Summary: SELinux is preventing /usr/libexec/abrt-hook-python "connect" access. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by abrt-hook-pytho. It is not expected that this access is required by abrt-hook-pytho and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 Target Context unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 Target Objects None [ unix_dgram_socket ] Source abrt-hook-pytho Source Path /usr/libexec/abrt-hook-python Port <Unknown> Host (removed) Source RPM Packages abrt-addon-python-1.0.4-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-73.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18 19:52:07 UTC 2010 x86_64 x86_64 Alert Count 2 First Seen IST 17:16:12 2010 ינו 26 ג' Last Seen IST 17:16:12 2010 ינו 26 ג' Local ID 4dfb8b5b-478e-4df8-8f71-47da46ee714c Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1264518972.853:69): avc: denied { connect } for pid=10285 comm="abrt-hook-pytho" scontext=unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 tclass=unix_dgram_socket node=(removed) type=AVC msg=audit(1264518972.853:69): avc: denied { sendto } for pid=10285 comm="abrt-hook-pytho" path="/dev/log" scontext=unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket node=(removed) type=SYSCALL msg=audit(1264518972.853:69): arch=c000003e syscall=42 success=yes exit=128 a0=4 a1=375d7761a0 a2=6e a3=676f6c2f7665642f items=0 ppid=10283 pid=10285 auid=500 uid=500 gid=500 euid=479 suid=479 fsuid=479 egid=500 sgid=500 fsgid=500 tty=pts0 ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:system_r:abrt_helper_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-73.fc12,catchall,abrt-hook-pytho,abrt_helper_t,abrt_helper_t,unix_dgram_socket,connect audit2allow suggests: #============= abrt_helper_t ============== allow abrt_helper_t self:unix_dgram_socket connect; allow abrt_helper_t syslogd_t:unix_dgram_socket sendto;
*** This bug has been marked as a duplicate of bug 558728 ***