Bug 700495

Summary: xguest login produce USER_AVC denial { send_msg } for msgtype=method_call interface=com.redhat.SubscriptionManager.Compliance
Product: Red Hat Enterprise Linux 6 Reporter: Karel Srot <ksrot>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: low Docs Contact:
Priority: low    
Version: 6.1CC: dwalsh, mgrepl, mmalik
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.7.19-102.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-12-06 10:07:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Karel Srot 2011-04-28 14:22:36 UTC
Description of problem:

time->Thu Apr 28 10:16:36 2011
type=USER_AVC msg=audit(1304000196.117:20049): user pid=1273 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=com.redhat.SubscriptionManager.Compliance member=check_compliance dest=com.redhat.SubscriptionManager spid=3666 tpid=2991 scontext=xguest_u:xguest_r:xguest_t:s0 tcontext=system_u:system_r:initrc_t:s0-s0:c0.c1023 tclass=dbus : exe="/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?'


Version-Release number of selected component (if applicable):
selinux-policy-3.7.19-92.el6.noarch

How reproducible:
always

Steps to Reproduce:
1. install xguest package
2. login as Guest and observe the USER_AVC in audit.log

Comment 2 Miroslav Grepl 2011-06-29 14:07:27 UTC
It could be resolved by adding a new policy for rhsmcertd.

Comment 3 Miroslav Grepl 2011-06-30 15:47:54 UTC
Fixed in selinux-policy-3.7.19-102.el6

Comment 6 errata-xmlrpc 2011-12-06 10:07:35 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2011-1511.html