Bug 541696 - SELinux is preventing /bin/cp "read" access on prelink.full.
Summary: SELinux is preventing /bin/cp "read" access on prelink.full.
Keywords:
Status: CLOSED DUPLICATE of bug 541692
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:e6e590bf688...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-11-26 18:34 UTC by romal
Modified: 2010-02-08 19:53 UTC (History)
33 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-11-30 16:32:40 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description romal 2009-11-26 18:34:37 UTC
Zusammenfassung:

SELinux is preventing /bin/cp "read" access on prelink.full.

Detaillierte Beschreibung:

[cp hat einen toleranten Typ (prelink_cron_system_t). Dieser Zugriff wurde nicht
verweigert.]

SELinux denied access requested by cp. It is not expected that this access is
required by cp and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

Zugriff erlauben:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug
report.

Zusätzliche Informationen:

Quellkontext                  system_u:system_r:prelink_cron_system_t:s0-s0:c0.c
                              1023
Zielkontext                   system_u:object_r:var_lib_t:s0
Zielobjekte                   prelink.full [ file ]
Quelle                        cp
Quellen-Pfad                  /bin/cp
Port                          <Unbekannt>
Host                          (removed)
Quellen-RPM-Pakete            coreutils-7.6-7.fc12
Ziel-RPM-Pakete               
RPM-Richtlinie                selinux-policy-3.6.32-49.fc12
SELinux aktiviert             True
Richtlinienversion            targeted
Enforcing-Modus               Enforcing
Plugin-Name                   catchall
Hostname                      (removed)
Plattform                     Linux (removed) 2.6.31.6-145.fc12.x86_64
                              #1 SMP Sat Nov 21 15:57:45 EST 2009 x86_64 x86_64
Anzahl der Alarme             1
Zuerst gesehen                Do 26 Nov 2009 17:15:36 CET
Zuletzt gesehen               Do 26 Nov 2009 17:15:36 CET
Lokale ID                     2c25168c-a19f-425c-84ff-e7f7429cec5f
Zeilennummern                 

Raw-Audit-Meldungen           

node=(removed) type=AVC msg=audit(1259252136.746:22968): avc:  denied  { read } for  pid=20119 comm="cp" name="prelink.full" dev=sda3 ino=225 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_t:s0 tclass=file

node=(removed) type=SYSCALL msg=audit(1259252136.746:22968): arch=c000003e syscall=2 success=yes exit=4 a0=7fffb0bc0f22 a1=20000 a2=0 a3=7fffb0bbfde0 items=0 ppid=20112 pid=20119 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="cp" exe="/bin/cp" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-49.fc12,catchall,cp,prelink_cron_system_t,var_lib_t,file,read
audit2allow suggests:

#============= prelink_cron_system_t ==============
allow prelink_cron_system_t var_lib_t:file read;

Comment 1 Daniel Walsh 2009-11-30 16:32:40 UTC

*** This bug has been marked as a duplicate of bug 541692 ***


Note You need to log in before you can comment on or make changes to this bug.