| Summary: | SELinux is preventing /usr/sbin/sendmail.postfix access to a leaked fifo_file file descriptor. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | hkoba <buribullet> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 13 | CC: | dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:fd3140350798a8178e8991e34cb2a9b99fe3a06d6eb2477174048936e62ddbbc | ||
| Fixed In Version: | selinux-policy-3.7.19-89.fc13 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-03-17 18:49:07 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Attachments: | |||
|
Description
hkoba
2011-01-24 02:12:12 UTC
Created attachment 474882 [details]
SELinux is preventing /usr/sbin/sendmail.postfix "getattr" access on fifo_file.
Additionally, this alert followed.
Do you have postfix_local executing sendmail? (In reply to comment #2) > Do you have postfix_local executing sendmail? Sorry, I'm not sure. How can I check that? I will attach output of: ls -Zd $(rpm -ql postfix|grep '/var\|/usr'|grep -v /doc/) > postfix-labels.lst Created attachment 475118 [details]
output of ls -Z ...postfix related files...
Do you have something like "sendmail_enable" in your postfix conf files? # grep -rv "^#" /etc/postfix/ | grep sendmail (In reply to comment #5) > Do you have something like "sendmail_enable" in your postfix conf files? > > # grep -rv "^#" /etc/postfix/ | grep sendmail Yes, like this: # grep -rv "^#" /etc/postfix/ | grep sendmail /etc/postfix/main.cf:sendmail_path = /usr/sbin/sendmail.postfix # Ok. Does everything work in enforcing mode? (In reply to comment #7) > Ok. Does everything work in enforcing mode? I will try enforcing mode tonight. Please wait 24h+ ;-) BTW, I just remembered that I use procmail from postfix: mailbox_command = /usr/bin/procmail -a "$EXTENSION" and my ~/.procmailrc calls sendmail: | sendmail -f MYADDR Is this likely the cause of this problem? Is this illegal for SELinux? Anyway, my ~/.procmailrc has this label: unconfined_u:object_r:procmail_home_t:s0 Ok. Dan, I am thinking about transition from postfix_local_t to sendmail_t. Sounds fine with me. They are both mailers... Fixed in selinux-policy-3.7.19-87.fc13 (In reply to comment #11) > Fixed in selinux-policy-3.7.19-87.fc13 Thank you for your quick response! And, what should I do next? Should I upload the log under enforce mode? Or just waiting koji and test above rpm is enough? You can allow it for now using # grep sendmail /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Testing the RPM would be great also. Yes, the RPM is now available from koji http://koji.fedoraproject.org/koji/buildinfo?buildID=216524 So you can execute # semodule -r mypol and install the packages. (In reply to comment #15) > Yes, the RPM is now available from koji > > http://koji.fedoraproject.org/koji/buildinfo?buildID=216524 > Thank you! I've successfully installed selinux-policy{,-targeted} from above. Please wait 24h+ for my result report. (In reply to comment #15) > Yes, the RPM is now available from koji > > http://koji.fedoraproject.org/koji/buildinfo?buildID=216524 > Unfortunately, sealert still raised. I will attach audit_listener_database.xml. Note: I didn't create local policy, just installed: selinux-policy-3.7.19-88.fc13.noarch.rpm selinux-policy-targeted-3.7.19-88.fc13.noarch.rpm Am I missing? Should I restorecon somewhere? Created attachment 476924 [details]
audit_listener_database (with privacy cleanup)
Oops, my bad. Thanks for testing. Fixed in selinux-policy-3.7.19-89.fc13. selinux-policy-3.7.19-89.fc13 has been submitted as an update for Fedora 13. https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13 selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13 (In reply to comment #21) > selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 testing > repository. Thank you! It worked fine for me in Enforcing mode;-) Could you update the karma https://admin.fedoraproject.org/updates/selinux-policy-3.7.19-89.fc13 Thank you. selinux-policy-3.7.19-89.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report. |