Summary: SELinux is preventing /usr/sbin/logrotate "read" access on /var/stockmaniac/templates_cache. Detailed Description: SELinux denied access requested by logrotate. It is not expected that this access is required by logrotate and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:logrotate_t:s0-s0:c0.c1023 Target Context system_u:object_r:var_t:s0 Target Objects /var/stockmaniac/templates_cache [ dir ] Source logrotate Source Path /usr/sbin/logrotate Port <Unknown> Host (removed) Source RPM Packages logrotate-3.7.8-9.fc13 Target RPM Packages stockmaniac-gui-0.16.1-1.fc13 Policy RPM selinux-policy-3.7.19-76.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.34.7-63.fc13.i686 #1 SMP Fri Dec 3 12:35:44 UTC 2010 i686 i686 Alert Count 9 First Seen Sun 26 Dec 2010 04:32:19 AM EST Last Seen Tue 28 Dec 2010 03:20:27 AM EST Local ID 7b5f2f38-fa5c-4879-8527-3d1a5f6b69d5 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1293524427.283:395702): avc: denied { read } for pid=10618 comm="logrotate" name="templates_cache" dev=dm-0 ino=1062733 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1293524427.283:395702): arch=40000003 syscall=5 success=no exit=-13 a0=bfdc9890 a1=98800 a2=bf5ff4 a3=0 items=0 ppid=10616 pid=10618 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8873 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,logrotate,logrotate_t,var_t,dir,read audit2allow suggests: #============= logrotate_t ============== allow logrotate_t var_t:dir read;
# semanage fcontext -a -t var_log_t '/var/stockmaniac/templates_cache(/.*)?' # restorecon -R -v /var/stockmaniac Miroslav lets set up this labeling.
Fixed in selinux-policy-3.9.7-20.fc14
selinux-policy-3.9.7-20.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-20.fc14
selinux-policy-3.9.7-20.fc14 has been pushed to the Fedora 14 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-20.fc14
selinux-policy-3.9.7-20.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report.