Bug 566072 - SELinux is preventing useradd (useradd_t) "read write" unconfined_t.
Summary: SELinux is preventing useradd (useradd_t) "read write" unconfined_t.
Keywords:
Status: CLOSED DUPLICATE of bug 538428
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:01d6ef1c80d...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-02-17 04:33 UTC by Weonjong Lee
Modified: 2010-02-17 13:58 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2010-02-17 13:58:35 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Weonjong Lee 2010-02-17 04:33:50 UTC
요약:

SELinux is preventing useradd (useradd_t) "read write" unconfined_t.

상세 설명:

[useradd은(는) 허용 유형 (useradd_t)이 있습니다. 이 액세스는
거부되지 않습니다. ]

SELinux denied access requested by useradd. It is not expected that this access
is required by useradd and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

액세스 허용:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

자세한 정보:

소스 문맥                 unconfined_u:system_r:useradd_t:s0-s0:c0.c1023
대상 문맥                 unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1
                              023
대상 객체                 socket [ unix_stream_socket ]
소스                        useradd
소스 경로                 /usr/sbin/useradd
포트                        <알려지지 않음>
호스트                     (removed)
소스 RPM 패키지          shadow-utils-4.1.1-4.fc9
대상 RPM 패키지          
정책 RPM                    selinux-policy-3.3.1-111.fc9
Selinux 활성화             True
정책 유형                 targeted
강제 모드                 Enforcing
플러그인명               catchall
호스트명                  (removed)
플랫폼                     Linux (removed) 2.6.27.7-53.fc9.x86_64 #1 SMP
                              Thu Nov 27 02:05:02 EST 2008 x86_64 x86_64
통지 카운트              5
초기 화면                 2008년 12월 08일 (월) 오후 03시 57분 00초
마지막 화면              2008년 12월 21일 (일) 오후 04시 15분 15초
로컬 ID                     20ad1269-c7ed-42bf-aed4-fedf33eba662
줄 번호                    

원 감사 메세지          

node=(removed) type=AVC msg=audit(1229843715.240:559): avc:  denied  { read write } for  pid=32094 comm="useradd" path="socket:[62390]" dev=sockfs ino=62390 scontext=unconfined_u:system_r:useradd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=unix_stream_socket

node=(removed) type=SYSCALL msg=audit(1229843715.240:559): arch=c000003e syscall=59 success=yes exit=0 a0=1c70eb0 a1=1c6e430 a2=1c6de70 a3=3e23167a70 items=0 ppid=32093 pid=32094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="useradd" exe="/usr/sbin/useradd" subj=unconfined_u:system_r:useradd_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  catchall,useradd,useradd_t,unconfined_t,unix_stream_socket,read,write
audit2allow suggests:

#============= useradd_t ==============
#!!!! This avc is allowed in the current policy

allow useradd_t unconfined_t:unix_stream_socket { read write };

Comment 1 Daniel Walsh 2010-02-17 13:58:35 UTC

*** This bug has been marked as a duplicate of bug 538428 ***


Note You need to log in before you can comment on or make changes to this bug.