Hide Forgot
SELinux is preventing /usr/sbin/nscd from read, append access on the file /tmp/tmpVphOln. ***** Plugin leaks (50.5 confidence) suggests ****************************** If you want to ignore nscd trying to read append access the tmpVphOln file, because you believe it should not need this access. Then you should report this as a bug. You can generate a local policy module to dontaudit this access. Do # grep /usr/sbin/nscd /var/log/audit/audit.log | audit2allow -D -M mypol # semodule -i mypol.pp ***** Plugin catchall (50.5 confidence) suggests *************************** If you believe that nscd should be allowed read append access on the tmpVphOln file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep nscd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:nscd_t:s0-s0:c0.c1023 Target Context system_u:object_r:initrc_tmp_t:s0 Target Objects /tmp/tmpVphOln [ file ] Source nscd Source Path /usr/sbin/nscd Port <Unknown> Host (removed) Source RPM Packages nscd-2.12.2-1 Target RPM Packages Policy RPM selinux-policy-3.7.19-101.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.34.8-68.fc13.x86_64 #1 SMP Thu Feb 17 15:03:58 UTC 2011 x86_64 x86_64 Alert Count 4 First Seen Sun 12 Jun 2011 09:54:47 PM PDT Last Seen Sun 12 Jun 2011 09:54:47 PM PDT Local ID 3178059c-0364-4826-bfbd-b3657270eef9 Raw Audit Messages type=AVC msg=audit(1307940887.366:44477): avc: denied { read append } for pid=24746 comm="nscd" path="/tmp/tmpVphOln" dev=dm-0 ino=1835085 scontext=system_u:system_r:nscd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file type=AVC msg=audit(1307940887.366:44477): avc: denied { read append } for pid=24746 comm="nscd" path="/tmp/tmpVphOln" dev=dm-0 ino=1835085 scontext=system_u:system_r:nscd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1307940887.366:44477): arch=x86_64 syscall=execve success=yes exit=0 a0=411910 a1=7fff8cf79380 a2=7fff8cf793b0 a3=0 items=0 ppid=24742 pid=24746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=nscd exe=/usr/sbin/nscd subj=system_u:system_r:nscd_t:s0-s0:c0.c1023 key=(null) Hash: nscd,nscd_t,initrc_tmp_t,file,read,append audit2allow #============= nscd_t ============== allow nscd_t initrc_tmp_t:file { read append }; audit2allow -R #============= nscd_t ============== allow nscd_t initrc_tmp_t:file { read append };
Could you add your output of # ps -eZ |grep initrc
Fedora 13 changed to end-of-life (EOL) status on 2011-06-25. Fedora 13 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. Thank you for reporting this bug and we are sorry it could not be fixed.