| Summary: | AVCs and USER_AVCs appear when somebody logs in as Guest via GDM | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Milos Malik <mmalik> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Karel Srot <ksrot> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 6.1 | CC: | dwalsh, jrieden, ksrot, mgrepl, syeghiay |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | selinux-policy-3.7.19-92.el6 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-05-19 12:28:04 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Following module helped:
policy_module(local,1.0)
require {
type namespace_init_t;
}
nis_use_ypbind(namespace_init_t)
nscd_socket_use(namespace_init_t)
Miroslav we need auth_use_nsswitch(namespace_init_t) Yes, it relates to NIS. Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. Fixed in selinux-policy-3.7.19-92.el6 An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-0526.html |
Description of problem: Version-Release number of selected component (if applicable): selinux-policy-mls-3.7.19-87.el6.noarch selinux-policy-minimum-3.7.19-87.el6.noarch selinux-policy-3.7.19-87.el6.noarch selinux-policy-targeted-3.7.19-87.el6.noarch selinux-policy-doc-3.7.19-87.el6.noarch How reproducible: always Steps to Reproduce: 1. get a RHEL-6.1 machine 2. install xguest package 3. log in as Guest via GDM Actual results: ---- time->Tue Apr 26 13:59:20 2011 type=USER_AVC msg=audit(1303819160.322:476): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc: denied { shmempwd } for scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?' ---- time->Tue Apr 26 13:59:20 2011 type=USER_AVC msg=audit(1303819160.323:477): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc: denied { getpwd } for scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?' ---- time->Tue Apr 26 13:59:20 2011 type=USER_AVC msg=audit(1303819160.328:478): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc: denied { shmemgrp } for scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?' ---- time->Tue Apr 26 13:59:20 2011 type=USER_AVC msg=audit(1303819160.328:479): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc: denied { getgrp } for scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?' ---- time->Tue Apr 26 13:59:19 2011 type=SYSCALL msg=audit(1303819159.154:463): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfc09f8c a2=c63ff4 a3=bfc09fa0 items=0 ppid=11033 pid=11068 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="namespace.init" exe="/bin/bash" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819159.154:463): avc: denied { connectto } for pid=11068 comm="namespace.init" path="/var/run/nscd/socket" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=unix_stream_socket type=AVC msg=audit(1303819159.154:463): avc: denied { write } for pid=11068 comm="namespace.init" name="socket" dev=dm-0 ino=4430 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=sock_file ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.329:480): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bf88066c a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.329:480): avc: denied { create } for pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.330:481): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.330:481): avc: denied { node_bind } for pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=tcp_socket type=AVC msg=audit(1303819160.330:481): avc: denied { bind } for pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.330:482): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.330:482): avc: denied { name_connect } for pid=11092 comm="chown" dest=111 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1303819160.330:482): avc: denied { connect } for pid=11092 comm="chown" lport=41092 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.332:483): arch=40000003 syscall=4 success=yes exit=60 a0=3 a1=8889b28 a2=3c a3=3c items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.332:483): avc: denied { write } for pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.333:484): arch=40000003 syscall=3 success=yes exit=32 a0=3 a1=8889cb8 a2=190 a3=8889a78 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.333:484): avc: denied { read } for pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.334:485): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf880698 a2=c63ff4 a3=bf8806ac items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.334:485): avc: denied { net_bind_service } for pid=11092 comm="chown" capability=10 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=capability type=AVC msg=audit(1303819160.334:485): avc: denied { name_bind } for pid=11092 comm="chown" src=668 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket ---- time->Tue Apr 26 13:59:20 2011 type=SYSCALL msg=audit(1303819160.338:486): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf8806d0 a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1303819160.338:486): avc: denied { name_connect } for pid=11092 comm="chown" dest=863 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket ---- Expected results: no AVCs and USER_AVCs