Bug 1545844
Summary: | [SELinux] Firefox tabs crashing over X11 forwarding | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Joe Wright <jwright> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED NOTABUG | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 7.4 | CC: | cww, lvrabec, matthew.burt, mmalik, plautrba, ssekidde, tpelka, vmojzis, zpytela |
Target Milestone: | rc | Keywords: | SELinux |
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-30 12:19:25 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Joe Wright
2018-02-15 17:02:07 UTC
Hi Jo, I just came across something very similar here, and found this bugzilla while looking for a solution. In our case we found that SELinux was involved. The following command worked for us:- sudo setsebool mozilla_plugin_can_network_connect=1 Might be worth checking the audit log to see if something similar has happened to you. Hope this helps, -- Matt Setting the boolean as provided worked. -JW Glad it worked for you Jo. For the record, I still think this is a bug with the firefox policy. The Boolean is a bit of a blunt instrument, and is allowing more to happen than just Firefox to connect to the X server over TCP. A better solution might be to use a type enforcement rule to just allow firefox to connect to X server ports. Something like this may work:- require { type mozilla_plugin_t; type xserver_port_t; class tcp_socket { name_connect }; } allow mozilla_plugin_t xserver_port_t:tcp_socket name_connect; As already mentioned before, there is the mozilla_plugin_can_network_connect boolean to allow tcp name_connect: # semanage boolean -l|grep mozilla_plugin_can_network_connect mozilla_plugin_can_network_connect (off , off) Allow mozilla plugin domain to connect to the network using TCP. There is only one generic allow rule granted with the boolean set on: # sesearch -A -b mozilla_plugin_can_network_connect Found 1 semantic av rules: allow mozilla_plugin_t port_type : tcp_socket name_connect ; Creating a custom SELinux policy module is recommended in environments where more strict rule is required. Having said that, this BZ is being closed NOTABUG. Please also note the next Red Hat Enterprise Linux 7 minor release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. If you believe that it still is a bug in SELinux policy, we recommend moving the request to Red Hat Enterprise Linux 8. |