| Summary: | audit logs show crond_t requesting nlmsg_tty_audit | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Josh <jokajak> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | 6.2 | CC: | dwalsh, ksrot, mmalik, sgrubb |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | selinux-policy-3.7.19-136.el6 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-06-20 12:28:28 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Josh
2011-11-05 13:07:38 UTC
Could you please copy&paste the AVCs you are seeing ? Also did you disable unconfined module? unconfined module is disable
----
time->Mon Nov 7 03:10:01 2011
type=SOCKADDR msg=audit(1320653401.203:53934): saddr=100000000000000000000000
type=SYSCALL msg=audit(1320653401.203:53934): arch=c000003e syscall=46 success=yes exit=20 a0=3 a1=7fff1e386a70 a2=0 a3=8 items=0 ppid=2075 pid=8602 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=818 comm="crond" exe="/usr/sbin/crond" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1320653401.203:53934): avc: denied { nlmsg_tty_audit } for pid=8602 comm="crond" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=netlink_audit_socket
Steve does it make sense that crond would be turning this audit flag on, or is this a problem in the pam setup? Crond should not be needing keystroke logging because its not interactive. I suppose its pulled in by the general config. I don't think it harms anything either way. Crond won't be doing any typing, so it would log nothing if it were allowed. But if you denied and don't audit, then you get the same thing. Added dontaudit in Rawhide. Fixed in selinux-policy-3.7.19-136.el6 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2012-0780.html |