Bug 699699 - AVCs and USER_AVCs appear when somebody logs in as Guest via GDM
Summary: AVCs and USER_AVCs appear when somebody logs in as Guest via GDM
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.1
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: Karel Srot
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-04-26 12:09 UTC by Milos Malik
Modified: 2011-05-19 12:28 UTC (History)
5 users (show)

Fixed In Version: selinux-policy-3.7.19-92.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-05-19 12:28:04 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2011:0526 0 normal SHIPPED_LIVE selinux-policy bug fix and enhancement update 2011-05-19 09:37:41 UTC

Description Milos Malik 2011-04-26 12:09:53 UTC
Description of problem:


Version-Release number of selected component (if applicable):
selinux-policy-mls-3.7.19-87.el6.noarch
selinux-policy-minimum-3.7.19-87.el6.noarch
selinux-policy-3.7.19-87.el6.noarch
selinux-policy-targeted-3.7.19-87.el6.noarch
selinux-policy-doc-3.7.19-87.el6.noarch

How reproducible:
always

Steps to Reproduce:
1. get a RHEL-6.1 machine
2. install xguest package
3. log in as Guest via GDM
  
Actual results:
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.322:476): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { shmempwd } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.323:477): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { getpwd } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.328:478): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { shmemgrp } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:20 2011
type=USER_AVC msg=audit(1303819160.328:479): user pid=1957 uid=28 auid=4294967295 ses=4294967295 subj=system_u:system_r:nscd_t:s0 msg='avc:  denied  { getgrp } for  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=nscd : exe="?" sauid=28 hostname=? addr=? terminal=?'
----
time->Tue Apr 26 13:59:19 2011
type=SYSCALL msg=audit(1303819159.154:463): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfc09f8c a2=c63ff4 a3=bfc09fa0 items=0 ppid=11033 pid=11068 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="namespace.init" exe="/bin/bash" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819159.154:463): avc:  denied  { connectto } for  pid=11068 comm="namespace.init" path="/var/run/nscd/socket" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:nscd_t:s0 tclass=unix_stream_socket
type=AVC msg=audit(1303819159.154:463): avc:  denied  { write } for  pid=11068 comm="namespace.init" name="socket" dev=dm-0 ino=4430 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=sock_file
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.329:480): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bf88066c a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.329:480): avc:  denied  { create } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.330:481): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.330:481): avc:  denied  { node_bind } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=tcp_socket
type=AVC msg=audit(1303819160.330:481): avc:  denied  { bind } for  pid=11092 comm="chown" scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.330:482): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf88066c a2=c63ff4 a3=3 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.330:482): avc:  denied  { name_connect } for  pid=11092 comm="chown" dest=111 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket
type=AVC msg=audit(1303819160.330:482): avc:  denied  { connect } for  pid=11092 comm="chown" lport=41092 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.332:483): arch=40000003 syscall=4 success=yes exit=60 a0=3 a1=8889b28 a2=3c a3=3c items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.332:483): avc:  denied  { write } for  pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.333:484): arch=40000003 syscall=3 success=yes exit=32 a0=3 a1=8889cb8 a2=190 a3=8889a78 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.333:484): avc:  denied  { read } for  pid=11092 comm="chown" path="socket:[97446]" dev=sockfs ino=97446 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.334:485): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf880698 a2=c63ff4 a3=bf8806ac items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.334:485): avc:  denied  { net_bind_service } for  pid=11092 comm="chown" capability=10  scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tclass=capability
type=AVC msg=audit(1303819160.334:485): avc:  denied  { name_bind } for  pid=11092 comm="chown" src=668 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
----
time->Tue Apr 26 13:59:20 2011
type=SYSCALL msg=audit(1303819160.338:486): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf8806d0 a2=c63ff4 a3=8889a00 items=0 ppid=11082 pid=11092 auid=512 uid=0 gid=513 euid=0 suid=0 fsuid=0 egid=513 sgid=513 fsgid=513 tty=(none) ses=29 comm="chown" exe="/bin/chown" subj=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1303819160.338:486): avc:  denied  { name_connect } for  pid=11092 comm="chown" dest=863 scontext=system_u:system_r:namespace_init_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
----

Expected results:
no AVCs and USER_AVCs

Comment 1 Milos Malik 2011-04-26 12:12:53 UTC
Following module helped:

policy_module(local,1.0)

require {
    type namespace_init_t;
}

nis_use_ypbind(namespace_init_t)
nscd_socket_use(namespace_init_t)

Comment 2 Daniel Walsh 2011-04-26 15:11:33 UTC
Miroslav we need auth_use_nsswitch(namespace_init_t)

Comment 3 Miroslav Grepl 2011-04-26 20:43:59 UTC
Yes, it relates to NIS.

Comment 4 RHEL Program Management 2011-04-27 06:00:13 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 6 Miroslav Grepl 2011-04-27 15:01:16 UTC
Fixed in selinux-policy-3.7.19-92.el6

Comment 9 errata-xmlrpc 2011-05-19 12:28:04 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2011-0526.html


Note You need to log in before you can comment on or make changes to this bug.