Does anyone know why, starting around 2.6.20, heaps of processes require the CAP_NET_ADMIN capability?
Running a 2.6.18 (xen) kernel, everything is fine, but as soon as I go to 2.6.20 (xen) or a more recent pvops kernel (E.g. 2.6.27 or 2.6.32), the RBAC system starts reporting attempts by processes to use CAP_NET_ADMIN. From http://www.lids.org/lids-howto/node48.html, CAP_NET_ADMIN allows many things that sudo and cat just shouldn't need to do.
Jan 29 10:16:31 ns2 grsec: From 10.20.50.1: (root:U:/) use of CAP_NET_ADMIN denied for /bin/cat[cat:6378] uid/euid:0/0 gid/egid:0/0, parent /usr/local/bin/check_conns.sh[check_conns.sh:6377] uid/euid:414/414 gid/egid:414/414
Jan 29 10:16:36 ns2 grsec: From 10.20.50.2: (nagios:U:/usr/bin/sudo) use of CAP_NET_ADMIN denied for /usr/bin/sudo[sudo:6390] uid/euid:414/0 gid/egid:414/414, parent /usr/local/bin/check_conns.sh[check_conns.sh:6389] uid/euid:414/414 gid/egid:414/414
Any clues?