Summary: SELinux is preventing /usr/sbin/abrtd (deleted) "read" access on Bugzilla.conf. Detailed Description: [abrtd has a permissive type (abrt_t). This access was not denied.] SELinux denied access requested by abrtd. It is not expected that this access is required by abrtd and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:abrt_t:s0 Target Context unconfined_u:object_r:user_home_dir_t:s0 Target Objects Bugzilla.conf [ file ] Source abrtd Source Path /usr/sbin/abrtd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.6.32-35.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.5-96.fc12.x86_64 #1 SMP Fri Oct 23 19:30:30 EDT 2009 x86_64 x86_64 Alert Count 20 First Seen Mon 12 Oct 2009 05:07:43 PM EDT Last Seen Tue 03 Nov 2009 10:09:32 AM EST Local ID 903f24c5-ec44-4e76-b77d-a57348b389c3 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1257260972.796:30198): avc: denied { read } for pid=3810 comm="abrtd" name="Bugzilla.conf" dev=dm-4 ino=205 scontext=unconfined_u:system_r:abrt_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file node=(removed) type=AVC msg=audit(1257260972.796:30198): avc: denied { open } for pid=3810 comm="abrtd" name="Bugzilla.conf" dev=dm-4 ino=205 scontext=unconfined_u:system_r:abrt_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1257260972.796:30198): arch=c000003e syscall=2 success=yes exit=7 a0=2428ab8 a1=0 a2=1b6 a3=0 items=0 ppid=1 pid=3810 auid=501 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="abrtd" exe=2F7573722F7362696E2F6162727464202864656C6574656429 subj=unconfined_u:system_r:abrt_t:s0 key=(null) Hash String generated from selinux-policy-3.6.32-35.fc12,catchall,abrtd,abrt_t,user_home_dir_t,file,read audit2allow suggests: #============= abrt_t ============== allow abrt_t user_home_dir_t:file { read open };
*** This bug has been marked as a duplicate of bug 522878 ***