Bug 699699

Summary: AVCs and USER_AVCs appear when somebody logs in as Guest via GDM
Product: Red Hat Enterprise Linux 6 Reporter: Milos Malik <mmalik>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Karel Srot <ksrot>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.1CC: dwalsh, jrieden, ksrot, mgrepl, syeghiay
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.7.19-92.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-05-19 12:28:04 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Milos Malik 2011-04-26 12:09:53 UTC
Description of problem:


Version-Release number of selected component (if applicable):
selinux-policy-mls-3.7.19-87.el6.noarch
selinux-policy-minimum-3.7.19-87.el6.noarch
selinux-policy-3.7.19-87.el6.noarch
selinux-policy-targeted-3.7.19-87.el6.noarch
selinux-policy-doc-3.7.19-87.el6.noarch

How reproducible:
always

Steps to Reproduce:
1. get a RHEL-6.1 machine
2. install xguest package
3. log in as Guest via GDM
  
Actual results:
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.322:476): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { shmempwd } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.323:477): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { getpwd } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.328:478): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { shmemgrp } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.328:479): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { getgrp } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:19 2011
type=SYSCALL msg=audit(1303819159.154:463): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfc09f8c a2=c63ff4 a3=bfc09fa0 items=0 ppid=11033 pid=11068 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="namespace.init" exe="/bin/bash" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819159.154:463): avc:  denied  { connectto } for  pid=11068 comm="namespace.init" path="/var/run/nscd/socket" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=unix_stream_socket
type=AVC msg=audit(1303819159.154:463): avc:  denied  { write } for  pid=11068 comm="namespace.init" name="socket" dev=dm-0 ino=4430 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=sock_file
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.329:480): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bf88066c a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.329:480): avc:  denied  { create } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.330:481): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.330:481): avc:  denied  { node_bind } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=tcp_socket
type=AVC msg=audit(1303819160.330:481): avc:  denied  { bind } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.330:482): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.330:482): avc:  denied  { name_connect } for  pid=11092 comm="chown" dest=111 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(1303819160.330:482): avc:  denied  { connect } for  pid=11092 comm="chown" lport=41092 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.332:483): arch=40000003 syscall=4 success=yes exit=60 a0=3 a1=8889b28 a2=3c a3=3c items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.332:483): avc:  denied  { write } for  pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.333:484): arch=40000003 syscall=3 success=yes exit=32 a0=3 a1=8889cb8 a2=190 a3=8889a78 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.333:484): avc:  denied  { read } for  pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.334:485): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf880698 a2=c63ff4 a3=bf8806ac items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.334:485): avc:  denied  { net_bind_service } for  pid=11092 comm="chown" capability=10  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=capability
type=AVC msg=audit(1303819160.334:485): avc:  denied  { name_bind } for  pid=11092 comm="chown" src=668 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.338:486): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf8806d0 a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.338:486): avc:  denied  { name_connect } for  pid=11092 comm="chown" dest=863 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
----

Expected results:
no AVCs and USER_AVCs

Comment 1 Milos Malik 2011-04-26 12:12:53 UTC
Following module helped:

policy_module(local,1.0)

require {
    type namespace_init_t;
}

nis_use_ypbind(namespace_init_t)
nscd_socket_use(namespace_init_t)

Comment 2 Daniel Walsh 2011-04-26 15:11:33 UTC
Miroslav we need auth_use_nsswitch(namespace_init_t)

Comment 3 Miroslav Grepl 2011-04-26 20:43:59 UTC
Yes, it relates to NIS.

Comment 4 RHEL Program Management 2011-04-27 06:00:13 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 6 Miroslav Grepl 2011-04-27 15:01:16 UTC
Fixed in selinux-policy-3.7.19-92.el6

Comment 9 errata-xmlrpc 2011-05-19 12:28:04 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2011-0526.html