Your message dated Mon, 20 Oct 2008 13:47:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#502274: fixed in refpolicy 2:0.0.20080702-13
has caused the Debian Bug report #502274,
regarding no amavis policy, clamd policy instead?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
502274: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502274
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: selinux-policy-default
Version: 2:0.0.20080702-12
Severity: important

The amavis policy is not shipped in the Debian package, instead all
amavis files are tagged as clamd_*.  This doesn't work, the following
is a snippet from dmesg, with enforce=0:

Oct 15 08:02:05 bender kernel: type=1400 audit(1224050525.616:3211): avc:  
denied  { connectto } for  pid=30825 comm="amavisd-new" 
path="/var/run/clamav/clamd.ctl" scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:system_r:clamd_t:s0 tclass=unix_stream_socket
Oct 15 08:02:05 bender kernel: type=1400 audit(1224050525.684:3212): avc:  
denied  { name_bind } for  pid=30825 comm="amavisd-new" src=15191 
scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:port_t:s0 
tclass=udp_socket
Oct 15 08:02:05 bender kernel: type=1400 audit(1224050525.720:3213): avc:  
denied  { node_bind } for  pid=30825 comm="amavisd-new" src=15191 
scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=udp_socket
Oct 15 08:02:08 bender kernel: type=1400 audit(1224050528.317:3214): avc:  
denied  { name_connect } for  pid=30825 comm="amavisd-new" dest=10025 
scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:amavisd_send_port_t:s0 tclass=tcp_socket
Oct 15 08:02:11 bender kernel: type=1400 audit(1224050531.816:3215): avc:  
denied  { read } for  pid=30659 comm="amavisd-new" name="5.8" dev=sda3 
ino=14684357 scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file
Oct 15 08:04:08 bender kernel: type=1400 audit(1224050648.609:3216): avc:  
denied  { read } for  pid=32063 comm="file" name="magic.mgc" dev=sda3 
ino=10485954 scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:usr_t:s0 tclass=file
Oct 15 08:04:08 bender kernel: type=1400 audit(1224050648.645:3217): avc:  
denied  { getattr } for  pid=32063 comm="file" path="/usr/share/file/magic.mgc" 
dev=sda3 ino=10485954 scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:usr_t:s0 tclass=file
Oct 15 08:04:09 bender kernel: type=1400 audit(1224050649.024:3218): avc:  
denied  { signull } for  pid=30652 comm="amavisd-new" 
scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:system_r:clamd_t:s0 
tclass=process
Oct 15 08:06:07 bender kernel: type=1400 audit(1224050766.981:3219): avc:  
denied  { execute } for  pid=32092 comm="amavisd-new" name="file" dev=sda3 
ino=12584670 scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:bin_t:s0 tclass=file
Oct 15 08:06:07 bender kernel: type=1400 audit(1224050767.017:3220): avc:  
denied  { read } for  pid=32092 comm="amavisd-new" name="file" dev=sda3 
ino=12584670 scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:bin_t:s0 tclass=file
Oct 15 08:06:07 bender kernel: type=1400 audit(1224050767.057:3221): avc:  
denied  { execute_no_trans } for  pid=32092 comm="amavisd-new" 
path="/usr/bin/file" dev=sda3 ino=12584670 
scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:bin_t:s0 
tclass=file
Oct 15 08:06:07 bender kernel: type=1400 audit(1224050767.149:3222): avc:  
denied  { ioctl } for  pid=31004 comm="amavisd-new" 
path="/usr/share/perl/5.8.8/unicore/To/Fold.pl" dev=sda3 ino=134640 
scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:usr_t:s0 
tclass=file
Oct 15 08:07:51 bender kernel: type=1400 audit(1224050871.461:3223): avc:  
denied  { node_bind } for  pid=32129 comm="amavisd-new" src=2042 
scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=udp_socket
Oct 15 08:09:11 bender kernel: type=1400 audit(1224050951.301:3224): avc:  
denied  { name_connect } for  pid=31004 comm="amavisd-new" dest=10025 
scontext=system_u:system_r:clamd_t:s0 
tcontext=system_u:object_r:amavisd_send_port_t:s0 tclass=tcp_socket




--- End Message ---
--- Begin Message ---
Source: refpolicy
Source-Version: 2:0.0.20080702-13

We believe that the bug you reported is fixed in the latest version of
refpolicy, which is due to be installed in the Debian FTP archive:

