Bug 572058 - SELinux is preventing /sbin/shutdown "read" access on /var/run/shutdown.pid.
Summary: SELinux is preventing /sbin/shutdown "read" access on /var/run/shutdown....
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:11cbc14be88...
: 572060 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-03-10 07:05 UTC by David Becker
Modified: 2010-03-20 03:31 UTC (History)
5 users (show)

Fixed In Version: selinux-policy-3.6.32-103.fc12
Clone Of:
Environment:
Last Closed: 2010-03-20 03:31:51 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description David Becker 2010-03-10 07:05:46 UTC
Zusammenfassung:

SELinux is preventing /sbin/shutdown "read" access on /var/run/shutdown.pid.

Detaillierte Beschreibung:

SELinux denied access requested by shutdown. It is not expected that this access
is required by shutdown and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Zugriff erlauben:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Zusätzliche Informationen:

Quellkontext                  system_u:system_r:consolekit_t:s0-s0:c0.c1023
Zielkontext                   unconfined_u:object_r:var_run_t:s0
Zielobjekte                   /var/run/shutdown.pid [ file ]
Quelle                        shutdown
Quellen-Pfad                  /sbin/shutdown
Port                          <Unbekannt>
Host                          (removed)
Quellen-RPM-Pakete            upstart-0.3.11-3.fc12
Ziel-RPM-Pakete               
RPM-Richtlinie                selinux-policy-3.6.32-92.fc12
SELinux aktiviert             True
Richtlinienversion            targeted
Enforcing-Modus               Enforcing
Plugin-Name                   catchall
Hostname                      (removed)
Plattform                     Linux (removed) 2.6.32.9-67.fc12.x86_64
                              #1 SMP Sat Feb 27 09:26:40 UTC 2010 x86_64 x86_64
Anzahl der Alarme             1
Zuerst gesehen                Mi 10 Mär 2010 03:35:14 CET
Zuletzt gesehen               Mi 10 Mär 2010 03:35:14 CET
Lokale ID                     0da0e115-4e3a-413c-ae10-77bea6fd5154
Zeilennummern                 

Raw-Audit-Meldungen           

node=(removed) type=AVC msg=audit(1268188514.124:55): avc:  denied  { read } for  pid=7376 comm="shutdown" name="shutdown.pid" dev=dm-0 ino=1835730 scontext=system_u:system_r:consolekit_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file

node=(removed) type=SYSCALL msg=audit(1268188514.124:55): arch=c000003e syscall=2 success=no exit=-13 a0=1ae00a0 a1=0 a2=1b6 a3=0 items=0 ppid=7372 pid=7376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="shutdown" exe="/sbin/shutdown" subj=system_u:system_r:consolekit_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  catchall,shutdown,consolekit_t,var_run_t,file,read
audit2allow suggests:

#============= consolekit_t ==============
allow consolekit_t var_run_t:file read;

Comment 1 Daniel Walsh 2010-03-10 14:30:48 UTC
SHutdown is leaking an open file descriptor to its pid file

fcntl(fd, F_SETFD, FD_CLOEXEC)

Comment 2 Daniel Walsh 2010-03-10 14:35:49 UTC
Never mind, I read this wrong.

Consolekit is now executing Shutdown.  Which is manipulating a pid file?

Who created the pid file?

Comment 3 Daniel Walsh 2010-03-10 14:36:26 UTC
*** Bug 572060 has been marked as a duplicate of this bug. ***

Comment 4 Bill Nottingham 2010-03-10 18:21:28 UTC
shutdown itself writes and reads its pid file.

Comment 5 Daniel Walsh 2010-03-10 21:26:30 UTC
Mgrepl, Please apply the shutdown policy I sent you to fix this problem.

Comment 6 Miroslav Grepl 2010-03-15 11:12:46 UTC
Fixed in selinux-policy-3.6.32-102.fc12

Comment 7 Fedora Update System 2010-03-15 22:17:58 UTC
selinux-policy-3.6.32-103.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-103.fc12

Comment 8 Fedora Update System 2010-03-16 23:24:11 UTC
selinux-policy-3.6.32-103.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-103.fc12

Comment 9 Fedora Update System 2010-03-20 03:30:09 UTC
selinux-policy-3.6.32-103.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.