Bug 562440 - SELinux is preventing /usr/libexec/abrt-hook-python "getattr" access on /.
Summary: SELinux is preventing /usr/libexec/abrt-hook-python "getattr" access on /.
Keywords:
Status: CLOSED DUPLICATE of bug 559437
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:886c6379b1a...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-02-06 18:20 UTC by Christoph Wickert
Modified: 2010-02-08 11:52 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-02-08 11:52:59 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Christoph Wickert 2010-02-06 18:20:43 UTC
Zusammenfassung:

SELinux is preventing /usr/libexec/abrt-hook-python "getattr" access on /.

Detaillierte Beschreibung:

[SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.]

SELinux denied access requested by abrt-hook-pytho. It is not expected that this
access is required by abrt-hook-pytho and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Zugriff erlauben:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Zusätzliche Informationen:

Quellkontext                  unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c
                              1023
Zielkontext                   system_u:object_r:fs_t:s0
Zielobjekte                   / [ filesystem ]
Quelle                        abrt-hook-pytho
Quellen-Pfad                  /usr/libexec/abrt-hook-python
Port                          <Unbekannt>
Host                          (removed)
Quellen-RPM-Pakete            abrt-addon-python-1.0.4-1.fc12
Ziel-RPM-Pakete               filesystem-2.4.30-2.fc12
RPM-Richtlinie                selinux-policy-3.6.32-78.fc12
SELinux aktiviert             True
Richtlinienversion            targeted
Enforcing-Modus               Permissive
Plugin-Name                   catchall
Hostname                      (removed)
Plattform                     Linux (removed)
                              2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18
                              19:52:07 UTC 2010 x86_64 x86_64
Anzahl der Alarme             1
Zuerst gesehen                Sa 06 Feb 2010 18:54:41 CET
Zuletzt gesehen               Sa 06 Feb 2010 18:54:41 CET
Lokale ID                     99c6ceaa-8249-409b-9cea-f6549dbe3c52
Zeilennummern                 

Raw-Audit-Meldungen           

node=(removed) type=AVC msg=audit(1265478881.720:30841): avc:  denied  { getattr } for  pid=2649 comm="abrt-hook-pytho" name="/" dev=dm-0 ino=2 scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem

node=(removed) type=SYSCALL msg=audit(1265478881.720:30841): arch=c000003e syscall=137 success=yes exit=128 a0=4021e1 a1=7fffb5ff7fc0 a2=fdf a3=69746361206e6120 items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-78.fc12,catchall,abrt-hook-pytho,abrt_helper_t,fs_t,filesystem,getattr
audit2allow suggests:

#============= abrt_helper_t ==============
allow abrt_helper_t fs_t:filesystem getattr;

Comment 1 Christoph Wickert 2010-02-06 18:23:19 UTC
Here are two more alerts related to this:


Zusammenfassung:

SELinux is preventing /usr/libexec/abrt-hook-python "create" access.

Detaillierte Beschreibung:

[SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.]

SELinux denied access requested by abrt-hook-pytho. It is not expected that this
access is required by abrt-hook-pytho and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Zugriff erlauben:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Zusätzliche Informationen:

Quellkontext                  unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c
                              1023
Zielkontext                   unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c
                              1023
Zielobjekte                   None [ unix_dgram_socket ]
Quelle                        abrt-hook-pytho
Quellen-Pfad                  /usr/libexec/abrt-hook-python
Port                          <Unbekannt>
Host                          wicktop.localdomain
Quellen-RPM-Pakete            abrt-addon-python-1.0.4-1.fc12
Ziel-RPM-Pakete               
RPM-Richtlinie                selinux-policy-3.6.32-78.fc12
SELinux aktiviert             True
Richtlinienversion            targeted
Enforcing-Modus               Permissive
Plugin-Name                   catchall
Hostname                      wicktop.localdomain
Plattform                     Linux wicktop.localdomain
                              2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18
                              19:52:07 UTC 2010 x86_64 x86_64
Anzahl der Alarme             1
Zuerst gesehen                Sa 06 Feb 2010 18:54:41 CET
Zuletzt gesehen               Sa 06 Feb 2010 18:54:41 CET
Lokale ID                     5a9b05e9-0f83-4230-b07b-7a898b0093b8
Zeilennummern                 

