SELinux is preventing /bin/bash from execute access on the None /opt/brother/Printers/mfcj615w/cupswrapper/brcupsconfpt1.

Lawrence Graves lgraves95 at gmail.com
Fri Jan 27 19:35:13 UTC 2012


SELinux is preventing /bin/bash from execute access on the None 
/opt/brother/Printers/mfcj615w/cupswrapper/brcupsconfpt1.

***** Plugin catchall (100. confidence) suggests 
***************************

If you believe that bash should be allowed execute access on the 
brcupsconfpt1 <Unknown> by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep brlpdwrappermfc /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context system_u:system_r:cupsd_t:s0-s0:c0.c1023
Target Context system_u:object_r:usr_t:s0
Target Objects /opt/brother/Printers/mfcj615w/cupswrapper/brcupsc
onfpt1 [ None ]
Source brlpdwrappermfc
Source Path /bin/bash
Port <Unknown>
Host Jehovah.localdomain
Source RPM Packages
Target RPM Packages
Policy RPM <Unknown>
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name Jehovah.localdomain
Platform Linux Jehovah.localdomain 3.2.2-1.fc16.x86_64 #1
SMP Thu Jan 26 03:21:58 UTC 2012 x86_64 x86_64
Alert Count 3
First Seen Fri 27 Jan 2012 10:59:04 AM MST
Last Seen Fri 27 Jan 2012 11:00:10 AM MST
Local ID 96be50f4-7b82-43a5-99c9-48b323de0ac3

Raw Audit Messages
type=AVC msg=audit(1327687210.338:163): avc: denied { execute } for 
pid=6179 comm="brlpdwrappermfc" name="brcupsconfpt1" dev=dm-1 ino=281113 
scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 
tcontext=system_u:object_r:usr_t:s0 tclass=filenode=Jehovah.localdomain 
type=SYSCALL msg=audit(1327687210.338:163): arch=c000003e syscall=59 
success=no exit=-13 a0=1ccdcc0 a1=1cc8990 a2=1cc8640 a3=38 items=0 
ppid=6166 pid=6179 auid=4294967295 uid=4 gid=7 euid=4 suid=4 fsuid=4 
egid=7 sgid=7 fsgid=7 tty=(none) ses=4294967295 comm="brlpdwrappermfc" 
exe="/bin/bash" subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 key=(null)


Hash: brlpdwrappermfc,cupsd_t,usr_t,None,execute

audit2allow


audit2allow -R
-- 
Lawrence Graves All things are workable but don't all things work.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/users/attachments/20120127/9703b70e/attachment.html>


More information about the users mailing list