On Wed, 27 Jun 2012, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote: > A domain with :capability2 mac_admin permission could set any arbitrary > value as a file security context, so it would just require a program in > such a domain (or perhaps any root program in permissive mode) to > accidentally pass the translated security context to setxattr or > possibly even to setfilecon if mcstrans wasn't running. Thanks for that tip, I've just seen it happen when upgrading a system. It seems that dpkg converted "s0" to "SystemLow" when mcstransd was running, then stopped mcstransd (as part of an upgrade process) and couldn't convert it back to s0. Now I have to work out why it did such a conversion. The file_contexts file uses the computer-friendly version of the range so there shouldn't be a need for any conversion. I don't like my chances of getting a dpkg patch in Wheezy, changing the most important package in a distribution 3 days before a freeze is asking a lot. I will probably have to maintain a forked package in my own repository and hope that I can get a change in the first update for Wheezy. Below is one of the audit messages that were generated. type=AVC msg=audit(1340784425.654:1271): avc: denied { mac_admin } for pid=6276 comm="dpkg" capability=33 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=capability2 Hopefully I will have solved this in a few hours and posted the answer to the list. -- My Main Blog http://etbe.coker.com.au/ My Documents Blog http://doc.coker.com.au/ -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.