Bug 704827 - SELinux is preventing /usr/libexec/colord from using the 'dac_override' capabilities.
Summary: SELinux is preventing /usr/libexec/colord from using the 'dac_override' capab...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:2064399ff19...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-05-15 10:47 UTC by Nicolas Mailhot
Modified: 2011-11-21 16:41 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-11-21 16:41:05 UTC
Type: ---


Attachments (Terms of Use)

Description Nicolas Mailhot 2011-05-15 10:47:36 UTC
SELinux is preventing /usr/libexec/colord from using the 'dac_override' capabilities.

*****  Plugin dac_override (91.4 confidence) suggests  ***********************

If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system
Then turn on full auditing to get path information about the offending file and generate the error again.
Do

Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it, 
otherwise report as a bugzilla.

*****  Plugin catchall (9.59 confidence) suggests  ***************************

If you believe that colord should have the dac_override capability by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep colord /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Objects                Unknown [ capability ]
Source                        colord
Source Path                   /usr/libexec/colord
Port                          <Inconnu>
Host                          (removed)
Source RPM Packages           colord-0.1.7-1.fc16
Target RPM Packages           
Policy RPM                    selinux-policy-3.9.16-23.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 2.6.39-0.rc7.git6.1.fc16.x86_64 #1
                              SMP Sat May 14 16:32:45 UTC 2011 x86_64 x86_64
Alert Count                   8
First Seen                    sam. 07 mai 2011 13:41:56 CEST
Last Seen                     dim. 15 mai 2011 12:45:48 CEST
Local ID                      1ef33176-1a8c-4cc2-915c-d16ab5f1fc48

Raw Audit Messages
type=AVC msg=audit(1305456348.805:88): avc:  denied  { dac_override } for  pid=1380 comm="colord" capability=1  scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tclass=capability


type=SYSCALL msg=audit(1305456348.805:88): arch=x86_64 syscall=open success=yes exit=EEXIST a0=cf6420 a1=0 a2=1b6 a3=0 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=colord exe=/usr/libexec/colord subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null)

Hash: colord,colord_t,colord_t,capability,dac_override

audit2allow

#============= colord_t ==============
allow colord_t self:capability dac_override;

audit2allow -R

#============= colord_t ==============
allow colord_t self:capability dac_override;

Comment 1 Miroslav Grepl 2011-05-16 05:54:34 UTC
Did you read the alert?

*****  Plugin dac_override (91.4 confidence) suggests  ***********************

If you want to help identify if domain needs this access or you have a file
with the wrong permissions on your system
Then turn on full auditing to get path information about the offending file and
generate the error again.
Do

Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it, 
otherwise report as a bugzilla.

Comment 2 Miroslav Grepl 2011-10-10 13:44:36 UTC
*** Bug 744617 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.