Re: SELinux is preventing npviewer.bin (nsplugin_t) "read" to ./pulse-shm-4180703699

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Antonio Olivares wrote:
> Dear fellow selinux experts,
> 
> Net avc for npviewer :(  
> 
> 
> Summary:
> 
> SELinux is preventing npviewer.bin (nsplugin_t) "read" to ./pulse-shm-4180703699
> (tmpfs_t).
> 
> Detailed Description:
> 
> SELinux denied access requested by npviewer.bin. It is not expected that this
> access is required by npviewer.bin and this access may signal an intrusion
> attempt. It is also possible that the specific version or configuration of the
> application is causing it to require additional access.
> 
> Allowing Access:
> 
> Sometimes labeling problems can cause SELinux denials. You could try to restore
> the default system file context for ./pulse-shm-4180703699,
> 
> restorecon -v './pulse-shm-4180703699'
> 
> If this does not work, there is currently no automatic way to allow this access.
> Instead, you can generate a local policy module to allow this access - see FAQ
> (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
> SELinux protection altogether. Disabling SELinux protection is not recommended.
> Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
> against this package.
> 
> Additional Information:
> 
> Source Context                unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c102
>                               3
> Target Context                unconfined_u:object_r:tmpfs_t:s0
> Target Objects                ./pulse-shm-4180703699 [ file ]
> Source                        npviewer.bin
> Source Path                   /usr/lib/nspluginwrapper/npviewer.bin
> Port                          <Unknown>
> Host                          riohigh
> Source RPM Packages           nspluginwrapper-1.1.4-1.fc11
> Target RPM Packages           
> Policy RPM                    selinux-policy-3.5.13-18.fc10
> Selinux Enabled               True
> Policy Type                   targeted
> MLS Enabled                   True
> Enforcing Mode                Enforcing
> Plugin Name                   catchall_file
> Host Name                     riohigh
> Platform                      Linux riohigh 2.6.27.5-117.fc10.i686 #1 SMP Tue
>                               Nov 18 12:19:59 EST 2008 i686 athlon
> Alert Count                   1
> First Seen                    Tue 02 Dec 2008 06:57:09 AM CST
> Last Seen                     Tue 02 Dec 2008 06:57:09 AM CST
> Local ID                      c049e765-9d3b-4384-927a-19797fb78d8d
> Line Numbers                  
> 
> Raw Audit Messages            
> 
> node=riohigh type=AVC msg=audit(1228222629.565:217): avc:  denied  { read } for  pid=4625 comm="npviewer.bin" name="pulse-shm-4180703699" dev=tmpfs ino=36988 scontext=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file
> 
> node=riohigh type=SYSCALL msg=audit(1228222629.565:217): arch=40000003 syscall=5 success=no exit=-13 a0=bfda08d0 a1=a0000 a2=0 a3=bfda08d0 items=0 ppid=4427 pid=4625 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=13 comm="npviewer.bin" exe="/usr/lib/nspluginwrapper/npviewer.bin" subj=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023 key=(null)
> 
> 
> I try the fix and i get:
> 
> [olivares@riohigh ~]$ su -
> Password: 
> [root@riohigh ~]# restorecon -v './pulse-shm-4180703699'
> 
> restorecon:  stat error on ./pulse-shm-4180703699:  No such file or directory
> [root@riohigh ~]# 
> 
> Thanks,
> 
> Antonio 
> 
> 
>       
> 
> --
> fedora-selinux-list mailing list
> fedora-selinux-list@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
This one has me baffled, on how you created this file.  This file should
be labeled user_tmpfs_t in which case nsplugin would have been allowed
to use it,  But for some reason it got created with the incorrect context.

Could you try to upgrade to the latest policy and see if this still happens.

I tried an experiment as the unconfined user

# mount -t tmpfs_t /dev/shm /mnt
# ls -ldZ /mnt/redhat/
drwxrwxrwt  root root staff_u:object_r:tmpfs_t:s0      /mnt/redhat/
# touch /mnt/redhat/test
# ls -lZ /mnt/redhat/test
- -rw-r--r--  root root staff_u:object_r:user_tmpfs_t:s0 /mnt/redhat/test

Which is what pulseaudio should have done.


Could you check what context pulseaudio is running with

# ps -eZ | grep pulse

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkk1pdkACgkQrlYvE4MpobNjawCg6EmpLWaQNOK9ndoYgD8GN4TV
HG8AoNJIqutO0vFPPa1tjRW+gLk2V9WU
=L/DR
-----END PGP SIGNATURE-----

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux