Summary: SELinux is preventing gnome-volume-co (xguest_t) "name_connect" pulseaudio_port_t. Detailed Description: SELinux denied access requested by gnome-volume-co. It is not expected that this access is required by gnome-volume-co and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context xguest_u:xguest_r:xguest_t:s0 Target Context system_u:object_r:pulseaudio_port_t:s0 Target Objects None [ tcp_socket ] Source gnome-settings- Source Path /usr/libexec/gnome-settings-daemon Port 4713 Host (removed) Source RPM Packages gnome-media-2.28.1-1.fc11 Target RPM Packages Policy RPM selinux-policy-3.6.12-85.fc11 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.30.9-90.fc11.i686.PAE #1 SMP Sat Oct 17 11:24:32 EDT 2009 i686 i686 Alert Count 30 First Seen St 28. október 2009, 13:15:58 CET Last Seen St 4. november 2009, 20:42:58 CET Local ID 04cb8f7e-5e72-4370-9c7e-f00ccd7ac1ae Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1257363778.717:23): avc: denied { name_connect } for pid=2564 comm="gnome-volume-co" dest=4713 scontext=xguest_u:xguest_r:xguest_t:s0 tcontext=system_u:object_r:pulseaudio_port_t:s0 tclass=tcp_socket node=(removed) type=SYSCALL msg=audit(1257363778.717:23): arch=40000003 syscall=102 success=no exit=-13 a0=3 a1=bfe48bd0 a2=36f1d8 a3=0 items=0 ppid=2258 pid=2564 auid=501 uid=501 gid=501 euid=501 suid=501 fsuid=501 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm="gnome-volume-co" exe="/usr/bin/gnome-volume-control-applet" subj=xguest_u:xguest_r:xguest_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-85.fc11,catchall,gnome-settings-,xguest_t,pulseaudio_port_t,tcp_socket,name_connect audit2allow suggests: #============= xguest_t ============== allow xguest_t pulseaudio_port_t:tcp_socket name_connect;
*** This bug has been marked as a duplicate of bug 538428 ***