Bug 226999 - logwatch audit script exits prematurely with SELinux enabled
logwatch audit script exits prematurely with SELinux enabled
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: logwatch (Show other bugs)
6
All Linux
medium Severity medium
: ---
: ---
Assigned To: Ivana Varekova
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-02-02 10:57 EST by Ted Rule
Modified: 2007-11-30 17:11 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-02-05 04:21:18 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Ted Rule 2007-02-02 10:57:05 EST
Description of problem:

The combination of strict enforcing SELinux policy and this line in 
/usr/share/logwatch/scripts/services/audit:

exit(0) unless -d '/selinux';

means that no log summary is produced for the "audit" service by
/etc/cron.daily/0logwatch

Because this line in /usr/share/logwatch/default.conf/services/audit.conf

*OnlyService = (kernel:)?\s*audit.*

filters out any non-audit log messages from the "pipe" into the service script,
it is effectively passed a null-length pipe if SELinux is not running anyway.
Hence the simplest fix is simply to remove the test for visibility of /selinux
in the logwatch service script, and avoid any further change to SELinux policy.


Version-Release number of selected component (if applicable):

logwatch-7.3-7.fc6 and selinux-policy-strict-2.4.6-27.fc6


How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:
Comment 1 Ivana Varekova 2007-02-05 04:21:18 EST
fixed in logwatch-7.3.2-6.fc7.

Note You need to log in before you can comment on or make changes to this bug.