Bug 873731 - SELinux is preventing /usr/bin/totem-video-thumbnailer from 'rename' accesses on the file registry.x86_64.bin.tmpUE1KNW.
Summary: SELinux is preventing /usr/bin/totem-video-thumbnailer from 'rename' accesses...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 17
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:07c27ff779c925351dbbb638fd9...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-06 15:23 UTC by L34ks
Modified: 2012-11-06 16:45 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-11-06 16:45:21 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: type (9 bytes, text/plain)
2012-11-06 15:23 UTC, L34ks
no flags Details
File: hashmarkername (14 bytes, text/plain)
2012-11-06 15:23 UTC, L34ks
no flags Details

Description L34ks 2012-11-06 15:23:36 UTC
Additional info:
libreport version: 2.0.18
kernel:         3.6.3-1.fc17.x86_64

description:
:SELinux is preventing /usr/bin/totem-video-thumbnailer from 'rename' accesses on the file registry.x86_64.bin.tmpUE1KNW.
:
:*****  Plugin catchall (100. confidence) suggests  ***************************
:
:If you believe that totem-video-thumbnailer should be allowed rename access on the registry.x86_64.bin.tmpUE1KNW file by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep totem-video-thu /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023
:Target Context                unconfined_u:object_r:admin_home_t:s0
:Target Objects                registry.x86_64.bin.tmpUE1KNW [ file ]
:Source                        totem-video-thu
:Source Path                   /usr/bin/totem-video-thumbnailer
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           totem-3.4.3-1.fc17.x86_64
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-156.fc17.noarch
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Permissive
:Host Name                     (removed)
:Platform                      Linux (removed) 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct
:                              22 15:32:35 UTC 2012 x86_64 x86_64
:Alert Count                   1
:First Seen                    2012-11-06 22:55:49 MYT
:Last Seen                     2012-11-06 22:55:49 MYT
:Local ID                      0d6f20e5-fa7d-42aa-b1ac-afe76fea949a
:
:Raw Audit Messages
:type=AVC msg=audit(1352213749.621:187): avc:  denied  { rename } for  pid=4527 comm="totem-video-thu" name="registry.x86_64.bin.tmpUE1KNW" dev="dm-1" ino=1573948 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:admin_home_t:s0 tclass=file
:
:
:type=SYSCALL msg=audit(1352213749.621:187): arch=x86_64 syscall=rename success=yes exit=0 a0=1337240 a1=105a800 a2=106d6c0 a3=33 items=0 ppid=4500 pid=4527 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=2 comm=totem-video-thu exe=/usr/bin/totem-video-thumbnailer subj=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 key=(null)
:
:Hash: totem-video-thu,thumb_t,admin_home_t,file,rename
:
:audit2allow
:
:#============= thumb_t ==============
:allow thumb_t admin_home_t:file rename;
:
:audit2allow -R
:
:#============= thumb_t ==============
:allow thumb_t admin_home_t:file rename;
:

Comment 1 L34ks 2012-11-06 15:23:40 UTC
Created attachment 639411 [details]
File: type

Comment 2 L34ks 2012-11-06 15:23:43 UTC
Created attachment 639412 [details]
File: hashmarkername

Comment 3 Daniel Walsh 2012-11-06 16:45:21 UTC
You are running nautilus as root, which is very dangerous.  You are also running lots of code as root to display content and is attempting to write in the root homedir.

restorecon -R -v /root

Might cleanup some of this, but I am not sure how much of this we should allow.


Note You need to log in before you can comment on or make changes to this bug.