Bug 579636 - SELinux is preventing /usr/libexec/accounts-daemon "read" access on /etc/shadow.
Summary: SELinux is preventing /usr/libexec/accounts-daemon "read" access on /etc...
Keywords:
Status: CLOSED DUPLICATE of bug 579047
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 13
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:c4a3d28e28c...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-04-06 05:42 UTC by Michal Schmidt
Modified: 2010-04-06 05:43 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2010-04-06 05:43:24 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michal Schmidt 2010-04-06 05:42:48 UTC
Souhrn:

SELinux is preventing /usr/libexec/accounts-daemon "read" access on /etc/shadow.

Podrobný popis:

[SELinux je v tolerantním režimu. Přístup byl povolen.]

SELinux denied access requested by accounts-daemon. It is not expected that this
access is required by accounts-daemon and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Povolení přístupu:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Další informace:

Kontext zdroje                system_u:system_r:accountsd_t:s0-s0:c0.c1023
Kontext cíle                 system_u:object_r:shadow_t:s0
Objekty cíle                 /etc/shadow [ file ]
Zdroj                         accounts-daemon
Cesta zdroje                  /usr/libexec/accounts-daemon
Port                          <Neznámé>
Počítač                    (removed)
RPM balíčky zdroje          accountsservice-0.6-1.fc13
RPM balíčky cíle           setup-2.8.15-1.fc13
RPM politiky                  selinux-policy-3.7.16-2.fc13
Selinux povolen               True
Typ politiky                  targeted
Vynucovací režim            Permissive
Název zásuvného modulu     catchall
Název počítače            (removed)
Platforma                     Linux (removed) 2.6.33.1-19.fc13.x86_64 #1 SMP Sat Mar
                              20 02:14:15 UTC 2010 x86_64 x86_64
Počet upozornění           21
Poprvé viděno               Pá 2. duben 2010, 12:15:57 CEST
Naposledy viděno             Út 6. duben 2010, 07:22:23 CEST
Místní ID                   f7419212-0225-4633-8a55-b0e79384f136
Čísla řádků              

Původní zprávy auditu      

node=(removed) type=AVC msg=audit(1270531343.190:20275): avc:  denied  { read } for  pid=1726 comm="accounts-daemon" name="shadow" dev=dm-8 ino=1096 scontext=system_u:system_r:accountsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file

node=(removed) type=AVC msg=audit(1270531343.190:20275): avc:  denied  { open } for  pid=1726 comm="accounts-daemon" name="shadow" dev=dm-8 ino=1096 scontext=system_u:system_r:accountsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file

node=(removed) type=SYSCALL msg=audit(1270531343.190:20275): arch=c000003e syscall=2 success=yes exit=10 a0=7f8e7cdf85ca a1=80000 a2=1b6 a3=0 items=0 ppid=1 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="accounts-daemon" exe="/usr/libexec/accounts-daemon" subj=system_u:system_r:accountsd_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  catchall,accounts-daemon,accountsd_t,shadow_t,file,read
audit2allow suggests:

#============= accountsd_t ==============
allow accountsd_t shadow_t:file { read open };

Comment 1 Michal Schmidt 2010-04-06 05:43:24 UTC

*** This bug has been marked as a duplicate of bug 579047 ***


Note You need to log in before you can comment on or make changes to this bug.