|
Summary:
SELinux is preventing NetworkManager (NetworkManager_t) "execute" to ./pppd
(pppd_exec_t).
Detailed Description:
SELinux denied access requested by NetworkManager. It is not expected that this
access is required by NetworkManager and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.
Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./pppd,
restorecon -v './pppd'
If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u bject_r:pppd_exec_t:s0
Target Objects ./pppd [ file ]
Source NetworkManager
Source Path /usr/sbin/NetworkManager
Port <Unknown>
Host localhost.localdomain
Source RPM Packages NetworkManager-0.7.0-0.11.svn4022.4.fc9
Target RPM Packages
Policy RPM selinux-policy-3.3.1-95.fc9
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain 2.6.26.5-45.fc9.i686
#1 SMP Sat Sep 20 03:45:00 EDT 2008 i686 i686
Alert Count 18
First Seen 2008年10月05日 星期日 20时16分23秒
Last Seen 2008年10月05日 星期日 21时26分22秒
Local ID 7a8791e0-564d-46b9-a59d-e08ec090cfe7
Line Numbers
Raw Audit Messages
host=localhost.localdomain type=AVC msg=audit(1223213182.529:13): avc: denied { execute } for pid=2342 comm="NetworkManager" name="pppd" dev=sda2 ino=449824 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u bject_r:pppd_exec_t:s0 tclass=file
host=localhost.localdomain type=SYSCALL msg=audit(1223213182.529:13): arch=40000003 syscall=11 success=no exit=-13 a0=8d908c0 a1=8d86d80 a2=bfe84160 a3=8d908c0 items=0 ppid=1665 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=system_u:system_r:NetworkManager_t:s0 key=(null) |
|