:
john.moniz-rieW9WUcm8FFJ04o6PK0Fg at public.gmane.org
john.moniz-rieW9WUcm8FFJ04o6PK0Fg at public.gmane.org
Mon Mar 15 14:45:46 UTC 2010
I'm getting these SELinux security alerts on my Fedora 12. I don't know if it's a misconfiguration or a real threat. Does anyone know what it means? I've been getting the first alert from the time I installed the distro, but haven't come up with a pattern yet. They have always been the same until today - I received a new alert, which follows the first one.
I'll be executing some of the commands suggested on the alerts once I have a better idea of what's happening.
Thanks,
John.
{Alert 1}
Summary:
SELinux is preventing /usr/sbin/NetworkManager "create" access on
NetworkManager.state.R4GQ8U.
Detailed Description:
SELinux denied access requested by NetworkManager. It is not expected that this
access is required by NetworkManager and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.
Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.
Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:object_r:var_lib_t:s0
Target Objects NetworkManager.state.R4GQ8U [ file ]
Source NetworkManager
Source Path /usr/sbin/NetworkManager
Port <Unknown>
Host <hostname>
Source RPM Packages NetworkManager-0.7.998-2.git20100106.fc12
Target RPM Packages
Policy RPM selinux-policy-3.6.32-78.fc12
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Plugin Name catchall
Host Name <hostname>
Platform Linux <hostname> 2.6.32.7-37.fc12.x86_64 #1 SMP Fri
Jan 29 14:19:39 UTC 2010 x86_64 x86_64
Alert Count 1
First Seen Sun 21 Feb 2010 05:42:11 AM EST
Last Seen Sun 21 Feb 2010 05:42:11 AM EST
Local ID bbe2d9d8-17c5-4dd0-b99b-971acd50d151
Line Numbers
Raw Audit Messages
node=<hostname> type=AVC msg=audit(1266748931.439:6): avc: denied { create } for pid=1148 comm="NetworkManager" name="NetworkManager.state.R4GQ8U" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file
node=<hostname> type=SYSCALL msg=audit(1266748931.439:6): arch=c000003e syscall=2 success=no exit=-13 a0=22c2170 a1=c2 a2=1b6 a3=4d6b726f7774654e items=0 ppid=1147 pid=1148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=system_u:system_r:NetworkManager_t:s0 key=(null)
{Alert 2}
Summary:
SELinux is preventing access to files with the label, file_t.
Detailed Description:
SELinux permission checks on files labeled file_t are being denied. file_t is
the context the SELinux kernel gives to files that do not have a label. This
indicates a serious labeling problem. No files on an SELinux box should ever be
labeled file_t. If you have just added a disk drive to the system you can
relabel it using the restorecon command. For example if you saved the home
directory from a previous installation that did not use SELinux, 'restorecon -R
-v /home' will fix the labels. Otherwise you should relabel the entire file
system.
Allowing Access:
You can execute the following command as root to relabel your computer system:
"touch /.autorelabel; reboot"
Additional Information:
Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
Target Context system_u:object_r:file_t:s0
Target Objects /home/john [ dir ]
Source gdm-simple-gree
Source Path /usr/libexec/gdm-simple-greeter
Port <Unknown>
Host apollo
Source RPM Packages gdm-2.28.2-1.fc12
Target RPM Packages
Policy RPM selinux-policy-3.6.32-89.fc12
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Plugin Name file
Host Name apollo
Platform Linux apollo 2.6.32.7-37.fc12.x86_64 #1 SMP Fri
Jan 29 14:19:39 UTC 2010 x86_64 x86_64
Alert Count 281
First Seen Sun 21 Feb 2010 05:42:32 AM EST
Last Seen Mon 15 Mar 2010 10:12:19 AM EDT
Local ID 76dd86e3-aa08-4fd1-a645-cfa884cc8337
Line Numbers
Raw Audit Messages
node=apollo type=AVC msg=audit(1268662339.365:28903): avc: denied { read } for pid=1813 comm="gdm-simple-gree" name="john" dev=sda6 ino=6422529 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir
node=apollo type=SYSCALL msg=audit(1268662339.365:28903): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=27f0180 a2=1002fce a3=1 items=0 ppid=1742 pid=1813 auid=4294967295 uid=42 gid=475 euid=42 suid=42 fsuid=42 egid=475 sgid=475 fsgid=475 tty=(none) ses=4294967295 comm="gdm-simple-gree" exe="/usr/libexec/gdm-simple-greeter" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://gtalug.org/pipermail/legacy/attachments/20100315/7ac93804/attachment.html>
More information about the Legacy
mailing list