Summary: SELinux is preventing /usr/libexec/accounts-daemon "getattr" access on /etc/shadow. Detailed Description: [accounts-daemon has a permissive type (accountsd_t). This access was not denied.] SELinux denied access requested by accounts-daemon. It is not expected that this access is required by accounts-daemon and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:accountsd_t:s0-s0:c0.c1023 Target Context system_u:object_r:shadow_t:s0 Target Objects /etc/shadow [ file ] Source accounts-daemon Source Path /usr/libexec/accounts-daemon Port <Unknown> Host (removed) Source RPM Packages accountsservice-0.6-2.fc13 Target RPM Packages setup-2.8.15-1.fc13 Policy RPM selinux-policy-3.7.16-2.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.33.1-24.fc13.x86_64 #1 SMP Tue Mar 30 18:21:22 UTC 2010 x86_64 x86_64 Alert Count 1 First Seen Mon 12 Apr 2010 03:23:17 PM MDT Last Seen Mon 12 Apr 2010 03:23:17 PM MDT Local ID d1cd857f-80e3-4e1f-b7e8-474549da1cac Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1271107397.639:23669): avc: denied { getattr } for pid=2151 comm="accounts-daemon" path="/etc/shadow" dev=sdb1 ino=66 scontext=system_u:system_r:accountsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shadow_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1271107397.639:23669): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fffd8e238f0 a2=7fffd8e238f0 a3=0 items=0 ppid=1 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="accounts-daemon" exe="/usr/libexec/accounts-daemon" subj=system_u:system_r:accountsd_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,accounts-daemon,accountsd_t,shadow_t,file,getattr audit2allow suggests: #============= accountsd_t ============== allow accountsd_t shadow_t:file getattr;
I had installed the accountsdialog and accountsservice packages and used the UI to give myself "administrator" status. After logging in following a reboot, this AVC message appears. This message is accompanied by the one in Bug 581660.
*** This bug has been marked as a duplicate of bug 581660 ***