Bug 769865 - SELinux is preventing /usr/sbin/nscd from 'read' accesses on the file unix.
Summary: SELinux is preventing /usr/sbin/nscd from 'read' accesses on the file unix.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 16
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:0d0d75165d043171b46ca6b85ac...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-12-22 15:16 UTC by Jerry James
Modified: 2012-04-22 03:35 UTC (History)
5 users (show)

Fixed In Version: selinux-policy-3.10.0-84.fc16
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-04-22 03:35:56 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jerry James 2011-12-22 15:16:54 UTC
libreport version: 2.0.8
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         3.1.5-6.fc16.x86_64
reason:         SELinux is preventing /usr/sbin/nscd from 'read' accesses on the file unix.
time:           Thu 22 Dec 2011 08:16:07 AM MST

description:
:SELinux is preventing /usr/sbin/nscd from 'read' accesses on the file unix.
:
:*****  Plugin catchall (100. confidence) suggests  ***************************
:
:If you believe that nscd should be allowed read access on the unix file by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep nscd /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                system_u:system_r:nscd_t:s0
:Target Context                system_u:object_r:proc_net_t:s0
:Target Objects                unix [ file ]
:Source                        nscd
:Source Path                   /usr/sbin/nscd
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           nscd-2.14.90-21
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-64.fc16
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.1.5-6.fc16.x86_64
:                              #1 SMP Thu Dec 15 16:14:44 UTC 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Thu 22 Dec 2011 07:48:16 AM MST
:Last Seen                     Thu 22 Dec 2011 07:48:16 AM MST
:Local ID                      8321b6a9-d6bc-4c1e-b51f-5b3f37bc4d89
:
:Raw Audit Messages
:type=AVC msg=audit(1324565296.572:1114): avc:  denied  { read } for  pid=4210 comm="nscd" name="unix" dev=proc ino=4026532000 scontext=system_u:system_r:nscd_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file
:
:
:type=SYSCALL msg=audit(1324565296.572:1114): arch=x86_64 syscall=access success=no exit=EACCES a0=7fe2a31f6080 a1=4 a2=7fe2a31f608e a3=7fe2a31f5e90 items=0 ppid=1 pid=4210 auid=4294967295 uid=28 gid=28 euid=28 suid=28 fsuid=28 egid=28 sgid=28 fsgid=28 tty=(none) ses=4294967295 comm=nscd exe=/usr/sbin/nscd subj=system_u:system_r:nscd_t:s0 key=(null)
:
:Hash: nscd,nscd_t,proc_net_t,file,read
:
:audit2allow
:
:#============= nscd_t ==============
:allow nscd_t proc_net_t:file read;
:
:audit2allow -R
:
:#============= nscd_t ==============
:allow nscd_t proc_net_t:file read;
:

Comment 1 Jerry James 2011-12-22 15:18:44 UTC
I don't know what triggered this.  I had done a "yum upgrade" about 5 minutes prior, but was doing purely local work on my machine when sealert popped up.  I did have Firefox up, so it's possible an ad on some page did something to trigger this, I suppose.

Comment 2 Miroslav Grepl 2012-03-15 15:19:52 UTC
commit 7d4aea72c96537e8ebef1d5c3a9d7cbb01a70e64
Author: Miroslav Grepl <mgrepl>
Date:   Thu Mar 15 17:19:13 2012 +0000

    Allow nscd to read kernel network state

Comment 3 Fedora Update System 2012-04-18 12:53:45 UTC
selinux-policy-3.10.0-84.fc16 has been submitted as an update for Fedora 16.
https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-84.fc16

Comment 4 Fedora Update System 2012-04-22 03:35:56 UTC
selinux-policy-3.10.0-84.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.