Zusammenfassung: SELinux is preventing /usr/libexec/abrt-hook-python "getattr" access on /. Detaillierte Beschreibung: [SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.] SELinux denied access requested by abrt-hook-pytho. It is not expected that this access is required by abrt-hook-pytho and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Zugriff erlauben: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Zusätzliche Informationen: Quellkontext unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c 1023 Zielkontext system_u:object_r:fs_t:s0 Zielobjekte / [ filesystem ] Quelle abrt-hook-pytho Quellen-Pfad /usr/libexec/abrt-hook-python Port <Unbekannt> Host (removed) Quellen-RPM-Pakete abrt-addon-python-1.0.4-1.fc12 Ziel-RPM-Pakete filesystem-2.4.30-2.fc12 RPM-Richtlinie selinux-policy-3.6.32-78.fc12 SELinux aktiviert True Richtlinienversion targeted Enforcing-Modus Permissive Plugin-Name catchall Hostname (removed) Plattform Linux (removed) 2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18 19:52:07 UTC 2010 x86_64 x86_64 Anzahl der Alarme 1 Zuerst gesehen Sa 06 Feb 2010 18:54:41 CET Zuletzt gesehen Sa 06 Feb 2010 18:54:41 CET Lokale ID 99c6ceaa-8249-409b-9cea-f6549dbe3c52 Zeilennummern Raw-Audit-Meldungen node=(removed) type=AVC msg=audit(1265478881.720:30841): avc: denied { getattr } for pid=2649 comm="abrt-hook-pytho" name="/" dev=dm-0 ino=2 scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem node=(removed) type=SYSCALL msg=audit(1265478881.720:30841): arch=c000003e syscall=137 success=yes exit=128 a0=4021e1 a1=7fffb5ff7fc0 a2=fdf a3=69746361206e6120 items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-78.fc12,catchall,abrt-hook-pytho,abrt_helper_t,fs_t,filesystem,getattr audit2allow suggests: #============= abrt_helper_t ============== allow abrt_helper_t fs_t:filesystem getattr;
Here are two more alerts related to this: Zusammenfassung: SELinux is preventing /usr/libexec/abrt-hook-python "create" access. Detaillierte Beschreibung: [SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.] SELinux denied access requested by abrt-hook-pytho. It is not expected that this access is required by abrt-hook-pytho and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Zugriff erlauben: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Zusätzliche Informationen: Quellkontext unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c 1023 Zielkontext unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c 1023 Zielobjekte None [ unix_dgram_socket ] Quelle abrt-hook-pytho Quellen-Pfad /usr/libexec/abrt-hook-python Port <Unbekannt> Host wicktop.localdomain Quellen-RPM-Pakete abrt-addon-python-1.0.4-1.fc12 Ziel-RPM-Pakete RPM-Richtlinie selinux-policy-3.6.32-78.fc12 SELinux aktiviert True Richtlinienversion targeted Enforcing-Modus Permissive Plugin-Name catchall Hostname wicktop.localdomain Plattform Linux wicktop.localdomain 2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18 19:52:07 UTC 2010 x86_64 x86_64 Anzahl der Alarme 1 Zuerst gesehen Sa 06 Feb 2010 18:54:41 CET Zuletzt gesehen Sa 06 Feb 2010 18:54:41 CET Lokale ID 5a9b05e9-0f83-4230-b07b-7a898b0093b8 Zeilennummern Raw-Audit-Meldungen node=wicktop.localdomain type=AVC msg=audit(1265478881.732:30842): avc: denied { create } for pid=2649 comm="abrt-hook-pytho" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tclass=unix_dgram_socket node=wicktop.localdomain type=SYSCALL msg=audit(1265478881.732:30842): arch=c000003e syscall=41 success=yes exit=3 a0=1 a1=80002 a2=0 a3=676f6c2f7665642f items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null) Zusammenfassung: SELinux is preventing /usr/libexec/abrt-hook-python "connect" access. Detaillierte Beschreibung: [SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.] SELinux denied access requested by abrt-hook-pytho. It is not expected that this access is required by abrt-hook-pytho and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Zugriff erlauben: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Zusätzliche Informationen: Quellkontext unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c 1023 Zielkontext unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c 1023 Zielobjekte None [ unix_dgram_socket ] Quelle abrt-hook-pytho Quellen-Pfad /usr/libexec/abrt-hook-python Port <Unbekannt> Host wicktop.localdomain Quellen-RPM-Pakete abrt-addon-python-1.0.4-1.fc12 Ziel-RPM-Pakete RPM-Richtlinie selinux-policy-3.6.32-78.fc12 SELinux aktiviert True Richtlinienversion targeted Enforcing-Modus Permissive Plugin-Name catchall Hostname wicktop.localdomain Plattform Linux wicktop.localdomain 2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18 19:52:07 UTC 2010 x86_64 x86_64 Anzahl der Alarme 2 Zuerst gesehen Sa 06 Feb 2010 18:54:41 CET Zuletzt gesehen Sa 06 Feb 2010 18:54:41 CET Lokale ID b070cd81-1470-4b85-9c0a-4138fa4ae1bc Zeilennummern Raw-Audit-Meldungen node=wicktop.localdomain type=AVC msg=audit(1265478881.733:30843): avc: denied { connect } for pid=2649 comm="abrt-hook-pytho" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tclass=unix_dgram_socket node=wicktop.localdomain type=AVC msg=audit(1265478881.733:30843): avc: denied { sendto } for pid=2649 comm="abrt-hook-pytho" path="/dev/log" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket node=wicktop.localdomain type=SYSCALL msg=audit(1265478881.733:30843): arch=c000003e syscall=42 success=yes exit=128 a0=3 a1=32cf9761a0 a2=6e a3=676f6c2f7665642f items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null)
Christoph, could you make sure your policy was successfully installed. Execute yum reinstall selinux-policy-targeted And make sure nothing breaks on the re-install.
I upgraded to selinux-policy-3.6.32-82.fc12 from updates testing and the bug is now fixed. Thanks! *** This bug has been marked as a duplicate of bug 559437 ***