Bug 219234 - spamd avc's
Summary: spamd avc's
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted
Version: 6
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Ben Levenson
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-12-12 00:17 UTC by Dave Jones
Modified: 2015-01-04 22:29 UTC (History)
1 user (show)

Fixed In Version: Current
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-08-22 14:03:07 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Dave Jones 2006-12-12 00:17:01 UTC
After running sa-update to update to latest rules, I got some new AVC's, which
seem to have broken spamassassins ability to catch spam completely.


type=AVC msg=audit(1165882393.398:15): avc:  denied  { read } for  pid=2706
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=user_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir
type=SYSCALL msg=audit(1165882393.398:15): arch=c000003e syscall=2 success=no
exit=-13 a0=1cf7940 a1=10800 a2=2 a3=0 items=0 ppid=2704 pid=2706
auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
tty=(none) comm="spamd" exe="/usr/bin/perl" subj=user_u:system_r:spamd_t:s0
key=(null)
type=AVC msg=audit(1165882393.398:16): avc:  denied  { read } for  pid=2706
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=user_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir
type=SYSCALL msg=audit(1165882393.398:16): arch=c000003e syscall=2 success=no
exit=-13 a0=1cea6e0 a1=10800 a2=2 a3=8c7d70 items=0 ppid=2704 pid=2706
auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
tty=(none) comm="spamd" exe="/usr/bin/perl" subj=user_u:system_r:spamd_t:s0
key=(null)

Comment 1 Daniel Walsh 2006-12-12 15:16:38 UTC
Where is this directory located ?  3.001007?


Comment 2 Dave Jones 2006-12-19 04:11:23 UTC
/var/lib/spamassassin/

Comment 3 Daniel Walsh 2006-12-19 19:05:32 UTC
Fixed in selinux-policy-2.4.6-15

Comment 4 Dave Jones 2007-01-02 02:30:46 UTC
$ rpm -q selinux-policy-targeted
selinux-policy-targeted-2.4.6-17.fc6

type=AVC msg=audit(1167703149.314:7): avc:  denied  { read } for  pid=3137
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=system_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0
tclass=dir
type=AVC msg=audit(1167703149.315:8): avc:  denied  { read } for  pid=3137
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=system_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0
tclass=dir
type=AVC msg=audit(1167703241.378:19): avc:  denied  { read } for  pid=4772
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=user_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir
type=AVC msg=audit(1167703241.379:20): avc:  denied  { read } for  pid=4772
comm="spamd" name="3.001007" dev=md0 ino=5472259
scontext=user_u:system_r:spamd_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir


Comment 5 Daniel Walsh 2007-01-02 15:27:06 UTC
Ok fixed in selinux-policy-2.4.6-21

Comment 6 Daniel Walsh 2007-08-22 14:03:07 UTC
Closed as all fixes are in the current release


Note You need to log in before you can comment on or make changes to this bug.