Summary: SELinux is preventing /usr/bin/python "write" access . Detailed Description: [system-config-f has a permissive type (firewallgui_t). This access was not denied.] SELinux denied access requested by system-config-f. It is not expected that this access is required by system-config-f and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:firewallgui_t:s0-s0:c0.c1023 Target Context system_u:system_r:firewallgui_t:s0-s0:c0.c1023 Target Objects None [ unix_dgram_socket ] Source system-config-f Source Path /usr/bin/python Port <Unknown> Host (removed) Source RPM Packages python-2.6.2-2.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-84.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.12-174.2.19.fc12.i686 #1 SMP Thu Feb 11 07:39:11 UTC 2010 i686 i686 Alert Count 1 First Seen Fri 19 Feb 2010 01:13:32 PM PST Last Seen Fri 19 Feb 2010 01:13:32 PM PST Local ID ac1eac4d-c43d-48f1-9999-36ec3734201f Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1266614012.295:40): avc: denied { write } for pid=2168 comm="system-config-f" scontext=system_u:system_r:firewallgui_t:s0-s0:c0.c1023 tcontext=system_u:system_r:firewallgui_t:s0-s0:c0.c1023 tclass=unix_dgram_socket node=(removed) type=SYSCALL msg=audit(1266614012.295:40): arch=40000003 syscall=102 success=yes exit=142 a0=9 a1=bfc52798 a2=ca2ff4 a3=14 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="system-config-f" exe="/usr/bin/python" subj=system_u:system_r:firewallgui_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,system-config-f,firewallgui_t,firewallgui_t,unix_dgram_socket,write audit2allow suggests: #============= firewallgui_t ============== allow firewallgui_t self:unix_dgram_socket write;
*** This bug has been marked as a duplicate of bug 566824 ***