Summary: SELinux is preventing /bin/bash "read" access on meminfo. Detailed Description: SELinux denied access requested by avahi-dnsconfd.. It is not expected that this access is required by avahi-dnsconfd. and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:avahi_t:s0 Target Context system_u:object_r:proc_t:s0 Target Objects meminfo [ file ] Source avahi-dnsconfd. Source Path /bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.0.35-2.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-59.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.6-166.fc12.i686.PAE #1 SMP Wed Dec 9 11:00:30 EST 2009 i686 athlon Alert Count 5 First Seen Sat 26 Dec 2009 09:00:03 PM EET Last Seen Sat 26 Dec 2009 09:06:07 PM EET Local ID f7653ecd-dcce-4e10-aa74-f81d4ec3d8a4 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1261854367.12:1021): avc: denied { read } for pid=11878 comm="avahi-dnsconfd." name="meminfo" dev=proc ino=4026531998 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1261854367.12:1021): arch=40000003 syscall=5 success=no exit=-13 a0=952914 a1=0 a2=1b6 a3=950fab items=0 ppid=1535 pid=11878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="avahi-dnsconfd." exe="/bin/bash" subj=system_u:system_r:avahi_t:s0 key=(null) Hash String generated from selinux-policy-3.6.32-59.fc12,catchall,avahi-dnsconfd.,avahi_t,proc_t,file,read audit2allow suggests: #============= avahi_t ============== allow avahi_t proc_t:file read;
yum update selinux-policy-targeted --enablerepo=updates-testing *** This bug has been marked as a duplicate of bug 547979 ***