Bug 544697 - SELinux is preventing /usr/bin/abrt-pyhook-helper access to a leaked inotify file descriptor.
Summary: SELinux is preventing /usr/bin/abrt-pyhook-helper access to a leaked inotify ...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:47712c368fa...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-06 02:38 UTC by Claudiomar Rodrigues
Modified: 2009-12-20 10:41 UTC (History)
6 users (show)

Fixed In Version: 3.6.32-56.fc12
Clone Of:
Environment:
Last Closed: 2009-12-16 01:06:44 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Claudiomar Rodrigues 2009-12-06 02:38:32 UTC
Sumário:

SELinux is preventing /usr/bin/abrt-pyhook-helper access to a leaked inotify
file descriptor.

Descrição detalhada:

[SElinux está em modo permissivo. Esse acesso não foi negado.]

SELinux denied access requested by the abrt-pyhook-hel command. It looks like
this is either a leaked descriptor or abrt-pyhook-hel output was redirected to a
file it is not allowed to access. Leaks usually can be ignored since SELinux is
just closing the leak and reporting the error. The application does not use the
descriptor, so it will run properly. If this is a redirection, you will not get
output in the inotify. You should generate a bugzilla on selinux-policy, and it
will get routed to the appropriate package. You can safely ignore this avc.

Permitindo acesso:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385)

Informações adicionais:

Contexto de origem            system_u:system_r:abrt_helper_t:s0-s0:c0.c1023
Contexto de destino           system_u:object_r:inotifyfs_t:s0
Objetos de destino            inotify [ dir ]
Origem                        abrt-pyhook-hel
Caminho da origem             /usr/bin/abrt-pyhook-helper
Porta                         <Desconhecido>
Máquina                      (removed)
Pacotes RPM de origem         abrt-addon-python-1.0.0-1.fc12
Pacotes RPM de destino        
RPM da política              selinux-policy-3.6.32-55.fc12
Selinux habilitado            True
Tipo de política             targeted
Modo reforçado               Permissive
Nome do plugin                leaks
Nome da máquina              (removed)
Plataforma                    Linux (removed) 2.6.31.6-145.fc12.x86_64 #1 SMP
                              Sat Nov 21 15:57:45 EST 2009 x86_64 x86_64
Contador de alertas           1
Visto pela primeira vez em    Sáb 05 Dez 2009 23:53:48 BRST
Visto pela última vez em     Sáb 05 Dez 2009 23:53:48 BRST
ID local                      920eb941-051b-4c03-9821-12de1f0caeb3
Números de linha             

Mensagens de auditoria não p 

node=(removed) type=AVC msg=audit(1260064428.365:42): avc:  denied  { read } for  pid=2834 comm="abrt-pyhook-hel" path="inotify" dev=inotifyfs ino=1 scontext=system_u:system_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir

node=(removed) type=SYSCALL msg=audit(1260064428.365:42): arch=c000003e syscall=59 success=yes exit=0 a0=15b4d70 a1=1515f80 a2=7fff4c63c718 a3=342e322d6f666e69 items=0 ppid=2832 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="abrt-pyhook-hel" exe="/usr/bin/abrt-pyhook-helper" subj=system_u:system_r:abrt_helper_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-55.fc12,leaks,abrt-pyhook-hel,abrt_helper_t,inotifyfs_t,dir,read
audit2allow suggests:

#============= abrt_helper_t ==============
allow abrt_helper_t inotifyfs_t:dir read;

Comment 1 Daniel Walsh 2009-12-06 14:55:31 UTC
This is a leaked file descriptor.


You can add these rules for now using

# grep avc /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Fixed in selinux-policy-3.6.32-56.fc12.noarch

Comment 2 Fedora Update System 2009-12-07 22:54:26 UTC
selinux-policy-3.6.32-56.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-56.fc12

Comment 3 Fedora Update System 2009-12-10 04:19:53 UTC
selinux-policy-3.6.32-56.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12990

Comment 4 Fedora Update System 2009-12-16 01:05:22 UTC
selinux-policy-3.6.32-56.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.