Bug 963639 - SELinux is preventing /usr/bin/clamscan from 'getattr' accesses on the chr_file /dev/snd/timer.
Summary: SELinux is preventing /usr/bin/clamscan from 'getattr' accesses on the chr_fi...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 19
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:7b11a031aeb9b0a851c81af963d...
: 963641 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-05-16 10:06 UTC by Grosswiler Roger
Modified: 2013-05-30 03:33 UTC (History)
3 users (show)

Fixed In Version: selinux-policy-3.12.1-47.fc19
Clone Of:
Environment:
Last Closed: 2013-05-30 03:33:44 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Grosswiler Roger 2013-05-16 10:06:48 UTC
Description of problem:
SELinux is preventing /usr/bin/clamscan from 'getattr' accesses on the chr_file /dev/snd/timer.

*****  Plugin catchall (100. confidence) suggests  ***************************

If sie denken, dass es clamscan standardmässig erlaubt sein sollte, getattr Zugriff auf timer chr_file zu erhalten.
Then sie sollten dies als Fehler melden.
Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen.
Do
zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen:
# grep clamscan /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:antivirus_t:s0-s0:c0.c1023
Target Context                system_u:object_r:sound_device_t:s0
Target Objects                /dev/snd/timer [ chr_file ]
Source                        clamscan
Source Path                   /usr/bin/clamscan
Port                          <Unbekannt>
Host                          (removed)
Source RPM Packages           clamav-0.97.6-1901.fc19.x86_64
Target RPM Packages           
Policy RPM                    selinux-policy-3.12.1-42.fc19.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 3.9.1-301.fc19.x86_64 #1 SMP Wed
                              May 8 18:02:34 UTC 2013 x86_64 x86_64
Alert Count                   4
First Seen                    2013-05-13 06:50:08 CEST
Last Seen                     2013-05-16 06:35:26 CEST
Local ID                      20b7b4da-c77d-441c-b6bf-2b68131c578f

Raw Audit Messages
type=AVC msg=audit(1368678926.705:45686): avc:  denied  { getattr } for  pid=22435 comm="clamscan" path="/dev/snd/timer" dev="devtmpfs" ino=7770 scontext=system_u:system_r:antivirus_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file


type=SYSCALL msg=audit(1368678926.705:45686): arch=x86_64 syscall=lstat success=no exit=EACCES a0=925ba0 a1=7fff2cd0ec60 a2=7fff2cd0ec60 a3=5 items=0 ppid=22433 pid=22435 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=123 tty=(none) comm=clamscan exe=/usr/bin/clamscan subj=system_u:system_r:antivirus_t:s0-s0:c0.c1023 key=(null)

Hash: clamscan,antivirus_t,sound_device_t,chr_file,getattr

audit2allow

#============= antivirus_t ==============
allow antivirus_t sound_device_t:chr_file getattr;

audit2allow -R
require {
	type antivirus_t;
	type sound_device_t;
	class chr_file getattr;
}

#============= antivirus_t ==============
allow antivirus_t sound_device_t:chr_file getattr;


Additional info:
reporter:       libreport-2.1.4
hashmarkername: setroubleshoot
kernel:         3.9.1-301.fc19.x86_64
type:           libreport

Comment 1 Miroslav Grepl 2013-05-16 10:33:54 UTC
*** Bug 963641 has been marked as a duplicate of this bug. ***

Comment 2 Miroslav Grepl 2013-05-16 11:26:30 UTC
commit 7dea2a86b26a1b8002a3ba03689ee75e1362557b
Author: Miroslav Grepl <mgrepl>
Date:   Thu May 16 13:26:19 2013 +0200

    Update antivirus_can_scan_system boolean

Comment 3 Grosswiler Roger 2013-05-16 12:46:24 UTC
Those are already activated:

antivirus_can_scan_system
antivirus_use_jit

Comment 4 Miroslav Grepl 2013-05-16 12:58:39 UTC
Yes, I added additional rules for antivirus_can_scan_system boolean which will fix this issue.

Comment 5 Fedora Update System 2013-05-29 14:19:46 UTC
selinux-policy-3.12.1-47.fc19 has been submitted as an update for Fedora 19.
https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-47.fc19

Comment 6 Fedora Update System 2013-05-29 17:46:40 UTC
Package selinux-policy-3.12.1-47.fc19:
* should fix your issue,
* was pushed to the Fedora 19 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-47.fc19'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2013-9565/selinux-policy-3.12.1-47.fc19
then log in and leave karma (feedback).

Comment 7 Fedora Update System 2013-05-30 03:33:44 UTC
selinux-policy-3.12.1-47.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.