type=AVC msg=audit(1289828857.171:21043): avc: denied { getattr } for pid=4544 comm="check_mailq" path="/usr/share/perl5/strict.pm" dev=dm-3 ino=5769 scontext=unconfined_u:system_r:nagios_mail_plugin_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1289828857.171:21043): arch=c000003e syscall=4 success=yes exit=0 a0=d294f0 a1=7fffd529dfa0 a2=7fffd529dfa0 a3=20 items=1 ppid=4543 pid=4544 auid=10001 uid=497 gid=497 euid=497 suid=497 fsuid=497 egid=497 sgid=497 fsgid=497 tty=(none) ses=1698 comm="check_mailq" exe="/usr/bin/perl" subj=unconfined_u:system_r:nagios_mail_plugin_t:s0 key=(null) type=AVC msg=audit(1289828857.171:21044): avc: denied { read } for pid=4544 comm="check_mailq" name="strict.pm" dev=dm-3 ino=5769 scontext=unconfined_u:system_r:nagios_mail_plugin_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=AVC msg=audit(1289828857.171:21044): avc: denied { open } for pid=4544 comm="check_mailq" name="strict.pm" dev=dm-3 ino=5769 scontext=unconfined_u:system_r:nagios_mail_plugin_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1289828857.171:21044): arch=c000003e syscall=2 success=yes exit=7 a0=d29550 a1=0 a2=1b6 a3=7f6e02aead40 items=1 ppid=4543 pid=4544 auid=10001 uid=497 gid=497 euid=497 suid=497 fsuid=497 egid=497 sgid=497 fsgid=497 tty=(none) ses=1698 comm="check_mailq" exe="/usr/bin/perl" subj=unconfined_u:system_r:nagios_mail_plugin_t:s0 key=(null) type=AVC msg=audit(1289828857.171:21045): avc: denied { ioctl } for pid=4544 comm="check_mailq" path="/usr/share/perl5/strict.pm" dev=dm-3 ino=5769 scontext=unconfined_u:system_r:nagios_mail_plugin_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1289828857.171:21045): arch=c000003e syscall=16 success=no exit=-25 a0=7 a1=5401 a2=7fffd529dd10 a3=48 items=0 ppid=4543 pid=4544 auid=10001 uid=497 gid=497 euid=497 suid=497 fsuid=497 egid=497 sgid=497 fsgid=497 tty=(none) ses=1698 comm="check_mailq" exe="/usr/bin/perl" subj=unconfined_u:system_r:nagios_mail_plugin_t:s0 key=(null)
Fixed in selinux-policy-3.7.19-72.fc13
selinux-policy-3.7.19-73.fc13 has been submitted as an update for Fedora 13. https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-73.fc13
selinux-policy-3.7.19-73.fc13 has been pushed to the Fedora 13 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-73.fc13
selinux-policy-3.7.19-73.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.