Bug 150686 - avc: denied ... for pid=2157 exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t
avc: denied ... for pid=2157 exe=/sbin/ifconfig scontext=user_u:system_r:d...
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted (Show other bugs)
rawhide
All Linux
medium Severity medium
: ---
: ---
Assigned To: Daniel Walsh
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-03-09 12:44 EST by sangu
Modified: 2007-11-30 17:11 EST (History)
0 users

See Also:
Fixed In Version: selinux-policy-targeted-1.21.16-4
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-03-09 22:04:03 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description sangu 2005-03-09 12:44:53 EST
Description of problem:

audit(1110387434.709:0): avc:  denied  { create } for  pid=2157
exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t
tcontext=user_u:system_r:dhcpc_t tclass=socket
audit(1110387434.709:0): avc:  denied  { create } for  pid=2157
exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t
tcontext=user_u:system_r:dhcpc_t tclass=socket
audit(1110387439.077:0): avc:  denied  { read } for  pid=2186 exe=/sbin/ifconfig
name=net dev=proc ino=-268435434 scontext=user_u:system_r:dhcpc_t
tcontext=system_u:object_r:proc_net_t tclass=dir
audit(1110387439.077:0): avc:  denied  { create } for  pid=2186
exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t
tcontext=user_u:system_r:dhcpc_t tclass=socket
audit(1110387439.077:0): avc:  denied  { create } for  pid=2186
exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t
tcontext=user_u:system_r:dhcpc_t tclass=socket
audit(1110387439.077:0): avc:  denied  { create } for  pid=2186
exe=/sbin/ifconfig scontext=user_u:system_r:dhcpc_t audit(1110387622.728:0):
avc:  granted  { setenforce } for  pid=3514 exe=/usr/sbin/setenforce
scontext=root:system_r:unconfined_t tcontext=system_u:object_r:security_t
tclass=security
audit(1110387639.848:0): avc:  denied  { getattr } for  pid=3589
exe=/sbin/consoletype path=/dev/pts/2 dev=devpts ino=4
scontext=root:system_r:dhcpc_t tcontext=user_u:object_r:devpts_t tclass=chr_file
Disabled Privacy Extensions on device c03e9640(lo)
audit(1110387641.105:0): avc:  denied  { read } for  pid=3900 exe=/sbin/ifconfig
name=net dev=proc ino=-268435434 scontext=root:system_r:dhcpc_t
tcontext=system_u:object_r:proc_net_t tclass=dir
audit(1110387641.106:0): avc:  denied  { search } for  pid=3900
exe=/sbin/ifconfig name=net dev=proc ino=-268435350
scontext=root:system_r:dhcpc_t tcontext=system_u:object_r:sysctl_net_t tclass=dir
audit(1110387643.108:0): avc:  denied  { nlmsg_write } for  pid=3937
exe=/sbin/ip scontext=root:system_r:dhcpc_t tcontext=root:system_r:dhcpc_t
tclass=netlink_route_socket


Version-Release number of selected component (if applicable):
selinux-policy-targeted-1.21.16-1

How reproducible:
always


Steps to Reproduce:
1. service network start
2.
3.
  
Actual results:


Expected results:


Additional info:
Comment 1 Daniel Walsh 2005-03-09 14:11:19 EST
Fixed in selinux-policy-targeted-1.21.16-2

Note You need to log in before you can comment on or make changes to this bug.