Bug 566009

Summary: SELinux is preventing /bin/mount access to a leaked udp_socket file descriptor.
Product: [Fedora] Fedora Reporter: James Heather <drfudgeboy>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: low    
Version: 12CC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:5c45989d76fd0e0c125d35a04a5c745c29bbccdaa7165458ab4c75df4dea0dba
Fixed In Version: selinux-policy-3.6.32-92.fc12 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-03-04 00:16:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description James Heather 2010-02-16 21:30:50 UTC
Summary:

SELinux is preventing /bin/mount access to a leaked udp_socket file descriptor.

Detailed Description:

[mount has a permissive type (mount_t). This access was not denied.]

SELinux denied access requested by the mount command. It looks like this is
either a leaked descriptor or mount output was redirected to a file it is not
allowed to access. Leaks usually can be ignored since SELinux is just closing
the leak and reporting the error. The application does not use the descriptor,
so it will run properly. If this is a redirection, you will not get output in
the udp_socket. You should generate a bugzilla on selinux-policy, and it will
get routed to the appropriate package. You can safely ignore this avc.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385)

Additional Information:

Source Context                system_u:system_r:mount_t:s0
Target Context                system_u:system_r:automount_t:s0
Target Objects                udp_socket [ udp_socket ]
Source                        mount
Source Path                   /bin/mount
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           util-linux-ng-2.16.2-5.fc12
Target RPM Packages           
Policy RPM                    selinux-policy-3.6.32-84.fc12
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Plugin Name                   leaks
Host Name                     (removed)
Platform                      Linux (removed)
                              2.6.31.12-174.2.3.fc12.x86_64 #1 SMP Mon Jan 18
                              19:52:07 UTC 2010 x86_64 x86_64
Alert Count                   1
First Seen                    Tue 16 Feb 2010 14:20:31 GMT
Last Seen                     Tue 16 Feb 2010 14:20:31 GMT
Local ID                      aae3a110-eae0-4803-8cdd-98ae224471af
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1266330031.148:37353): avc:  denied  { read write } for  pid=10089 comm="mount" path="socket:[190409]" dev=sockfs ino=190409 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=udp_socket

node=(removed) type=SYSCALL msg=audit(1266330031.148:37353): arch=c000003e syscall=59 success=yes exit=0 a0=7f2e1a1eb330 a1=7f2e1a1ea240 a2=7f2e1e302330 a3=7f2e1a1e95a0 items=0 ppid=1996 pid=10089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="mount" exe="/bin/mount" subj=system_u:system_r:mount_t:s0 key=(null)



Hash String generated from  leaks,mount,mount_t,automount_t,udp_socket,read,write
audit2allow suggests:

#============= mount_t ==============
allow mount_t automount_t:udp_socket { read write };

Comment 1 Daniel Walsh 2010-02-16 21:44:12 UTC
Miroslav add


ifdef(`hide_broken_symptoms', `
	dontaudit mount_t $1:socket_class_set { read write };
')

To mount_domtrans

Comment 2 Miroslav Grepl 2010-02-16 21:49:19 UTC
Fixed in selinux-policy-3.6.32-91.fc12

Comment 3 Fedora Update System 2010-02-23 20:57:28 UTC
selinux-policy-3.6.32-92.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-92.fc12

Comment 4 Fedora Update System 2010-02-26 03:44:12 UTC
selinux-policy-3.6.32-92.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2010-2953

Comment 5 Fedora Update System 2010-03-04 00:12:56 UTC
selinux-policy-3.6.32-92.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.