Résumé: SELinux is preventing /usr/bin/freshclam "write" access on log. Description détaillée: [SELinux est en mode permissif. Cet accès n'a pas été refusé.] SELinux denied access requested by freshclam. It is not expected that this access is required by freshclam and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Autoriser l'accès: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Informations complémentaires: Contexte source system_u:system_r:freshclam_t:s0-s0:c0.c1023 Contexte cible system_u:object_r:devlog_t:s0 Objets du contexte log [ sock_file ] source freshclam Chemin de la source /usr/bin/freshclam Port <Inconnu> Hôte (removed) Paquetages RPM source clamav-update-0.95.2-5.fc12 Paquetages RPM cible Politique RPM selinux-policy-3.6.32-46.fc12 Selinux activé True Type de politique targeted Mode strict Permissive Nom du plugin catchall Nom de l'hôte (removed) Plateforme Linux (removed) 2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7 21:25:57 EST 2009 i686 athlon Compteur d'alertes 10 Première alerte sam 28 nov 2009 21:00:01 CET Dernière alerte dim 29 nov 2009 09:00:01 CET ID local 1ba20519-4905-4f98-b7f6-11eb534c043c Numéros des lignes Messages d'audit bruts node=(removed) type=AVC msg=audit(1259481601.260:479): avc: denied { write } for pid=13295 comm="freshclam" name="log" dev=tmpfs ino=30181 scontext=system_u:system_r:freshclam_t:s0-s0:c0.c1023 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file node=(removed) type=AVC msg=audit(1259481601.260:479): avc: denied { sendto } for pid=13295 comm="freshclam" path="/dev/log" scontext=system_u:system_r:freshclam_t:s0-s0:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket node=(removed) type=SYSCALL msg=audit(1259481601.260:479): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd2745c a2=6bbff4 a3=ffffffc8 items=0 ppid=13290 pid=13295 auid=0 uid=483 gid=471 euid=483 suid=483 fsuid=483 egid=471 sgid=471 fsgid=471 tty=(none) ses=42 comm="freshclam" exe="/usr/bin/freshclam" subj=system_u:system_r:freshclam_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-46.fc12,catchall,freshclam,freshclam_t,devlog_t,sock_file,write audit2allow suggests: #============= freshclam_t ============== allow freshclam_t devlog_t:sock_file write; allow freshclam_t syslogd_t:unix_dgram_socket sendto;
*** This bug has been marked as a duplicate of bug 541702 ***