Bug 1601391
| Summary: | SELinux is preventing bounce from map access on the file /usr/libexec/postfix/bounce | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Lukas Slebodnik <lslebodn> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED DUPLICATE | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.6 | CC: | lvrabec, mgrepl, mmalik, plautrba, ssekidde |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2018-07-17 21:35:51 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
time->Mon Jul 16 05:39:38 2018
type=PROCTITLE msg=audit(1531733978.003:736): proctitle="(null)"
type=PATH msg=audit(1531733978.003:736): item=1 name="/lib64/ld-linux-x86-64.so.2" inode=67230574 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:ld_so_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
type=PATH msg=audit(1531733978.003:736): item=0 name="/usr/libexec/postfix/bounce" inode=67825789 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:postfix_bounce_exec_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
type=CWD msg=audit(1531733978.003:736): cwd="/var/spool/postfix"
type=SYSCALL msg=audit(1531733978.003:736): arch=c000003e syscall=59 success=no exit=-13 a0=55c2d5ec53c0 a1=55c2d5ec56e0 a2=55c2d5ec0100 a3=ffffffff items=2 ppid=2150 pid=69170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bounce" exe="/usr/libexec/postfix/bounce" subj=system_u:system_r:postfix_master_t:s0 key=(null)
type=AVC msg=audit(1531733978.003:736): avc: denied { map } for pid=69170 comm="bounce" path="/usr/libexec/postfix/bounce" dev="dm-0" ino=67825789 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_bounce_exec_t:s0 tclass=file permissive=0
(In reply to Lukas Slebodnik from comment #2) > time->Mon Jul 16 05:39:38 2018 > type=PROCTITLE msg=audit(1531733978.003:736): proctitle="(null)" > type=PATH msg=audit(1531733978.003:736): item=1 > name="/lib64/ld-linux-x86-64.so.2" inode=67230574 dev=fd:00 mode=0100755 > ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:ld_so_t:s0 objtype=NORMAL > cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 > type=PATH msg=audit(1531733978.003:736): item=0 > name="/usr/libexec/postfix/bounce" inode=67825789 dev=fd:00 mode=0100755 > ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:postfix_bounce_exec_t:s0 > objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 > cap_fver=0 > type=CWD msg=audit(1531733978.003:736): cwd="/var/spool/postfix" > type=SYSCALL msg=audit(1531733978.003:736): arch=c000003e syscall=59 ^^^^^^^^^^ As you can see, it's yet another AVC for syscall execve. > success=no exit=-13 a0=55c2d5ec53c0 a1=55c2d5ec56e0 a2=55c2d5ec0100 > a3=ffffffff items=2 ppid=2150 pid=69170 auid=4294967295 uid=0 gid=0 euid=0 > suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bounce" > exe="/usr/libexec/postfix/bounce" subj=system_u:system_r:postfix_master_t:s0 > key=(null) > type=AVC msg=audit(1531733978.003:736): avc: denied { map } for pid=69170 > comm="bounce" path="/usr/libexec/postfix/bounce" dev="dm-0" ino=67825789 > scontext=system_u:system_r:postfix_master_t:s0 > tcontext=system_u:object_r:postfix_bounce_exec_t:s0 tclass=file permissive=0 The SELinux denial is already mentioned in BZ#1598388. *** This bug has been marked as a duplicate of bug 1598388 *** |
SELinux is preventing bounce from map access on the file /usr/libexec/postfix/bounce. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that bounce should be allowed map access on the bounce file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'bounce' --raw | audit2allow -M my-bounce # semodule -i my-bounce.pp Additional Information: Source Context system_u:system_r:postfix_master_t:s0 Target Context system_u:object_r:postfix_bounce_exec_t:s0 Target Objects /usr/libexec/postfix/bounce [ file ] Source bounce Source Path bounce Port <Unknown> Host host.example.com Source RPM Packages Target RPM Packages postfix-2.10.1-7.el7.x86_64 Policy RPM selinux-policy-3.13.1-207.el7.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name host.example.com Platform Linux host.example.com 3.10.0-920.el7.x86_64 #1 SMP Thu Jul 12 12:34:02 EDT 2018 x86_64 x86_64 Alert Count 1 First Seen 2018-07-16 05:38:37 EDT Last Seen 2018-07-16 05:38:37 EDT Local ID e4cc149e-51fc-4c0f-aabb-d691e6f7ca38 Raw Audit Messages type=AVC msg=audit(1531733917.947:734): avc: denied { map } for pid=69146 comm="bounce" path="/usr/libexec/postfix/bounce" dev="dm-0" ino=67825789 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:object_r:postfix_bounce_exec_t:s0 tclass=file permissive=0 Hash: bounce,postfix_master_t,postfix_bounce_exec_t,file,map