Bug 542310 - SELinux is preventing /usr/bin/freshclam "write" access on log.
Summary: SELinux is preventing /usr/bin/freshclam "write" access on log.
Keywords:
Status: CLOSED DUPLICATE of bug 541702
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:60cd76066e7...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-11-29 08:53 UTC by Gaetan Cambier
Modified: 2009-11-30 10:30 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-11-30 10:30:21 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Gaetan Cambier 2009-11-29 08:53:52 UTC
Résumé:

SELinux is preventing /usr/bin/freshclam "write" access on log.

Description détaillée:

[SELinux est en mode permissif. Cet accès n'a pas été refusé.]

SELinux denied access requested by freshclam. It is not expected that this
access is required by freshclam and this access may signal an intrusion attempt.
It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Autoriser l'accès:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug
report.

Informations complémentaires:

Contexte source               system_u:system_r:freshclam_t:s0-s0:c0.c1023
Contexte cible                system_u:object_r:devlog_t:s0
Objets du contexte            log [ sock_file ]
source                        freshclam
Chemin de la source           /usr/bin/freshclam
Port                          <Inconnu>
Hôte                         (removed)
Paquetages RPM source         clamav-update-0.95.2-5.fc12
Paquetages RPM cible          
Politique RPM                 selinux-policy-3.6.32-46.fc12
Selinux activé               True
Type de politique             targeted
Mode strict                   Permissive
Nom du plugin                 catchall
Nom de l'hôte                (removed)
Plateforme                    Linux (removed)
                              2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7
                              21:25:57 EST 2009 i686 athlon
Compteur d'alertes            10
Première alerte              sam 28 nov 2009 21:00:01 CET
Dernière alerte              dim 29 nov 2009 09:00:01 CET
ID local                      1ba20519-4905-4f98-b7f6-11eb534c043c
Numéros des lignes           

Messages d'audit bruts        

node=(removed) type=AVC msg=audit(1259481601.260:479): avc:  denied  { write } for  pid=13295 comm="freshclam" name="log" dev=tmpfs ino=30181 scontext=system_u:system_r:freshclam_t:s0-s0:c0.c1023 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file

node=(removed) type=AVC msg=audit(1259481601.260:479): avc:  denied  { sendto } for  pid=13295 comm="freshclam" path="/dev/log" scontext=system_u:system_r:freshclam_t:s0-s0:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket

node=(removed) type=SYSCALL msg=audit(1259481601.260:479): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd2745c a2=6bbff4 a3=ffffffc8 items=0 ppid=13290 pid=13295 auid=0 uid=483 gid=471 euid=483 suid=483 fsuid=483 egid=471 sgid=471 fsgid=471 tty=(none) ses=42 comm="freshclam" exe="/usr/bin/freshclam" subj=system_u:system_r:freshclam_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-46.fc12,catchall,freshclam,freshclam_t,devlog_t,sock_file,write
audit2allow suggests:

#============= freshclam_t ==============
allow freshclam_t devlog_t:sock_file write;
allow freshclam_t syslogd_t:unix_dgram_socket sendto;

Comment 1 Miroslav Grepl 2009-11-30 10:30:21 UTC

*** This bug has been marked as a duplicate of bug 541702 ***


Note You need to log in before you can comment on or make changes to this bug.