Bug 765680 - xguest fails to install
Summary: xguest fails to install
Keywords:
Status: CLOSED DUPLICATE of bug 760813
Alias: None
Product: Fedora
Classification: Fedora
Component: xguest
Version: 16
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-12-09 05:06 UTC by bodhi.zazen
Modified: 2011-12-09 08:45 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-12-09 08:45:02 UTC
Type: ---


Attachments (Terms of Use)

Description bodhi.zazen 2011-12-09 05:06:27 UTC
Description of problem: xguest fails to install

I understand there are several reports of this, but looking at the other reports I do not think this is a duplicate.


Version-Release number of selected component (if applicable):

xguest-1.0.10-1.fc16.noarch

How reproducible:Always


Steps to Reproduce:
1. yum install xguest
  
Actual results:

xguest fails


Downloading Packages:
xguest-1.0.10-1.fc16.noarch.rpm                          |  60 kB     00:00     
Running Transaction Check
Running Transaction Test
Transaction Test Succeeded
Running Transaction
Error in PREIN scriptlet in rpm package xguest-1.0.10-1.fc16.noarch
error: %pre(xguest-1.0.10-1.fc16.noarch) scriptlet failed, exit status 1

Failed:
  xguest.noarch 0:1.0.10-1.fc16    


Expected results:

xguest installs

Additional info:

I use confined users , and my avc denial thus looks different

avc denial 

Raw denials (2)

type=AVC msg=audit(1323406488.177:227): avc:  denied  { write } for  pid=9511 comm="useradd" name="xguest" dev=sdb1 ino=271478 scontext=staff_u:system_r:useradd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir


type=SYSCALL msg=audit(1323406488.177:227): arch=x86_64 syscall=mkdir success=no exit=EACCES a0=7fff5f1d15ed a1=0 a2=0 a3=6165726373662f72 items=0 ppid=9510 pid=9511 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=21 comm=useradd exe=/usr/sbin/useradd subj=staff_u:system_r:useradd_t:s0-s0:c0.c1023 key=(null)


audit2allow

#============= useradd_t ==============
#!!!! The source type 'useradd_t' can write to a 'dir' of the following types:
# user_home_dir_t, httpd_user_content_type, mail_spool_t, etc_t, httpd_user_script_exec_type, user_home_type, pcscd_var_run_t, home_root_t

allow useradd_t var_lib_t:dir write;

audit2allow -R

#============= useradd_t ==============
#!!!! The source type 'useradd_t' can write to a 'dir' of the following types:
# user_home_dir_t, httpd_user_content_type, mail_spool_t, etc_t, httpd_user_script_exec_type, user_home_type, pcscd_var_run_t, home_root_t

allow useradd_t var_lib_t:dir write;

Comment 1 Miroslav Grepl 2011-12-09 08:45:02 UTC

*** This bug has been marked as a duplicate of bug 760813 ***


Note You need to log in before you can comment on or make changes to this bug.