Raw-Audit-Meldungen           

node=wicktop.localdomain type=AVC msg=audit(1265478881.732:30842): avc:  denied  { create } for  pid=2649 comm="abrt-hook-pytho" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tclass=unix_dgram_socket

node=wicktop.localdomain type=SYSCALL msg=audit(1265478881.732:30842): arch=c000003e syscall=41 success=yes exit=3 a0=1 a1=80002 a2=0 a3=676f6c2f7665642f items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null)



Zusammenfassung:

SELinux is preventing /usr/libexec/abrt-hook-python "connect" access.

Detaillierte Beschreibung:

[SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.]

SELinux denied access requested by abrt-hook-pytho. It is not expected that this
access is required by abrt-hook-pytho and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Zugriff erlauben:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Zusätzliche Informationen:

Quellkontext                  unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c
                              1023
Zielkontext                   unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c
                              1023
Zielobjekte                   None [ unix_dgram_socket ]
Quelle                        abrt-hook-pytho
Quellen-Pfad                  /usr/libexec/abrt-hook-python
Port                          <Unbekannt>
Host                          wicktop.localdomain
Quellen-RPM-Pakete            abrt-addon-python-1.0.4-1.fc12
Ziel-RPM-Pakete               
RPM-Richtlinie                selinux-policy-3.6.32-78.fc12
SELinux aktiviert             True
Richtlinienversion            targeted
Enforcing-Modus               Permissive
Plugin-Name                   catchall
Hostname                      wicktop.localdomain
Plattform                     Linux wicktop.localdomain
                              2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18
                              19:52:07 UTC 2010 x86_64 x86_64
Anzahl der Alarme             2
Zuerst gesehen                Sa 06 Feb 2010 18:54:41 CET
Zuletzt gesehen               Sa 06 Feb 2010 18:54:41 CET
Lokale ID                     b070cd81-1470-4b85-9c0a-4138fa4ae1bc
Zeilennummern                 

Raw-Audit-Meldungen           

node=wicktop.localdomain type=AVC msg=audit(1265478881.733:30843): avc:  denied  { connect } for  pid=2649 comm="abrt-hook-pytho" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tclass=unix_dgram_socket

node=wicktop.localdomain type=AVC msg=audit(1265478881.733:30843): avc:  denied  { sendto } for  pid=2649 comm="abrt-hook-pytho" path="/dev/log" scontext=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket

node=wicktop.localdomain type=SYSCALL msg=audit(1265478881.733:30843): arch=c000003e syscall=42 success=yes exit=128 a0=3 a1=32cf9761a0 a2=6e a3=676f6c2f7665642f items=0 ppid=2637 pid=2649 auid=500 uid=500 gid=500 euid=488 suid=488 fsuid=488 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="abrt-hook-pytho" exe="/usr/libexec/abrt-hook-python" subj=unconfined_u:unconfined_r:abrt_helper_t:s0-s0:c0.c1023 key=(null)

Comment 2 Miroslav Grepl 2010-02-08 11:42:31 UTC
Christoph,

could you make sure your policy was successfully installed. Execute

yum reinstall selinux-policy-targeted


And make sure nothing breaks on the re-install.

Comment 3 Christoph Wickert 2010-02-08 11:52:59 UTC
I upgraded to selinux-policy-3.6.32-82.fc12 from updates testing and the bug is now fixed. Thanks!

*** This bug has been marked as a duplicate of bug 559437 ***


Note You need to log in before you can comment on or make changes to this bug.