Bug 676742 - SELinux is preventing the modification of the running policy.
Summary: SELinux is preventing the modification of the running policy.
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.0
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: BaseOS QE Security Team
URL:
Whiteboard: setroubleshoot_trace_hash:4d1879e0881...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-02-11 00:34 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 14:34 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-10 10:15:48 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Red Hat Case Diagnostics 2011-02-11 00:34:10 UTC
Summary:

SELinux is preventing the modification of the running policy.

Detailed Description:

SELinux has denied the management tools from modifying the way the SELinux
policy runs. This machine is hardened, so if you did not run any SELinux tools,
this probably signals an intrusion.

Allowing Access:

If you want to modify the way SELinux is running on your machine you need to
bring the machine to single user mode with enforcing turned off. The turn off
the secure_mode_policyload boolean: "setsebool -P secure_mode_policyload=0".

Additional Information:

Source Context                unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1
                              023
Target Context                system_u:object_r:security_t:s0
Target Objects                None [ security ]
Source                        /usr/share/syst
Source Path                   /usr/bin/python
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           python-2.6.5-3.el6
Target RPM Packages           
Policy RPM                    selinux-policy-3.7.19-54.el6_0.3
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   secure_mode_policyload
Host Name                     (removed)
Platform                      Linux (removed) 2.6.32-71.14.1.el6.x86_64 #1 SMP
                              Wed Jan 5 17:01:01 EST 2011 x86_64 x86_64
Alert Count                   1
First Seen                    Thu 10 Feb 2011 06:27:59 PM CST
Last Seen                     Thu 10 Feb 2011 06:27:59 PM CST
Local ID                      1a1fac17-89d9-4810-a7ce-e492f4bb856a
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1297384079.729:25291): avc:  denied  { setenforce } for  pid=2552 comm="/usr/share/syst" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security

node=(removed) type=SYSCALL msg=audit(1297384079.729:25291): arch=c000003e syscall=1 success=no exit=-13 a0=10 a1=7fff19baf4d0 a2=1 a3=fffffff8 items=0 ppid=2545 pid=2552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="/usr/share/syst" exe="/usr/bin/python" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  secure_mode_policyload,/usr/share/syst,unconfined_t,security_t,security,setenforce
audit2allow suggests:

#============= unconfined_t ==============
#!!!! This avc can be allowed using the boolean 'secure_mode_policyload'

allow unconfined_t security_t:security setenforce;

Comment 3 Daniel Walsh 2011-02-11 16:10:31 UTC
Did you turn on the secure_mode_policyload boolean?


Note You need to log in before you can comment on or make changes to this bug.