Bug 543142 - SELinux is preventing /sbin/iptables-multi access to a leaked fifo_file file descriptor.
Summary: SELinux is preventing /sbin/iptables-multi access to a leaked fifo_file file ...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:8f1acd1e3c3...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-01 19:15 UTC by Tom Beam
Modified: 2009-12-08 07:58 UTC (History)
2 users (show)

Fixed In Version: 3.6.32-55.fc12
Clone Of:
Environment:
Last Closed: 2009-12-07 22:47:26 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Tom Beam 2009-12-01 19:15:17 UTC
Summary:

SELinux is preventing /sbin/iptables-multi access to a leaked fifo_file file
descriptor.

Detailed Description:

[SELinux is in permissive mode. This access was not denied.]

SELinux denied access requested by the iptables command. It looks like this is
either a leaked descriptor or iptables output was redirected to a file it is not
allowed to access. Leaks usually can be ignored since SELinux is just closing
the leak and reporting the error. The application does not use the descriptor,
so it will run properly. If this is a redirection, you will not get output in
the fifo_file. You should generate a bugzilla on selinux-policy, and it will get
routed to the appropriate package. You can safely ignore this avc.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385)

Additional Information:

Source Context                unconfined_u:unconfined_r:iptables_t:s0-s0:c0.c102
                              3
Target Context                unconfined_u:unconfined_r:unconfined_java_t:s0-s0:
                              c0.c1023
Target Objects                fifo_file [ fifo_file ]
Source                        iptables
Source Path                   /sbin/iptables-multi
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           iptables-1.4.5-1.fc12
Target RPM Packages           
Policy RPM                    selinux-policy-3.6.32-49.fc12
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Plugin Name                   leaks
Host Name                     (removed)
Platform                      Linux (removed) 2.6.31.6-134.fc12.x86_64 #1
                              SMP Mon Nov 16 20:38:45 EST 2009 x86_64 x86_64
Alert Count                   2
First Seen                    Tue 01 Dec 2009 12:13:49 PM MST
Last Seen                     Tue 01 Dec 2009 12:13:49 PM MST
Local ID                      0a372a0a-07a5-4454-b4cc-2bba6e134e37
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1259694829.988:12743): avc:  denied  { read } for  pid=27202 comm="iptables" path="pipe:[17971565]" dev=pipefs ino=17971565 scontext=unconfined_u:unconfined_r:iptables_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_java_t:s0-s0:c0.c1023 tclass=fifo_file

node=(removed) type=AVC msg=audit(1259694829.988:12743): avc:  denied  { write } for  pid=27202 comm="iptables" path="pipe:[17971566]" dev=pipefs ino=17971566 scontext=unconfined_u:unconfined_r:iptables_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_java_t:s0-s0:c0.c1023 tclass=fifo_file

node=(removed) type=SYSCALL msg=audit(1259694829.988:12743): arch=c000003e syscall=59 success=yes exit=0 a0=18bdfc0 a1=1898a40 a2=18b78f0 a3=20 items=0 ppid=27175 pid=27202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="iptables" exe="/sbin/iptables-multi" subj=unconfined_u:unconfined_r:iptables_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-49.fc12,leaks,iptables,iptables_t,unconfined_java_t,fifo_file,read
audit2allow suggests:

#============= iptables_t ==============
allow iptables_t unconfined_java_t:fifo_file { read write };

Comment 1 Daniel Walsh 2009-12-01 19:53:08 UTC
You can add these rules for now using

# grep avc /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Fixed in selinux-policy-3.6.32-53.fc12.noarch

Comment 2 Fedora Update System 2009-12-03 20:27:28 UTC
selinux-policy-3.6.32-55.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-55.fc12

Comment 3 Fedora Update System 2009-12-04 23:45:38 UTC
selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2009-12650

Comment 4 Fedora Update System 2009-12-08 07:52:17 UTC
selinux-policy-3.6.32-55.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.