Fedora 9 SELinux is preventing sendmail (exim_t) "getattr" to pipe (system_crond_t)
Daniel J Walsh
dwalsh at redhat.com
Mon Jun 30 12:36:30 UTC 2008
Frank Murphy wrote:
> I think this has to do with exim trying to send logs?
> Should I actually bug-report?
> or just use the
> audit2allow -M local < /tmp/avcs
>
> Frank
>
> Summary:
>
> SELinux is preventing sendmail (exim_t) "getattr" to pipe
> (system_crond_t).
>
> Detailed Description:
>
> SELinux denied access requested by sendmail. It is not expected that
> this access
> is required by sendmail and this access may signal an intrusion attempt.
> It is
> also possible that the specific version or configuration of the
> application is
> causing it to require additional access.
>
> Allowing Access:
>
> You can generate a local policy module to allow this access - see FAQ
> (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can
> disable
> SELinux protection altogether. Disabling SELinux protection is not
> recommended.
> Please file a bug report
> (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
> against this package.
>
> Additional Information:
>
> Source Context system_u:system_r:exim_t:s0
> Target Context system_u:system_r:system_crond_t:s0
> Target Objects pipe [ fifo_file ]
> Source sendmail
> Source Path /usr/sbin/exim
> Port <Unknown>
> Host frank-01
> Source RPM Packages exim-4.69-4.fc9
> Target RPM Packages
> Policy RPM selinux-policy-3.3.1-69.fc9
> Selinux Enabled True
> Policy Type targeted
> MLS Enabled True
> Enforcing Mode Enforcing
> Plugin Name catchall
> Host Name frank-01
> Platform Linux frank-01 2.6.25.6-55.fc9.i686 #1 SMP
> Tue Jun
> 10 16:27:49 EDT 2008 i686 i686
> Alert Count 3
> First Seen Sat 28 Jun 2008 11:01:27 IST
> Last Seen Sat 28 Jun 2008 11:01:27 IST
> Local ID 675df78e-7627-418a-8d0b-2f9943cd7033
> Line Numbers
>
> Raw Audit Messages
>
> host=frank-01 type=AVC msg=audit(1214647287.324:61): avc: denied
> { getattr } for pid=16267 comm="sendmail" path="pipe:[94447]"
> dev=pipefs ino=94447 scontext=system_u:system_r:exim_t:s0
> tcontext=system_u:system_r:system_crond_t:s0 tclass=fifo_file
>
> host=frank-01 type=SYSCALL msg=audit(1214647287.324:61): arch=40000003
> syscall=197 success=no exit=-13 a0=1 a1=bf812f64 a2=981ff4 a3=b805d84c
> items=0 ppid=1 pid=16267 auid=4294967295 uid=93 gid=93 euid=93 suid=93
> fsuid=93 egid=93 sgid=93 fsgid=93 tty=(none) ses=4294967295
> comm="sendmail" exe="/usr/sbin/exim" subj=system_u:system_r:exim_t:s0
> key=(null)
>
>
>
> --
> fedora-selinux-list mailing list
> fedora-selinux-list at redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
I will update policy to allow this. Although this probably does not
stop anything from functioning properly.
More information about the fedora-selinux-list
mailing list