Bug 542959 - SELinux is preventing nm-system-setti (NetworkManager_t) "getattr" to /var/tmp (mount_tmp_t).
Summary: SELinux is preventing nm-system-setti (NetworkManager_t) "getattr" to /var/tm...
Keywords:
Status: CLOSED DUPLICATE of bug 538428
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:8c8da658fb6...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-01 10:23 UTC by Andrea Modesto Rossi
Modified: 2009-12-01 11:27 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-12-01 11:27:36 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Andrea Modesto Rossi 2009-12-01 10:23:43 UTC
Sommario:

SELinux is preventing nm-system-setti (NetworkManager_t) "getattr" to /var/tmp
(mount_tmp_t).

Descrizione dettagliata:

SELinux denied access requested by nm-system-setti. /var/tmp may be a
mislabeled. /var/tmp default SELinux type is tmp_t, but its current type is
mount_tmp_t. Changing this file back to the default type, may fix your problem.

File contexts can be assigned to a file in the following ways.

  * Files created in a directory receive the file context of the parent
    directory by default.
  * The SELinux policy might override the default label inherited from the
    parent directory by specifying a process running in context A which creates
    a file in a directory labeled B will instead create the file with label C.
    An example of this would be the dhcp client running with the dhclient_t type
    and creates a file in the directory /etc. This file would normally receive
    the etc_t type due to parental inheritance but instead the file is labeled
    with the net_conf_t type because the SELinux policy specifies this.
  * Users can change the file context on a file using tools such as chcon, or
    restorecon.

This file could have been mislabeled either by user error, or if an normally
confined application was run under the wrong domain.

However, this might also indicate a bug in SELinux because the file should not
have been labeled with this type.

If you believe this is a bug, please file a bug report
(http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package.

Abilitazione accesso in corso:

You can restore the default system context to this file by executing the
restorecon command. restorecon '/var/tmp', if this file is a directory, you can
recursively restore using restorecon -R '/var/tmp'.

Comando fix:

restorecon '/var/tmp'

Informazioni aggiuntive:

Contesto della sorgente       system_u:system_r:NetworkManager_t:s0-s0:c0.c1023
Contesto target               system_u:object_r:mount_tmp_t:s0
Oggetti target                /var/tmp [ dir ]
Sorgente                      nm-system-setti
Percorso della sorgente       /usr/sbin/nm-system-settings
Porta                         <Sconosciuto>
Host                          (removed)
Sorgente Pacchetti RPM        NetworkManager-0.7.1-8.git20090708.fc11
Pacchetti RPM target          filesystem-2.4.21-1.fc11
RPM della policy              selinux-policy-3.6.12-86.fc11
Selinux abilitato             True
Tipo di policy                targeted
Modalità Enforcing           Enforcing
Nome plugin                   restorecon
Host Name                     (removed)
Piattaforma                   Linux (removed) 2.6.30.9-96.fc11.i586 #1
                              SMP Tue Nov 3 23:33:04 EST 2009 i686 i686
Conteggio avvisi              34
Primo visto                   mer 21 ott 2009 21:00:01 CEST
Ultimo visto                  mar 17 nov 2009 20:35:54 CET
ID locale                     f1c2e12d-3a11-48fa-a133-77cb3b4ac8de
Numeri di linea               

Messaggi Raw Audit            

node=(removed) type=AVC msg=audit(1258486554.20:6): avc:  denied  { getattr } for  pid=1515 comm="nm-system-setti" path="/var/tmp" dev=tmpfs ino=7597 scontext=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mount_tmp_t:s0 tclass=dir

node=(removed) type=SYSCALL msg=audit(1258486554.20:6): arch=40000003 syscall=195 success=no exit=-13 a0=23643c a1=bfc34eac a2=766ff4 a3=3 items=0 ppid=1 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="nm-system-setti" exe="/usr/sbin/nm-system-settings" subj=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.12-86.fc11,restorecon,nm-system-setti,NetworkManager_t,mount_tmp_t,dir,getattr
audit2allow suggests:

#============= NetworkManager_t ==============
allow NetworkManager_t mount_tmp_t:dir getattr;

Comment 1 Miroslav Grepl 2009-12-01 11:27:36 UTC

*** This bug has been marked as a duplicate of bug 538428 ***


Note You need to log in before you can comment on or make changes to this bug.