Bug 887087 - SELinux is preventing /usr/lib64/realmd/realmd from 'read' accesses on the file /proc/<pid>/cmdline.
Summary: SELinux is preventing /usr/lib64/realmd/realmd from 'read' accesses on the fi...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 18
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:6342e1fa1e6e38b55f9c59209a4...
: 886949 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-12-14 02:23 UTC by Dale Turner
Modified: 2012-12-18 06:54 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-12-18 06:54:00 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Dale Turner 2012-12-14 02:23:53 UTC
Description of problem:
SELinux is preventing /usr/lib64/realmd/realmd from 'read' accesses on the file /proc/<pid>/cmdline.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that realmd should be allowed read access on the cmdline file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep realmd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:realmd_t:s0-s0:c0.c1023
Target Context                system_u:system_r:xdm_t:s0-s0:c0.c1023
Target Objects                /proc/<pid>/cmdline [ file ]
Source                        realmd
Source Path                   /usr/lib64/realmd/realmd
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           realmd-0.12-1.fc18.x86_64
Target RPM Packages           
Policy RPM                    selinux-policy-3.11.1-62.fc18.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 3.6.10-4.fc18.x86_64 #1 SMP Tue
                              Dec 11 18:01:27 UTC 2012 x86_64 x86_64
Alert Count                   2
First Seen                    2012-12-13 21:54:04 AST
Last Seen                     2012-12-13 22:21:06 AST
Local ID                      b66252ad-b802-4a07-b815-91a1b63a2a61

Raw Audit Messages
type=AVC msg=audit(1355451666.224:510): avc:  denied  { read } for  pid=26615 comm="realmd" path="/proc/14270/cmdline" dev="proc" ino=57959 scontext=system_u:system_r:realmd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file


type=SYSCALL msg=audit(1355451666.224:510): arch=x86_64 syscall=execve success=yes exit=0 a0=2285760 a1=2285690 a2=2284010 a3=19 items=0 ppid=26614 pid=26615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=realmd exe=/usr/lib64/realmd/realmd subj=system_u:system_r:realmd_t:s0-s0:c0.c1023 key=(null)

Hash: realmd,realmd_t,xdm_t,file,read

audit2allow

#============= realmd_t ==============
allow realmd_t xdm_t:file read;

audit2allow -R

#============= realmd_t ==============
allow realmd_t xdm_t:file read;


Additional info:
hashmarkername: setroubleshoot
kernel:         3.6.10-4.fc18.x86_64
type:           libreport

Comment 1 Miroslav Grepl 2012-12-14 12:16:45 UTC
*** Bug 886949 has been marked as a duplicate of this bug. ***

Comment 2 Miroslav Grepl 2012-12-14 12:17:16 UTC
Added.

Comment 3 Fedora Update System 2012-12-17 17:39:22 UTC
selinux-policy-3.11.1-66.fc18 has been submitted as an update for Fedora 18.
https://admin.fedoraproject.org/updates/selinux-policy-3.11.1-66.fc18

Comment 4 Fedora Update System 2012-12-18 06:54:02 UTC
selinux-policy-3.11.1-66.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.