Bug 543310 - SELinux is preventing kdm (xdm_t) "execute" bootloader_exec_t.
Summary: SELinux is preventing kdm (xdm_t) "execute" bootloader_exec_t.
Keywords:
Status: CLOSED DUPLICATE of bug 538428
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:a19a8c09528...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-02 05:47 UTC by hristo ivanov
Modified: 2009-12-02 11:00 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-12-02 11:00:35 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description hristo ivanov 2009-12-02 05:47:10 UTC
\u041e\u0431\u043e\u0431\u0449\u0435\u043d\u0438\u0435:

SELinux is preventing kdm (xdm_t) "execute" bootloader_exec_t.

\u0414\u0435\u0442\u0430\u0439\u043b\u043d\u043e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435:

SELinux denied access requested by kdm. It is not expected that this access is
required by kdm and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.

\u0420\u0430\u0437\u0440\u0435\u0448\u0430\u0432\u0430\u043d\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u044a\u043f:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

\u0414\u043e\u043f\u044a\u043b\u043d\u0438\u0442\u0435\u043b\u043d\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f:

\u041d\u0430\u0447\u0430\u043b\u0435\u043d \u043a\u043e\u043d\u0442\u0435\u043a\u0441 system_u:system_r:xdm_t:s0-s0:c0.c1023
\u0426\u0435\u043b\u0435\u0432\u0438 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442 system_u:object_r:bootloader_exec_t:s0
\u0426\u0435\u043b\u0435\u0432\u0438 \u043e\u0431\u0435\u043a\u0442\u0438     /sbin/grub [ file ]
Source                        kdm
Source Path                   /usr/bin/kdm
\u041f\u043e\u0440\u0442                      <\u041d\u0435\u043f\u043e\u0437\u043d\u0430\u0442>
\u0425\u043e\u0441\u0442                      gadnio
\u0418\u0437\u0445\u043e\u0434\u043d\u0438 RPM \u043f\u0430\u043a\u0435\u0442 
\u0426\u0435\u043b\u0435\u0432\u0438 RPM \u043f\u0430\u043a\u0435\u0442\u0438 grub-0.97-51.fc11
RPM \u0441 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430       selinux-policy-3.6.12-85.fc11
Selinux \u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d   True
\u0422\u0438\u043f \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430       targeted
\u0410\u043a\u0442\u0438\u0432\u0435\u043d \u0440\u0435\u0436\u0438\u043c     Enforcing
\u0418\u043c\u0435 \u043d\u0430 \u0434\u043e\u043f.\u043c\u043e\u0434\u0443\u043b catchall
\u0418\u043c\u0435 \u043d\u0430 \u043c\u0430\u0448\u0438\u043d\u0430      gadnio
\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430            Linux gadnio 2.6.30.8-64.fc11.x86_64 #1 SMP Fri
                              Sep 25 04:43:32 EDT 2009 x86_64 x86_64
\u0411\u0440\u043e\u0439 \u0442\u0440\u0435\u0432\u043e\u0433\u0438       14
\u0412\u0438\u0434\u044f\u043d\u043e \u0437\u0430 \u043f\u044a\u0440\u0432\u0438   5.08.2009 (\u0441\u0440)  9,07,49 EEST
\u0412\u0438\u0434\u044f\u043d\u043e \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\Uffffffff31.10.2009 (\u0441\u0431) 16,44,33 EET
\u041b\u043e\u043a\u0430\u043b\u043d\u043e ID             6c4ddf37-a9fd-4331-bd0e-72d810ba19d3
\u041d\u043e\u043c\u0435\u0440\u0430 \u043d\u0430 \u0440\u0435\u0434\u043e\u0432\Uffffffff

\u0421\u0443\u0440\u043e\u0432\u0438 \u043e\u0434\u0438\u0442 \u0441\u044a\u043e\Uffffffff

node=gadnio type=AVC msg=audit(1257000273.644:35768): avc:  denied  { execute } for  pid=1976 comm="kdm" name="grub" dev=sda1 ino=992796 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file

node=gadnio type=SYSCALL msg=audit(1257000273.644:35768): arch=c000003e syscall=21 success=no exit=-13 a0=7ffff7478486 a1=1 a2=0 a3=10 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kdm" exe=2F7573722F62696E2F6B646D202864656C6574656429 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.12-85.fc11,catchall,kdm,xdm_t,bootloader_exec_t,file,execute
audit2allow suggests:

#============= xdm_t ==============
allow xdm_t bootloader_exec_t:file execute;

Comment 1 Miroslav Grepl 2009-12-02 11:00:35 UTC

*** This bug has been marked as a duplicate of bug 538428 ***


Note You need to log in before you can comment on or make changes to this bug.