Mislabeled files

Daniel J Walsh dwalsh at redhat.com
Thu Jul 3 18:43:47 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frank Murphy wrote:
> I have no idea which dir to relabel?
> and wouldl this dir relabel hold, after a full relabel?
> 
> #locate comes up empty even after #updatedb
> 
> $ rpm -qa | grep selinux
> selinux-policy-3.3.1-69.fc9.noarch
> libselinux-2.0.64-2.fc9.i386
> libselinux-python-2.0.64-2.fc9.i386
> selinux-policy-targeted-3.3.1-69.fc9.noarch
> 
> 
> -----------------------------------------------------------------------
> 
> Summary:
> 
> SELinux is preventing the sendmail from using potentially mislabeled
> files
> (2F746D702F52734B6B436E774F202864656C6574656429).
> 
> Detailed Description:
> 
> SELinux has denied sendmail access to potentially mislabeled file(s)
> (2F746D702F52734B6B436E774F202864656C6574656429). This means that
> SELinux will
> not allow sendmail to use these files. It is common for users to edit
> files in
> their home directory or tmp directories and then move (mv) them to
> system
> directories. The problem is that the files end up with the wrong file
> context
> which confined applications are not allowed to access.
> 
> Allowing Access:
> 
> If you want sendmail to access this files, you need to relabel them
> using
> restorecon -v '2F746D702F52734B6B436E774F202864656C6574656429'. You
> might want
> to relabel the entire directory using restorecon -R -v ''.
> 
> Additional Information:
> 
> Source Context                system_u:system_r:exim_t:s0
> Target Context                system_u:object_r:system_mail_tmp_t:s0
> Target Objects
> 2F746D702F52734B6B436E774F202864656C6574656429 [
>                               file ]
> Source                        sendmail
> Source Path                   /usr/sbin/exim
> Port                          <Unknown>
> Host                          frank-01
> Source RPM Packages           exim-4.69-4.fc9
> Target RPM Packages           
> Policy RPM                    selinux-policy-3.3.1-69.fc9
> Selinux Enabled               True
> Policy Type                   targeted
> MLS Enabled                   True
> Enforcing Mode                Enforcing
> Plugin Name                   home_tmp_bad_labels
> Host Name                     frank-01
> Platform                      Linux frank-01 2.6.25.6-55.fc9.i686 #1 SMP
> Tue Jun
>                               10 16:27:49 EDT 2008 i686 i686
> Alert Count                   1
> First Seen                    Tue 01 Jul 2008 15:22:49 IST
> Last Seen                     Tue 01 Jul 2008 15:22:49 IST
> Local ID                      baefd44f-8e96-4353-8db7-badf98ef6335
> Line Numbers                  
> 
> Raw Audit Messages            
> 
> host=frank-01 type=AVC msg=audit(1214922169.332:32): avc:  denied
> { read } for  pid=11248 comm="sendmail"
> path=2F746D702F52734B6B436E774F202864656C6574656429 dev=dm-0 ino=34537
> scontext=system_u:system_r:exim_t:s0
> tcontext=system_u:object_r:system_mail_tmp_t:s0 tclass=file
> 
> host=frank-01 type=SYSCALL msg=audit(1214922169.332:32): arch=40000003
> syscall=11 success=yes exit=0 a0=8058e0b a1=9eb060c a2=bf93c6e8
> a3=9eb060c items=0 ppid=11247 pid=11248 auid=4294967295 uid=0 gid=0
> euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
> comm="sendmail" exe="/usr/sbin/exim" subj=system_u:system_r:exim_t:s0
> key=(null)
> 
> 
> 
This is actually a bug in policy, and setroubleshoot should have told
you to use audit2allow to allow it.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkhtHeMACgkQrlYvE4MpobMgFQCfdGq2S5vm9RpX+qJlwJTAVXnQ
k6wAoK0Grmrl8OsrCKUu/AQKt6KwkgPr
=ndY1
-----END PGP SIGNATURE-----




More information about the fedora-selinux-list mailing list