How to install

sudo dnf upgrade --advisory=FEDORA-2015-12049
This update has been submitted for testing by lvrabec. 4 years ago

Taskotron: depcheck test PASSED on i386. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/108199/steps/runtask/logs/stdio (results are informative only)

Taskotron: depcheck test PASSED on x86_64. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/108199/steps/runtask/logs/stdio (results are informative only)

This update is currently being pushed to the Fedora 21 testing updates repository. 4 years ago
This update is currently being pushed to the Fedora 21 testing updates repository. 4 years ago
This update has been pushed to testing 4 years ago
User Icon filiperosset commented & provided feedback 4 years ago
karma

no regressions noted

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes 4 years ago
This update has been submitted for stable by lvrabec. 4 years ago

Taskotron: upgradepath test PASSED on noarch. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/116204/steps/runtask/logs/stdio (results are informative only)

This update is currently being pushed to the Fedora 21 stable updates repository. 4 years ago
This update is currently being pushed to the Fedora 21 stable updates repository. 4 years ago
This update has been pushed to stable 4 years ago
User Icon anonymous commented & provided feedback 3 years ago

SELinux is preventing cat from read access on the file dmesg_restrict.

* Plugin catchall (100. confidence) suggests ******

If you believe that cat should be allowed read access on the dmesg_restrict file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing:

grep cat /var/log/audit/audit.log | audit2allow -M mypol

semodule -i mypol.pp

Additional Information: Source Context system_u:system_r:abrt_t:s0-s0:c0.c1023 Target Context system_u:object_r:proc_security_t:s0 Target Objects dmesg_restrict [ file ] Source cat Source Path cat Port <Unknown> Host TheMommy Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.13.1-105.19.fc21.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name TheMommy Platform Linux TheMommy 4.1.4-100.fc21.x86_64 #1 SMP Tue Aug 4 03:25:05 UTC 2015 x86_64 x86_64 Alert Count 5 First Seen 2015-09-27 21:46:49 CDT Last Seen 2016-04-16 20:19:18 CDT Local ID af853d8a-64e1-418e-b5ec-40b0b4fc6f1c

Raw Audit Messages type=AVC msg=audit(1460855958.825:678): avc: denied { read } for pid=6660 comm="cat" name="dmesg_restrict" dev="proc" ino=109337 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_security_t:s0 tclass=file permissive=0

Hash: cat,abrt_t,proc_security_t,file,read


Please login to add feedback.

Metadata
Type
bugfix
Karma
1
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
BZ#1172774 SELinux is preventing /usr/bin/freshclam from 'read' accesses on the file filesystems.
0
0
BZ#1208742 SELinux is preventing dnssec-trigger- from 'write' accesses on the sock_file private.
0
0
BZ#1209183 SELinux is preventing dnf-automatic from using the 'transition' accesses on a process.
0
0
BZ#1231947 SELinux is preventing restorecon from 'associate' accesses on the filesystem /sys/kernel/debug.
0
0
BZ#1240885 SELinux is preventing cat from 'read' accesses on the file dmesg_restrict.
0
0
BZ#1241989 SELinux is preventing nm-dispatcher from using the 'signull' accesses on a process.
0
0
BZ#1242115 SELinux is preventing gmain from using the 'sigchld' accesses on a process.
0
0

Automated Test Results