refpolicy_0.0.20080702-13.diff.gz
  to pool/main/r/refpolicy/refpolicy_0.0.20080702-13.diff.gz
refpolicy_0.0.20080702-13.dsc
  to pool/main/r/refpolicy/refpolicy_0.0.20080702-13.dsc
selinux-policy-default_0.0.20080702-13_all.deb
  to pool/main/r/refpolicy/selinux-policy-default_0.0.20080702-13_all.deb
selinux-policy-dev_0.0.20080702-13_all.deb
  to pool/main/r/refpolicy/selinux-policy-dev_0.0.20080702-13_all.deb
selinux-policy-doc_0.0.20080702-13_all.deb
  to pool/main/r/refpolicy/selinux-policy-doc_0.0.20080702-13_all.deb
selinux-policy-mls_0.0.20080702-13_all.deb
  to pool/main/r/refpolicy/selinux-policy-mls_0.0.20080702-13_all.deb
selinux-policy-src_0.0.20080702-13_all.deb
  to pool/main/r/refpolicy/selinux-policy-src_0.0.20080702-13_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russell Coker <[EMAIL PROTECTED]> (supplier of updated refpolicy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 21 Oct 2008 00:36:00 +1100
Source: refpolicy
Binary: selinux-policy-default selinux-policy-mls selinux-policy-src 
selinux-policy-dev selinux-policy-doc
Architecture: source all
Version: 2:0.0.20080702-13
Distribution: unstable
Urgency: high
Maintainer: Russell Coker <[EMAIL PROTECTED]>
Changed-By: Russell Coker <[EMAIL PROTECTED]>
Description: 
 selinux-policy-default - Strict and Targeted variants of the SELinux policy
 selinux-policy-dev - Headers from the SELinux reference policy for building 
modules
 selinux-policy-doc - Documentation for the SELinux reference policy
 selinux-policy-mls - MLS (Multi Level Security) variant of the SELinux policy
 selinux-policy-src - Source of the SELinux reference policy for customization
Closes: 502274
Changes: 
 refpolicy (2:0.0.20080702-13) unstable; urgency=high
 .
   * Allow spamd_t to create a Unix domain socket.
   * Allow clamd_t to read files under /usr (for Perl).
     Allow it to connect to amavisd_send_port_t.
     Allow it to talk to itself by unix stream sockets and bind to UDP nodes.
     Closes: #502274
   * Allow logrotate_t to transition to webalizer_t for web log processing.
   * Allow initrc_t to create fixed_disk_device_t nodes under var_run_t,
     for the case where /etc/fstab has an error regarding the root fs.
   * Use the Lenny paths for xm, xend, xenstored, and xenconsoled.
     Add some extra permissions that Xen needs.
Checksums-Sha1: 
 2a0a6d7d7f910d8acf454811e913bc4ab778b082 1493 refpolicy_0.0.20080702-13.dsc
 cb15e6fadc22736f059c76798db59075e2c6d590 78744 
refpolicy_0.0.20080702-13.diff.gz
 b2c60aa202a00fe83c1c4ddac839b593a2d6dc11 2093912 
selinux-policy-default_0.0.20080702-13_all.deb
 7e5a193edbee10257f28ea2dc16d0e418f9250a1 2127154 
selinux-policy-mls_0.0.20080702-13_all.deb
 d8c3bc5c81524925ed22c054019658c4e9a37c10 799502 
selinux-policy-src_0.0.20080702-13_all.deb
 6689e4cdf7a2dd34691a929a960a2ca84c258652 703626 
selinux-policy-dev_0.0.20080702-13_all.deb
 34de1934f31aaf5d1d654a56659880682720e326 424030 
selinux-policy-doc_0.0.20080702-13_all.deb
Checksums-Sha256: 
 af95d0065efea4d1d323f90b8c9629fe388e4984741f638137ebd3a24ea4dc02 1493 
refpolicy_0.0.20080702-13.dsc
 36342b546726fe79940e7db3f0d5fd98301c14e40bad53ee681ead02be3bb76d 78744 
refpolicy_0.0.20080702-13.diff.gz
 dd39f5201e68701bd8f4115526c7089538e02ca1adb7babf65c8584545f7c7ca 2093912 
selinux-policy-default_0.0.20080702-13_all.deb
 bd81b0dd7058bb4ffef1e84b733b9da6f55eb961f4b0f5398711e98fd50ae28c 2127154 
selinux-policy-mls_0.0.20080702-13_all.deb
 60f1941e60f63a9a8e809fba0981dae0a41cc0ff78850c53334466f30fde3a44 799502 
selinux-policy-src_0.0.20080702-13_all.deb
 2286f7f75a779eb9c971a906e36c0c2e87144fb134d400cd850ba89607ffa2e8 703626 
selinux-policy-dev_0.0.20080702-13_all.deb
 59af3561c59182ba5e461c06a6848fc57c351158b9e274642dfaa44e7c2fab92 424030 
selinux-policy-doc_0.0.20080702-13_all.deb
Files: 
 009b71287cc2d45f21caab4ef4ca70d0 1493 admin standard 
refpolicy_0.0.20080702-13.dsc
 1e97797906f53f07aa16b8a69507b2aa 78744 admin standard 
refpolicy_0.0.20080702-13.diff.gz
 eace6ffddf9811492c4d865c3653dbd8 2093912 admin standard 
selinux-policy-default_0.0.20080702-13_all.deb
 a8c67daa161f9a78c9ab18b9d9eb0a0f 2127154 admin extra 
selinux-policy-mls_0.0.20080702-13_all.deb
 eb936871eaa61a8c08bf69529fe4a804 799502 admin optional 
selinux-policy-src_0.0.20080702-13_all.deb
 9415a779233660a875ccca731640548d 703626 admin optional 
selinux-policy-dev_0.0.20080702-13_all.deb
 5e6282083bf1de0f66656319813d38ed 424030 doc optional 
selinux-policy-doc_0.0.20080702-13_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFI/IrawrB5/PXHUlYRApOeAKCqjMnF3FeO87k9wuO3R0GHcZKlfACgr5OZ
qm5Ug+XlPPTYd9hv9CcQJwM=
=TGvW
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to