AVC Denial "services"
Daniel J Walsh
dwalsh at redhat.com
Wed Sep 3 17:02:24 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Frank Murphy wrote:
> su - root
> chcon -t bin_t './system-config-services-mechanism.py'
> chcon: cannot access `./system-config-services-mechanism.py': No such
> file or directory
>
chcon -t bin_t \
/usr/share/system-config-services/system-config-services-mechanism.py
The kernel could not reassemble the entire path.
>
>
> Summary:
>
> SELinux is preventing the dbus-daemon-lau (system_dbusd_t) from executing
> ./system-config-services-mechanism.py.
>
> Detailed Description:
>
> SELinux has denied the dbus-daemon-lau from executing
> ./system-config-services-mechanism.py. If dbus-daemon-lau is supposed to be able
> to execute ./system-config-services-mechanism.py, this could be a labeling
> problem. Most confined domains are allowed to execute files labeled bin_t. So
> you could change the labeling on this file to bin_t and retry the application.
> If this dbus-daemon-lau is not supposed to execute
> ./system-config-services-mechanism.py, this could signal a intrusion attempt.
>
> Allowing Access:
>
> If you want to allow dbus-daemon-lau to execute
> ./system-config-services-mechanism.py: chcon -t bin_t
> './system-config-services-mechanism.py' If this fix works, please update the
> file context on disk, with the following command: semanage fcontext -a -t bin_t
> './system-config-services-mechanism.py' Please specify the full path to the
> executable, Please file a bug report
> (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this selinux-policy
> to make sure this becomes the default labeling.
>
> Additional Information:
>
> Source Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023
> Target Context system_u:object_r:usr_t:s0
> Target Objects ./system-config-services-mechanism.py [ file ]
> Source dbus-daemon-lau
> Source Path /lib/dbus-1/dbus-daemon-launch-helper
> Port <Unknown>
> Host rawhide-02
> Source RPM Packages dbus-1.2.3-1.fc10
> Target RPM Packages
> Policy RPM selinux-policy-3.5.1-4.fc10
> Selinux Enabled True
> Policy Type targeted
> MLS Enabled True
> Enforcing Mode Enforcing
> Plugin Name execute
> Host Name rawhide-02
> Platform Linux rawhide-02 2.6.27-0.238.rc2.fc10.i686 #1 SMP
> Thu Aug 7 08:00:04 EDT 2008 i686 i686
> Alert Count 1
> First Seen Sat 30 Aug 2008 08:22:57 IST
> Last Seen Sat 30 Aug 2008 08:22:57 IST
> Local ID ffddfd97-63b1-4809-aee4-c10e29d86722
> Line Numbers
>
> Raw Audit Messages
>
> host=rawhide-02 type=AVC msg=audit(1220080977.294:17): avc: denied {
> execute } for pid=3564 comm="dbus-daemon-lau"
> name="system-config-services-mechanism.py" dev=dm-0 ino=2605067
> scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023
> tcontext=system_u:object_r:usr_t:s0 tclass=file
>
> host=rawhide-02 type=SYSCALL msg=audit(1220080977.294:17):
> arch=40000003 syscall=11 success=no exit=-13 a0=9774018 a1=9773d60
> a2=9773008 a3=b8d9bc items=0 ppid=3563 pid=3564 auid=4294967295 uid=0
> gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none)
> ses=4294967295 comm="dbus-daemon-lau"
> exe="/lib/dbus-1/dbus-daemon-launch-helper"
> subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list at redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iEYEARECAAYFAki+wyAACgkQrlYvE4MpobOFdACdHwTU9ha1XnsJ88NGq8s0orOj
BqIAn0S9O64OVLp/fkiZCAKLyKVaTgs/
=Smmb
-----END PGP SIGNATURE-----
More information about the fedora-selinux-list
mailing list