Hide Forgot
Description of problem: SELinux is preventing /usr/libexec/nss_pcache from 'write' accesses on the directory /etc/pki/ca-trust/source. ***** Plugin catchall (100. confidence) suggests ************************** If vous pensez que nss_pcache devrait être autorisé à accéder write sur source directory par défaut. Then vous devriez rapporter ceci en tant qu'anomalie. Vous pouvez générer un module de stratégie local pour autoriser cet accès. Do autoriser cet accès pour le moment en exécutant : # grep nss_pcache /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:httpd_t:s0 Target Context system_u:object_r:cert_t:s0 Target Objects /etc/pki/ca-trust/source [ dir ] Source nss_pcache Source Path /usr/libexec/nss_pcache Port <Inconnu> Host (removed) Source RPM Packages mod_nss-1.0.8-23.fc20.x86_64 Target RPM Packages ca-certificates-2013.1.94-16.fc20.noarch Policy RPM selinux-policy-3.12.1-71.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.11.0-0.rc6.git1.1.fc20.x86_64 #1 SMP Tue Aug 20 18:09:03 UTC 2013 x86_64 x86_64 Alert Count 1 First Seen 2013-08-21 19:31:30 CEST Last Seen 2013-08-21 19:31:30 CEST Local ID 6d196296-f623-4f31-8ecd-1b62ab9a9911 Raw Audit Messages type=AVC msg=audit(1377106290.303:70): avc: denied { write } for pid=927 comm="nss_pcache" name="source" dev="dm-0" ino=529312 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=dir type=SYSCALL msg=audit(1377106290.303:70): arch=x86_64 syscall=access success=no exit=EACCES a0=d60bc0 a1=2 a2=0 a3=7fff509277d0 items=0 ppid=845 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=nss_pcache exe=/usr/libexec/nss_pcache subj=system_u:system_r:httpd_t:s0 key=(null) Hash: nss_pcache,httpd_t,cert_t,dir,write Additional info: reporter: libreport-2.1.6 hashmarkername: setroubleshoot kernel: 3.11.0-0.rc6.git1.1.fc20.x86_64 type: libreport
commit 5a486e1c707613c082cd7fe8d3e73291591e4e68 Author: Miroslav Grepl <mgrepl> Date: Thu Aug 22 15:14:35 2013 +0200 Dontaudit access check on cert_t for httpd_t
This bug appears to have been reported against 'rawhide' during the Fedora 22 development cycle. Changing version to '22'. More information and reason for this action is here: https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora22
selinux-policy-3.13.1-116.fc22 has been submitted as an update for Fedora 22. https://admin.fedoraproject.org/updates/selinux-policy-3.13.1-116.fc22
Package selinux-policy-3.13.1-116.fc22: * should fix your issue, * was pushed to the Fedora 22 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.13.1-116.fc22' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2015-3508/selinux-policy-3.13.1-116.fc22 then log in and leave karma (feedback).
selinux-policy-3.13.1-116.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.