SELinux is preventing /bin/gawk "execute" access on /var/home/rnichols/mail/spamstrings.awk
Robert Nichols
rnicholsNOSPAM at comcast.net
Fri Mar 5 03:25:00 UTC 2010
This occurs as the result of a procmail rule. Hopefully, the result
from audit2allow is the right thing here:
allow procmail_t user_home_t:file execute_no_trans;
Am I going to have to jump through SELinux hoops every time I want to use
a bit of my own code??? Right now I'm spending far more time fighting
with SELinux than I would _ever_ have to spend cleaning up from an
unlikely breakin. With little hope of ever getting to enforcing mode,
perhaps it would be best just to disable entirely.
Summary:
SELinux is preventing /bin/gawk "execute" access on
/var/home/rnichols/mail/spamstrings.sh.
Detailed Description:
[SELinux is in permissive mode. This access was not denied.]
SELinux denied access requested by spamstrings.sh. It is not expected that this
access is required by spamstrings.sh and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.
Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.
Additional Information:
Source Context system_u:system_r:procmail_t:s0
Target Context unconfined_u:object_r:user_home_t:s0
Target Objects /var/home/rnichols/mail/spamstrings.sh [ file ]
Source spamstrings.sh
Source Path /bin/gawk
Port <Unknown>
Host omega-3x.local
Source RPM Packages gawk-3.1.7-1.fc12
Target RPM Packages
Policy RPM selinux-policy-3.6.32-89.fc12
Selinux Enabled True
Policy Type targeted
Enforcing Mode Permissive
Plugin Name catchall
Host Name omega-3x.local
Platform Linux omega-3x.local
2.6.31.12-174.2.22.fc12.x86_64 #1 SMP Fri Feb 19
18:55:03 UTC 2010 x86_64 x86_64
Alert Count 2
First Seen Thu 04 Mar 2010 08:49:24 PM CST
Last Seen Thu 04 Mar 2010 08:49:24 PM CST
Local ID d067376f-66e5-49b7-8fa7-e22aa5388dae
Line Numbers
Raw Audit Messages
node=omega-3x.local type=AVC msg=audit(1267757364.768:30045): avc: denied {
execute } for pid=19477 comm="procmail" name="spamstrings.sh" dev=sda6
ino=351952 scontext=system_u:system_r:procmail_t:s0
tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file
node=omega-3x.local type=AVC msg=audit(1267757364.768:30045): avc: denied {
execute_no_trans } for pid=19477 comm="procmail"
path="/home/rnichols/mail/spamstrings.sh" dev=sda6 ino=351952
scontext=system_u:system_r:procmail_t:s0
tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file
node=omega-3x.local type=SYSCALL msg=audit(1267757364.768:30045): arch=c000003e
syscall=59 success=yes exit=0 a0=95e320 a1=95fa40 a2=95fee0 a3=8 items=0
ppid=19476 pid=19477 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500
egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="spamstrings.sh"
exe="/bin/gawk" subj=system_u:system_r:procmail_t:s0 key=(null)
--
Bob Nichols "NOSPAM" is really part of my email address.
Do NOT delete it.
More information about the selinux
mailing list