Bug 591119 - SELinux is preventing /usr/bin/abrt-pyhook-helper "search" access on /var/cache/abrt.
Summary: SELinux is preventing /usr/bin/abrt-pyhook-helper "search" access on /var/cac...
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
Whiteboard: setroubleshoot_trace_hash:a82914c982e...
Depends On:
TreeView+ depends on / blocked
Reported: 2010-05-11 13:36 UTC by cort3z
Modified: 2010-05-11 14:27 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2010-05-11 14:27:10 UTC
Type: ---

Attachments (Terms of Use)

Description cort3z 2010-05-11 13:36:57 UTC

SELinux is preventing /usr/bin/abrt-pyhook-helper "search" access on

Szczegółowy opis:

SELinux denied access requested by abrt-pyhook-hel. It is not expected that this
access is required by abrt-pyhook-hel and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Zezwalanie na dostęp:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug

Dodatkowe informacje:

Kontekst źródłowy          system_u:system_r:xdm_t:s0-s0:c0.c1023
Kontekst docelowy             system_u:object_r:abrt_var_cache_t:s0
Obiekty docelowe              /var/cache/abrt [ dir ]
Źródło                     abrt-pyhook-hel
Ścieżka źródłowa         /usr/bin/abrt-pyhook-helper
Port                          <Nieznane>
Komputer                      (removed)
Źródłowe pakiety RPM       abrt-addon-python-0.0.11-1.fc12
Docelowe pakiety RPM          abrt-0.0.11-1.fc12
Pakiet RPM polityki           selinux-policy-3.6.32-41.fc12
SELinux jest włączony       True
Typ polityki                  targeted
MLS jest włączone           True
Tryb wymuszania               Enforcing
Nazwa wtyczki                 catchall
Nazwa komputera               (removed)
Platforma                     Linux Black #1 SMP Sat Nov
                              7 21:41:45 EST 2009 i686 i686
Liczba alarmów               2
Po raz pierwszy               wto, 11 maj 2010, 15:08:12
Po raz ostatni                wto, 11 maj 2010, 15:08:12
Lokalny identyfikator         9f9d76c7-49c1-42c6-ade8-09d55de42446
Liczba wierszy                

Surowe komunikaty audytu      

node=Black type=AVC msg=audit(1273583292.813:10): avc:  denied  { search } for  pid=1563 comm="abrt-pyhook-hel" name="abrt" dev=dm-0 ino=23568 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:abrt_var_cache_t:s0 tclass=dir

node=Black type=SYSCALL msg=audit(1273583292.813:10): arch=40000003 syscall=83 success=no exit=-13 a0=bf9cc9be a1=9ba90cc a2=3efc990 a3=bf9cc9ae items=0 ppid=1515 pid=1563 auid=4294967295 uid=42 gid=481 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="abrt-pyhook-hel" exe="/usr/bin/abrt-pyhook-helper" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)

Hash String generated from  selinux-policy-3.6.32-41.fc12,catchall,abrt-pyhook-hel,xdm_t,abrt_var_cache_t,dir,search
audit2allow suggests:

#============= xdm_t ==============
allow xdm_t abrt_var_cache_t:dir search;

Comment 1 Miroslav Grepl 2010-05-11 14:27:10 UTC
please run:

yum update

Note You need to log in before you can comment on or make changes to this bug.