Bug 572548 - SELinux is preventing /usr/sbin/postdrop access to a leaked unix_stream_socket file descriptor.
Summary: SELinux is preventing /usr/sbin/postdrop access to a leaked unix_stream_socke...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 12
Hardware: i386
OS: Linux
low
medium
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:4ae6b218679...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-03-11 14:12 UTC by Heldwin
Modified: 2010-03-20 03:32 UTC (History)
2 users (show)

Fixed In Version: selinux-policy-3.6.32-103.fc12
Clone Of:
Environment:
Last Closed: 2010-03-20 03:32:08 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Heldwin 2010-03-11 14:12:43 UTC
Résumé:

SELinux is preventing /usr/sbin/postdrop access to a leaked unix_stream_socket
file descriptor.

Description détaillée:

[SELinux est en mode permissif. Cet accès n'a pas été refusé.]

SELinux denied access requested by the postdrop command. It looks like this is
either a leaked descriptor or postdrop output was redirected to a file it is not
allowed to access. Leaks usually can be ignored since SELinux is just closing
the leak and reporting the error. The application does not use the descriptor,
so it will run properly. If this is a redirection, you will not get output in
the unix_stream_socket. You should generate a bugzilla on selinux-policy, and it
will get routed to the appropriate package. You can safely ignore this avc.

Autoriser l'accès:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385)

Informations complémentaires:

Contexte source               unconfined_u:system_r:postfix_postdrop_t:s0
Contexte cible                unconfined_u:system_r:postfix_local_t:s0
Objets du contexte            unix_stream_socket [ unix_stream_socket ]
source                        postdrop
Chemin de la source           /usr/sbin/postdrop
Port                          <Inconnu>
Hôte                         (removed)
Paquetages RPM source         postfix-2.6.5-2.fc12
Paquetages RPM cible          
Politique RPM                 selinux-policy-3.6.32-92.fc12
Selinux activé               True
Type de politique             targeted
Mode strict                   Permissive
Nom du plugin                 leaks
Nom de l'hôte                (removed)
Plateforme                    Linux (removed)
                              2.6.31.12-174.2.22.fc12.i686 #1 SMP Fri Feb 19
                              19:26:06 UTC 2010 i686 i686
Compteur d'alertes            1
Première alerte              jeu 11 mar 2010 15:00:15 CET
Dernière alerte              jeu 11 mar 2010 15:00:15 CET
ID local                      67fd9d13-63ab-4463-8d7d-62ecfb73f03e
Numéros des lignes           

Messages d'audit bruts        

node=(removed) type=AVC msg=audit(1268316015.240:22036): avc:  denied  { read write } for  pid=11266 comm="postdrop" path="socket:[384124]" dev=sockfs ino=384124 scontext=unconfined_u:system_r:postfix_postdrop_t:s0 tcontext=unconfined_u:system_r:postfix_local_t:s0 tclass=unix_stream_socket

node=(removed) type=SYSCALL msg=audit(1268316015.240:22036): arch=40000003 syscall=11 success=yes exit=0 a0=2a33928 a1=2a339e8 a2=2a338b8 a3=2a339e8 items=0 ppid=11265 pid=11266 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=90 sgid=90 fsgid=90 tty=(none) ses=1 comm="postdrop" exe="/usr/sbin/postdrop" subj=unconfined_u:system_r:postfix_postdrop_t:s0 key=(null)



Hash String generated from  leaks,postdrop,postfix_postdrop_t,postfix_local_t,unix_stream_socket,read,write
audit2allow suggests:

#============= postfix_postdrop_t ==============
allow postfix_postdrop_t postfix_local_t:unix_stream_socket { read write };

Comment 1 Daniel Walsh 2010-03-11 14:57:18 UTC
Looks like a leak.

But Just add it.

allow postfix_postdrop_t postfix_local_t:unix_stream_socket { read write };

Comment 2 Miroslav Grepl 2010-03-15 11:14:37 UTC
Fixed in selinux-policy-3.6.32-102.fc12

Comment 3 Fedora Update System 2010-03-15 22:18:17 UTC
selinux-policy-3.6.32-103.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-103.fc12

Comment 4 Fedora Update System 2010-03-16 23:24:30 UTC
selinux-policy-3.6.32-103.fc12 has been pushed to the Fedora 12 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-103.fc12

Comment 5 Fedora Update System 2010-03-20 03:30:28 UTC
selinux-policy-3.6.32-103.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.