Bug 878443 - SELinux is preventing plugin-containe from 'name_connect' accesses on the tcp_socket .
Summary: SELinux is preventing plugin-containe from 'name_connect' accesses on the tcp...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 17
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:c24467607abae4fb572572fa8f6...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-20 12:57 UTC by pooky2012cn
Modified: 2012-11-20 15:25 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2012-11-20 15:25:24 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: type (9 bytes, text/plain)
2012-11-20 12:57 UTC, pooky2012cn
no flags Details
File: hashmarkername (14 bytes, text/plain)
2012-11-20 12:57 UTC, pooky2012cn
no flags Details

Description pooky2012cn 2012-11-20 12:57:37 UTC
Additional info:
libreport version: 2.0.18
kernel:         3.3.4-5.fc17.i686

description:
:SELinux is preventing plugin-containe from 'name_connect' accesses on the tcp_socket .
:
:*****  Plugin catchall (100. confidence) suggests  ***************************
:
:If you believe that plugin-containe should be allowed name_connect access on the  tcp_socket by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c
:                              0.c1023
:Target Context                system_u:object_r:xserver_port_t:s0
:Target Objects                 [ tcp_socket ]
:Source                        plugin-containe
:Source Path                   plugin-containe
:Port                          6001
:Host                          (removed)
:Source RPM Packages           
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-159.fc17.noarch
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.3.4-5.fc17.i686 #1 SMP Mon May 7
:                              17:45:26 UTC 2012 i686 i686
:Alert Count                   1
:First Seen                    2012-11-20 20:45:12 CST
:Last Seen                     2012-11-20 20:45:12 CST
:Local ID                      7be78866-d43e-40cc-aad9-bcb7ffcbc3be
:
:Raw Audit Messages
:type=AVC msg=audit(1353415512.778:191): avc:  denied  { name_connect } for  pid=758 comm="plugin-containe" dest=6001 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_port_t:s0 tclass=tcp_socket
:
:
:Hash: plugin-containe,mozilla_plugin_t,xserver_port_t,tcp_socket,name_connect
:
:audit2allowunable to open /sys/fs/selinux/policy:  Permission denied
:
:
:audit2allow -Runable to open /sys/fs/selinux/policy:  Permission denied
:
:


Potential duplicate bug: 744319

Comment 1 pooky2012cn 2012-11-20 12:57:41 UTC
Created attachment 648441 [details]
File: type

Comment 2 pooky2012cn 2012-11-20 12:57:47 UTC
Created attachment 648442 [details]
File: hashmarkername

Comment 3 Miroslav Grepl 2012-11-20 15:25:24 UTC
Any idea of what plugins you have installed? Are you able to re-create it? Does everything work? 

This is something what we don't want to allow.


Note You need to log in before you can comment on or make changes to this bug.