Bug 553583 - SELinux is preventing /usr/bin/eu-unstrip "read" access on 001.
Summary: SELinux is preventing /usr/bin/eu-unstrip "read" access on 001.
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:0b34a32c032...
: 553584 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-01-08 10:43 UTC by Jean-Marie Schütz
Modified: 2023-09-14 01:19 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-11-03 12:09:02 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jean-Marie Schütz 2010-01-08 10:43:16 UTC
Résumé:

SELinux is preventing /usr/bin/eu-unstrip "read" access on 001.

Description détaillée:

[eu-unstrip a un type permissif (abrt_t). Cet accès n'a pas été refusé.]

SELinux denied access requested by eu-unstrip. It is not expected that this
access is required by eu-unstrip and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Autoriser l'accès:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug
report.

Informations complémentaires:

Contexte source               system_u:system_r:abrt_t:s0-s0:c0.c1023
Contexte cible                system_u:object_r:usb_device_t:s0
Objets du contexte            001 [ chr_file ]
source                        eu-unstrip
Chemin de la source           /usr/bin/eu-unstrip
Port                          <Inconnu>
Hôte                         (removed)
Paquetages RPM source         elfutils-0.143-1.fc12
Paquetages RPM cible          
Politique RPM                 selinux-policy-3.6.32-56.fc12
Selinux activé               True
Type de politique             targeted
Mode strict                   Enforcing
Nom du plugin                 catchall
Nom de l'hôte                (removed)
Plateforme                    Linux Oma-et-Opa 2.6.31.6-166.fc12.i686.PAE #1 SMP
                              Wed Dec 9 11:00:30 EST 2009 i686 i686
Compteur d'alertes            2
Première alerte              jeu. 24 déc. 2009 17:51:41 CET
Dernière alerte              jeu. 24 déc. 2009 18:17:56 CET
ID local                      0d4d9aaf-fcaa-4ad0-a2c2-d85da1c89133
Numéros des lignes           

Messages d'audit bruts        

node=Oma-et-Opa type=AVC msg=audit(1261675076.756:7): avc:  denied  { read } for  pid=1619 comm="eu-unstrip" name="001" dev=tmpfs ino=2916 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file

node=Oma-et-Opa type=AVC msg=audit(1261675076.756:7): avc:  denied  { open } for  pid=1619 comm="eu-unstrip" name="001" dev=tmpfs ino=2916 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file

node=Oma-et-Opa type=SYSCALL msg=audit(1261675076.756:7): arch=40000003 syscall=5 success=yes exit=12 a0=88d69f8 a1=8000 a2=0 a3=88d46f0 items=0 ppid=1516 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="eu-unstrip" exe="/usr/bin/eu-unstrip" subj=system_u:system_r:abrt_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-56.fc12,catchall,eu-unstrip,abrt_t,usb_device_t,chr_file,read
audit2allow suggests:
audit2allow is not installed.

Comment 1 Daniel Walsh 2010-01-08 13:38:42 UTC
*** Bug 553584 has been marked as a duplicate of this bug. ***

Comment 2 Daniel Walsh 2010-01-08 13:40:53 UTC
Why would abrt be executing eu-unstrib on a usb device?

Comment 3 Bug Zapper 2010-11-04 01:33:35 UTC
This message is a reminder that Fedora 12 is nearing its end of life.
Approximately 30 (thirty) days from now Fedora will stop maintaining
and issuing updates for Fedora 12.  It is Fedora's policy to close all
bug reports from releases that are no longer maintained.  At that time
this bug will be closed as WONTFIX if it remains open with a Fedora 
'version' of '12'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version prior to Fedora 12's end of life.

Bug Reporter: Thank you for reporting this issue and we are sorry that 
we may not be able to fix it before Fedora 12 is end of life.  If you 
would still like to see this bug fixed and are able to reproduce it 
against a later version of Fedora please change the 'version' of this 
bug to the applicable version.  If you are unable to change the version, 
please add a comment here and someone will do it for you.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events.  Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

The process we are following is described here: 
http://fedoraproject.org/wiki/BugZappers/HouseKeeping

Comment 4 Red Hat Bugzilla 2023-09-14 01:19:17 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days


Note You need to log in before you can comment on or make changes to this bug.