Bug 726117 - [abrt] (null): SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
Summary: [abrt] (null): SELinux is preventing /usr/sbin/postdrop from 'getattr' access...
Keywords:
Status: CLOSED DUPLICATE of bug 705768
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: selinux-policy
Version: 6.1
Hardware: x86_64
OS: Linux
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Miroslav Grepl
QA Contact: BaseOS QE Security Team
URL:
Whiteboard: abrt_hash:659f290cc8b31fa29fe8ce8203d...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-07-27 15:11 UTC by Michal Nowak
Modified: 2013-03-08 02:12 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-07-28 12:40:52 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Michal Nowak 2011-07-27 15:11:45 UTC
abrt version: 2.0.5
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         2.6.32-171.el6.x86_64
reason:         SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
time:           Wed Jul 27 17:11:06 2011

description:
:SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
:
:*****  Plugin catchall (100. confidence) suggests  ***************************
:
:If you believe that postdrop should be allowed getattr access on the fifo_file fifo_file by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep postdrop /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                system_u:system_r:postfix_postdrop_t:s0-s0:c0.c102
:                              3
:Target Context                system_u:system_r:abrt_t:s0-s0:c0.c1023
:Target Objects                fifo_file [ fifo_file ]
:Source                        postdrop
:Source Path                   /usr/sbin/postdrop
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           postfix-2.6.6-3.el6
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.7.19-104.el6
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux dhcp-25-35.brq.redhat.com
:                              2.6.32-171.el6.x86_64 #1 SMP Thu Jul 21 23:23:33
:                              EDT 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Wed 27 Jul 2011 04:49:53 PM CEST
:Last Seen                     Wed 27 Jul 2011 04:49:53 PM CEST
:Local ID                      c4815221-d9c6-4369-a7a4-6abe0848c51e
:
:Raw Audit Messages
:type=AVC msg=audit(1311778193.667:22): avc:  denied  { getattr } for  pid=31383 comm="postdrop" path="pipe:[201861]" dev=pipefs ino=201861 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tclass=fifo_file
:
:
:type=SYSCALL msg=audit(1311778193.667:22): arch=x86_64 syscall=fstat success=no exit=EACCES a0=2 a1=7fff63470690 a2=7fff63470690 a3=7fff634703c0 items=0 ppid=31382 pid=31383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=90 sgid=90 fsgid=90 tty=(none) ses=4294967295 comm=postdrop exe=/usr/sbin/postdrop subj=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 key=(null)
:
:Hash: postdrop,postfix_postdrop_t,abrt_t,fifo_file,getattr
:
:audit2allow
:
:#============= postfix_postdrop_t ==============
:allow postfix_postdrop_t abrt_t:fifo_file getattr;
:
:audit2allow -R
:
:#============= postfix_postdrop_t ==============
:allow postfix_postdrop_t abrt_t:fifo_file getattr;
:

Comment 2 Miroslav Grepl 2011-07-28 05:36:26 UTC
Michal,
how did you get this?

Comment 3 Michal Nowak 2011-07-28 10:05:51 UTC
with abrt-2.0.4-1.el6.x86_64 and libreport-2.0.5-1.el6.x86_64 I prepared a crash via

  sleep 3m &
  kill -11 %1

and found SELinux AVC in /var/log/messages after abrtd processed the crash dir (no reporting involved).

Comment 4 Jiri Moskovcak 2011-07-28 12:24:52 UTC
I think this is dupe of #705768. In rhel6 there is by default enabled reporting to root@localhost, which is done by abrtd.

This is the line from abrt_event.conf responsible for it:

EVENT=post-create       reporter-mailx

- means: run reporter-mailx when a new crash is detected

Comment 5 Miroslav Grepl 2011-07-28 12:40:52 UTC
Yeap, I also think so.

*** This bug has been marked as a duplicate of bug 705768 ***


Note You need to log in before you can comment on or make changes to this bug.