Bug 550798 - SELinux is preventing /usr/sbin/sendmail.sendmail access to a leaked unix_stream_socket file descriptor.
Summary: SELinux is preventing /usr/sbin/sendmail.sendmail access to a leaked unix_str...
Keywords:
Status: CLOSED DUPLICATE of bug 522767
Alias: None
Product: Fedora
Classification: Fedora
Component: fail2ban
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Axel Thimm
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:a2bf033a885...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-12-27 13:55 UTC by Michael Gruys
Modified: 2010-01-03 02:59 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-01-03 02:59:06 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michael Gruys 2009-12-27 13:55:04 UTC
Samenvatting:

SELinux is preventing /usr/sbin/sendmail.sendmail access to a leaked
unix_stream_socket file descriptor.

Gedetailleerde omschrijving:

[sendmail heeft een toelatend type (system_mail_t). Deze toegang was niet
verboden.]

SELinux denied access requested by the sendmail command. It looks like this is
either a leaked descriptor or sendmail output was redirected to a file it is not
allowed to access. Leaks usually can be ignored since SELinux is just closing
the leak and reporting the error. The application does not use the descriptor,
so it will run properly. If this is a redirection, you will not get output in
the unix_stream_socket. You should generate a bugzilla on selinux-policy, and it
will get routed to the appropriate package. You can safely ignore this avc.

Teogang toestaan:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385)

Additionele informatie:

Bron context                  system_u:system_r:system_mail_t:s0
Doel context                  system_u:system_r:fail2ban_t:s0
Doel objecten                 unix_stream_socket [ unix_stream_socket ]
Bron                          sendmail
Bron pad                      /usr/sbin/sendmail.sendmail
Poort                         <Onbekend>
Host                          (removed)
Bron RPM pakketten            sendmail-8.14.3-8.fc12
Doel RPM pakketten            
Gedragslijn RPM               selinux-policy-3.6.32-59.fc12
SELinux aangezet              True
Gedragslijn type              targeted
Enforcing modus               Enforcing
Pluginnaam                    leaks
Hostnaam                      (removed)
Platform                      Linux (removed) 2.6.31.9-174.fc12.i686.PAE #1 SMP Mon
                              Dec 21 06:04:56 UTC 2009 i686 i686
Aantal waarschuwingen         190
Eerst gezien op               wo 02 dec 2009 20:12:10 CET
Laatst gezien op              zo 27 dec 2009 13:17:14 CET
Locale ID                     5db4f4cb-5799-4bc5-a13d-8bbe0f8083ae
Regelnummers                  

Onbewerkte audit boodschappen 

node=(removed) type=AVC msg=audit(1261916234.914:39784): avc:  denied  { read write } for  pid=26427 comm="sendmail" path="socket:[13841]" dev=sockfs ino=13841 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:system_r:fail2ban_t:s0 tclass=unix_stream_socket

node=(removed) type=AVC msg=audit(1261916234.914:39784): avc:  denied  { read write } for  pid=26427 comm="sendmail" path="socket:[274867]" dev=sockfs ino=274867 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:system_r:fail2ban_t:s0 tclass=unix_dgram_socket

node=(removed) type=SYSCALL msg=audit(1261916234.914:39784): arch=40000003 syscall=11 success=yes exit=0 a0=9b7a560 a1=9b7aa90 a2=9b7a798 a3=9b7aa90 items=0 ppid=26425 pid=26427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) ses=4294967295 comm="sendmail" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:system_mail_t:s0 key=(null)



Hash String generated from  selinux-policy-3.6.32-59.fc12,leaks,sendmail,system_mail_t,fail2ban_t,unix_stream_socket,read,write
audit2allow suggests:

#============= system_mail_t ==============
allow system_mail_t fail2ban_t:unix_dgram_socket { read write };
allow system_mail_t fail2ban_t:unix_stream_socket { read write };

Comment 1 Jonathan Underwood 2010-01-03 02:59:06 UTC

*** This bug has been marked as a duplicate of bug 522767 ***


Note You need to log in before you can comment on or make changes to this bug.