Summary: SELinux is preventing /usr/bin/python "write" access on .s.PGSQL.5432. Detailed Description: [osa-dispatcher has a permissive type (osa_dispatcher_t). This access was not denied.] SELinux denied access requested by osa-dispatcher. It is not expected that this access is required by osa-dispatcher and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:osa_dispatcher_t:s0 Target Context system_u:object_r:postgresql_tmp_t:s0 Target Objects .s.PGSQL.5432 [ sock_file ] Source osa-dispatcher Source Path /usr/bin/python Port <Unknown> Host (removed) Source RPM Packages python-2.6.4-27.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.19-51.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.34.6-47.fc13.x86_64 #1 SMP Fri Aug 27 08:56:01 UTC 2010 x86_64 x86_64 Alert Count 431 First Seen Tue 07 Sep 2010 08:59:06 AM CEST Last Seen Tue 07 Sep 2010 09:34:59 AM CEST Local ID 7da8cd56-d64c-4462-bd67-eb01a8905072 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1283844899.764:62555): avc: denied { write } for pid=1891 comm="osa-dispatcher" name=".s.PGSQL.5432" dev=sda7 ino=3276805 scontext=system_u:system_r:osa_dispatcher_t:s0 tcontext=system_u:object_r:postgresql_tmp_t:s0 tclass=sock_file node=(removed) type=SYSCALL msg=audit(1283844899.764:62555): arch=c000003e syscall=42 success=yes exit=68719476864 a0=4 a1=b619c0 a2=6e a3=0 items=0 ppid=1 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="osa-dispatcher" exe="/usr/bin/python" subj=system_u:system_r:osa_dispatcher_t:s0 key=(null) Hash String generated from catchall,osa-dispatcher,osa_dispatcher_t,postgresql_tmp_t,sock_file,write audit2allow suggests: #============= osa_dispatcher_t ============== allow osa_dispatcher_t postgresql_tmp_t:sock_file write;
osa-dispatcher-selinux-5.9.38-1.fc13.noarch, spacewalk-postgresql @ f13
Fixed in Spacewalk master, d0ebb56c992e025d94aa99c70fa650716761fe44.
Moving ON_QA ...
This bug has been fixed in Spacewalk 1.3.