Bug 741757 - SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls.
Summary: SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls.
Keywords:
Status: CLOSED DUPLICATE of bug 741755
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:bca0b63a5c0...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-09-27 20:04 UTC by doctore
Modified: 2011-09-30 19:42 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-09-28 14:47:47 UTC
Type: ---


Attachments (Terms of Use)

Description doctore 2011-09-27 20:04:25 UTC
SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls.

*****  Plugin catchall (100. confidence) suggests  ***************************

If aby bash powinno mieć domyślnie execute dostęp do ls file.
Then proszę to zgłosić jako błąd.
Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp.
Do
można tymczasowo zezwolić na ten dostęp wykonując polecenia:
# grep sh /var/log/audit/audit.log | audit2allow -M moja_polityka
# semodule -i moja_polityka.pp

Additional Information:
Source Context                system_u:system_r:colord_t:s0-s0:c0.c1023
Target Context                system_u:object_r:bin_t:s0
Target Objects                /bin/ls [ file ]
Source                        sh
Source Path                   /bin/bash
Port                          <Nieznane>
Host                          (removed)
Source RPM Packages           bash-4.2.10-4.fc15
Target RPM Packages           coreutils-8.10-2.fc15
Policy RPM                    selinux-policy-3.9.16-38.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 2.6.40.4-5.fc15.x86_64 #1 SMP
                              Tue Aug 30 14:38:32 UTC 2011 x86_64 x86_64
Alert Count                   63
First Seen                    nie, 26 cze 2011, 16:07:42
Last Seen                     wto, 27 wrz 2011, 21:56:32
Local ID                      9bd4b2c2-fcdf-4c60-9a28-0b2c2baa16d7

Raw Audit Messages
type=AVC msg=audit(1317153392.532:31): avc:  denied  { execute } for  pid=1187 comm="sh" name="ls" dev=dm-1 ino=5599 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file


type=SYSCALL msg=audit(1317153392.532:31): arch=x86_64 syscall=access success=yes exit=0 a0=c33820 a1=1 a2=0 a3=1 items=0 ppid=1179 pid=1187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=sh exe=/bin/bash subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null)

Hash: sh,colord_t,bin_t,file,execute

audit2allow

#============= colord_t ==============
allow colord_t bin_t:file execute;

audit2allow -R

#============= colord_t ==============
allow colord_t bin_t:file execute;

Comment 1 Daniel Walsh 2011-09-28 14:47:47 UTC

*** This bug has been marked as a duplicate of bug 741755 ***


Note You need to log in before you can comment on or make changes to this bug.