252437827-1.lock" dev=sda1 ino=13521 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file

node=(removed) type=SYSCALL msg=audit(1252437827.208:44): arch=c000003e syscall=2 success=yes exit=0 a0=223c828 a1=c1 a2=1a0 a3=1 items=0 ppid=1 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="abrtd" exe="/usr/sbin/abrtd" subj=system_u:system_r:initrc_t:s0 key=(null)


audit2allow suggests:

#============= initrc_t ==============
allow initrc_t var_t:dir add_name;
allow initrc_t var_t:file { write create open };

Comment 1 Daniel Walsh 2009-09-08 23:30:13 UTC
nFixed in selinux-policy-3.6.30-5.fc12.noarch

Comment 2 Daniel Walsh 2009-09-08 23:30:38 UTC
*** Bug 521943 has been marked as a duplicate of this bug. ***

Comment 3 Daniel Walsh 2009-09-08 23:30:52 UTC
*** Bug 521944 has been marked as a duplicate of this bug. ***

Comment 4 Daniel Walsh 2009-09-08 23:31:07 UTC
*** Bug 521945 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.