Bug 481387
Summary: | selinux prevents "getattr" and "execute" | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Philip Goisman <goisman> |
Component: | selinux-policy | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE <qe-baseos-auto> |
Severity: | urgent | Docs Contact: | |
Priority: | low | ||
Version: | 5.4 | CC: | mmalik, ohudlick |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-09-02 07:59:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Philip Goisman
2009-01-23 22:37:11 UTC
I modified my policy as follows: module procmailauth 1.0; require { type procmail_t; type var_log_t; type spamassassin_exec_t; type spamd_var_lib_t; class dir search; class dir execute; class dir getattr; class dir read; class dir ioctl; class file read; class file ioctl; class file execute; class file execute_no_trans; class file write; class file getattr; class file append; } #============= dovecot_auth_t ============== allow procmail_t spamassassin_exec_t:file { read ioctl write getattr execute execute_no_tran s append }; allow procmail_t spamassassin_exec_t:dir { getattr execute }; allow procmail_t spamd_var_lib_t:file { getattr read ioctl}; allow procmail_t spamd_var_lib_t:dir { getattr read search ioctl }; This appears to be holding - procmail logs don't complain, procmail results are achieved, and no sealerts in messages. I'll let you know if this breaks. Thanks Fixed in selinux-policy-2.4.6-207.el5 Preview of U4 policy currently available at http://people.redhat.com/dwalsh/SELinux/RHEL5 Fixed in selinux-policy-2.4.6-225.el5 An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2009-1242.html |