From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11 Description of problem: SELinux is preventing /usr/sbin/ntpd (ntpd_t) "read write" access to socket:[42433541] (unconfined_t). Raw Audit Messages : avc: denied { read, write } for comm="ntpd" dev=sockfs egid=0 euid=0 exe="/usr/sbin/ntpd" exit=0 fsgid=0 fsuid=0 gid=0 items=0 path="socket:[42433541]" pid=29279 scontext=system_u:system_r:ntpd_t:s0 sgid=0 subj=system_u:system_r:ntpd_t:s0 suid=0 tclass=unix_stream_socket tcontext=system_u:system_r:unconfined_t:s0 tty=(none) uid=0 Version-Release number of selected component (if applicable): kernel-2.6.18-53.1.14.el5xen selinux-policy-2.4.6-106.el5_1.3 ntp-4.2.2p1-7.el5 [application] How reproducible: Always Steps to Reproduce: 1. System -> Administration -> Day & Time 2. Choose NTP Sub-panel 3. Enable NTP 4. OK Actual Results: SELinux AVC Denial Expected Results: Additional info:
I believe this is fixed by the U2 Policy. selinux-policy-2.4.6-126.el5 You can download a test copy at http://people.redhat.com/dwalsh/SELinux/RHEL5
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2008-0465.html