Avc´s while running rkhunter

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hashes seems OK when i turn selinux protection off, as soon as i turn selinux on while running rkhunter, they show up as BAD. So i figure they are okey, but rkhunter is denied access to something. Can someone explain what i ahev to do to make it right? I´m on fc5, and i think it´s fully updated if i havent missed out on any new repos.

dries.repo fedora-extras.repo freshrpms.repo
fedora-core.repo                fedora-legacy.repo           livna.repo
fedora-development.repo fedora-updates.repo macromedia.repo
fedora-extras-development.repo  fedora-updates-testing.repo  nuu.repo

--------------------------------------------------------
SELinux status:                 enabled
SELinuxfs mount:                /selinux
Current mode:                   enforcing
Mode from config file:          enforcing
Policy version:                 21
Policy from config file:        targeted
--------------------------------------------------------
SELinux status:                 enabled
SELinuxfs mount:                /selinux
Current mode:                   permissive
Mode from config file:          enforcing
Policy version:                 21
Policy from config file:        targeted
--------------------------------------------------------


type=AVC msg=audit(1161332509.183:234): avc: denied { read write } for pid=28899 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=AVC msg=audit(1161332509.183:234): avc: denied { read write } for pid=28899 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=AVC msg=audit(1161332509.183:234): avc: denied { write } for pid=28899 comm="prelink" name="prelink.tst" dev=dm-0 ino=1277164 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=AVC msg=audit(1161332509.183:234): avc: denied { read write } for pid=28899 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1161332509.183:234): arch=40000003 syscall=11 success=yes exit=0 a0=8fd6ec8 a1=8fd6ae0 a2=8f4b3b8 a3=8fd6d38 items=0 ppid=28898 pid=28899 auid=523 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/usr/sbin/prelink" subj=user_u:system_r:prelink_t:s0 key=(null)
type=AVC_PATH msg=audit(1161332509.183:234):  path="/dev/pts/0"
type=AVC_PATH msg=audit(1161332509.183:234): path="/var/rkhunter/tmp/prelink.tst"
type=AVC_PATH msg=audit(1161332509.183:234):  path="/dev/pts/0"
type=AVC msg=audit(1161332509.859:235): avc: denied { read write } for pid=28959 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=AVC msg=audit(1161332509.859:235): avc: denied { read write } for pid=28959 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=AVC msg=audit(1161332509.859:235): avc: denied { write } for pid=28959 comm="prelink" name="prelink.tst" dev=dm-0 ino=1277164 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=AVC msg=audit(1161332509.859:235): avc: denied { read write } for pid=28959 comm="prelink" name="0" dev=devpts ino=2 scontext=user_u:system_r:prelink_t:s0 tcontext=user_u:object_r:devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1161332509.859:235): arch=40000003 syscall=11 success=yes exit=0 a0=8fd66f0 a1=8fd6ae0 a2=8f4b3b8 a3=8fd6ea0 items=0 ppid=28958 pid=28959 auid=523 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/usr/sbin/prelink" subj=user_u:system_r:prelink_t:s0 key=(null)
type=AVC_PATH msg=audit(1161332509.859:235):  path="/dev/pts/0"
type=AVC_PATH msg=audit(1161332509.859:235): path="/var/rkhunter/tmp/prelink.tst"
type=AVC_PATH msg=audit(1161332509.859:235):  path="/dev/pts/0"

Regards
/pi

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux