Bug 574919 - SELinux is preventing /sbin/reboot "execute" access on /sbin/shutdown.
Summary: SELinux is preventing /sbin/reboot "execute" access on /sbin/shutdown.
Keywords:
Status: CLOSED DUPLICATE of bug 574138
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 13
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:c6ef5dc997d...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-03-18 20:05 UTC by Martin Naď
Modified: 2010-03-19 06:35 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-03-19 06:35:12 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Martin Naď 2010-03-18 20:05:56 UTC
Souhrn:

SELinux is preventing /sbin/reboot "execute" access on /sbin/shutdown.

Podrobný popis:

SELinux denied access requested by poweroff. It is not expected that this access
is required by poweroff and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Povolení přístupu:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Další informace:

Kontext zdroje                system_u:system_r:xdm_t:s0-s0:c0.c1023
Kontext cíle                 system_u:object_r:shutdown_exec_t:s0
Objekty cíle                 /sbin/shutdown [ file ]
Zdroj                         reboot
Cesta zdroje                  /sbin/reboot
Port                          <Neznámé>
Počítač                    (removed)
RPM balíčky zdroje          upstart-0.6.5-3.fc13
RPM balíčky cíle           upstart-0.6.5-3.fc13
RPM politiky                  selinux-policy-3.7.14-3.fc13
Selinux povolen               True
Typ politiky                  targeted
Vynucovací režim            Enforcing
Název zásuvného modulu     catchall
Název počítače            (removed)
Platforma                     Linux localhost.localdomain 2.6.33-10.fc13.i686 #1
                              SMP Sun Mar 14 21:05:05 EDT 2010 i686 i686
Počet upozornění           2
Poprvé viděno               Út 16. březen 2010, 21:35:10 CET
Naposledy viděno             Čt 18. březen 2010, 07:14:31 CET
Místní ID                   817f93df-29d4-44ed-8793-42d643f4cbd6
Čísla řádků              

Původní zprávy auditu      

node=localhost.localdomain type=AVC msg=audit(1268892871.508:15783): avc:  denied  { execute } for  pid=19869 comm="poweroff" name="shutdown" dev=sda2 ino=33709 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shutdown_exec_t:s0 tclass=file

node=localhost.localdomain type=SYSCALL msg=audit(1268892871.508:15783): arch=40000003 syscall=11 success=no exit=-13 a0=804994c a1=bfa9c03c a2=bfa9c11c a3=2 items=0 ppid=1047 pid=19869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="poweroff" exe="/sbin/reboot" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  catchall,reboot,xdm_t,shutdown_exec_t,file,execute
audit2allow suggests:

#============= xdm_t ==============
allow xdm_t shutdown_exec_t:file execute;

Comment 1 Miroslav Grepl 2010-03-19 06:35:12 UTC

*** This bug has been marked as a duplicate of bug 574138 ***


Note You need to log in before you can comment on or make changes to this bug.