Bug 540909 - SELinux is preventing /bin/mount access to a leaked /tmp/.webmin/788313_1_start.cgi file descriptor.
Summary: SELinux is preventing /bin/mount access to a leaked /tmp/.webmin/788313_1_sta...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:ee4b351c8f6...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-11-24 14:03 UTC by Gaetan Cambier
Modified: 2010-08-20 01:46 UTC (History)
3 users (show)

Fixed In Version: selinux-policy-3.6.32-120.fc12
Clone Of:
Environment:
Last Closed: 2009-12-07 22:46:43 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Gaetan Cambier 2009-11-24 14:03:11 UTC
Résumé:

SELinux is preventing /bin/mount access to a leaked
/tmp/.webmin/788313_1_start.cgi file descriptor.

Description détaillée:

[SELinux est en mode permissif. Cet accès n'a pas été refusé.]

SELinux denied access requested by the mount command. It looks like this is
either a leaked descriptor or mount output was redirected to a file it is not
allowed to access. Leaks usually can be ignored since SELinux is just closing
the leak and reporting the error. The application does not use the descriptor,
so it will run properly. If this is a redirection, you will not get output in
the /tmp/.webmin/788313_1_start.cgi. You should generate a bugzilla on
selinux-policy, and it will get routed to the appropriate package. You can
safely ignore this avc.

Autoriser l'accès:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385)

Informations complémentaires:

Contexte source               system_u:system_r:mount_t:s0
Contexte cible                system_u:object_r:rpm_script_tmp_t:s0
Objets du contexte            /tmp/.webmin/788313_1_start.cgi [ file ]
source                        mount
Chemin de la source           /bin/mount
Port                          <Inconnu>
Hôte                         (removed)
Paquetages RPM source         util-linux-ng-2.16-10.2.fc12
Paquetages RPM cible          
Politique RPM                 selinux-policy-3.6.32-41.fc12
Selinux activé               True
Type de politique             targeted
Mode strict                   Permissive
Nom du plugin                 leaks
Nom de l'hôte                (removed)
Plateforme                    Linux (removed)
                              2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7
                              21:25:57 EST 2009 i686 athlon
Compteur d'alertes            1
Première alerte              sam 21 nov 2009 10:23:57 CET
Dernière alerte              sam 21 nov 2009 10:23:57 CET
ID local                      de30f9d0-81ae-4474-bd6f-3e940eed1be3
Numéros des lignes           

Messages d'audit bruts        

node=(removed) type=AVC msg=audit(1258795437.981:770): avc:  denied  { write } for  pid=8787 comm="mount" path="/tmp/.webmin/788313_1_start.cgi" dev=dm-4 ino=1414776 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:rpm_script_tmp_t:s0 tclass=file

node=(removed) type=SYSCALL msg=audit(1258795437.981:770): arch=40000003 syscall=11 success=yes exit=0 a0=9f36690 a1=9f36b90 a2=9f13b18 a3=9f36b90 items=0 ppid=8769 pid=8787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="mount" exe="/bin/mount" subj=system_u:system_r:mount_t:s0 key=(null)



Hash String generated from  selinux-policy-3.6.32-41.fc12,leaks,mount,mount_t,rpm_script_tmp_t,file,write
audit2allow suggests:

#============= mount_t ==============
allow mount_t rpm_script_tmp_t:file write;

Comment 1 Daniel Walsh 2009-11-24 14:47:20 UTC
You can add these rules for now using

# grep avc /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Fixed in selinux-policy-3.6.32-49.fc12.noarch

Comment 2 Gaetan Cambier 2009-11-26 10:27:12 UTC
Ok, selinux-policy-3.6.32-49.fc12.noarch  is in testing repository ?

Comment 3 Miroslav Grepl 2009-11-26 11:33:57 UTC
Yes, it is.

yum update selinux-policy-targeted --enablerepo=updatest-testing

Comment 4 Gaetan Cambier 2009-11-26 18:42:58 UTC
ok, thanks

Comment 5 Fedora Update System 2009-12-01 16:51:42 UTC
selinux-policy-3.6.32-52.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-52.fc12

Comment 6 Fedora Update System 2009-12-03 04:58:44 UTC
selinux-policy-3.6.32-52.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12549

Comment 7 Fedora Update System 2009-12-03 20:29:50 UTC
selinux-policy-3.6.32-55.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-55.fc12

Comment 8 Fedora Update System 2009-12-04 23:48:11 UTC
selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12650

Comment 9 Fedora Update System 2009-12-08 07:54:51 UTC
selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2010-08-05 13:20:33 UTC
selinux-policy-3.6.32-120.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-120.fc12

Comment 11 Fedora Update System 2010-08-20 01:40:48 UTC
selinux-policy-3.6.32-120.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.