Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 151819 Details for
Bug 178692
httpd's suexec prevents running cgi scripts
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
output from audit.log
avc.txt (text/plain), 3.56 KB, created by
Josef Kubin
on 2007-04-05 23:43:30 UTC
(
hide
)
Description:
output from audit.log
Filename:
MIME Type:
Creator:
Josef Kubin
Created:
2007-04-05 23:43:30 UTC
Size:
3.56 KB
patch
obsolete
>type=AVC msg=audit(1175816062.848:384472): avc: denied { getattr } for pid=30595 comm="php" name="krb5.conf" dev=sdb1 ino=7669100 scontext=root:system_r: >httpd_sys_script_t tcontext=system_u:object_r:krb5_conf_t tclass=file >type=SYSCALL msg=audit(1175816062.848:384472): arch=c000003e syscall=4 success=yes exit=0 a0=872900 a1=7fbfffedf0 a2=7fbfffedf0 a3=7fbfffed01 items=1 pid=30 >595 auid=0 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 comm="php" exe="/usr/bin/php" >type=AVC_PATH msg=audit(1175816062.848:384472): path="/etc/krb5.conf" >type=CWD msg=audit(1175816062.848:384472): cwd="/var/www/vhost/test1" >type=PATH msg=audit(1175816062.848:384472): name="/etc/krb5.conf" flags=1 inode=7669100 dev=08:11 mode=0100644 ouid=0 ogid=0 rdev=00:00 >type=AVC msg=audit(1175816062.849:384473): avc: denied { read } for pid=30595 comm="php" name="krb5.conf" dev=sdb1 ino=7669100 scontext=root:system_r:htt >pd_sys_script_t tcontext=system_u:object_r:krb5_conf_t tclass=file >type=SYSCALL msg=audit(1175816062.849:384473): arch=c000003e syscall=2 success=yes exit=13 a0=872900 a1=0 a2=1b6 a3=4 items=1 pid=30595 auid=0 uid=48 gid=48 > euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 comm="php" exe="/usr/bin/php" >type=CWD msg=audit(1175816062.849:384473): cwd="/var/www/vhost/test1" >type=PATH msg=audit(1175816062.849:384473): name="/etc/krb5.conf" flags=101 inode=7669100 dev=08:11 mode=0100644 ouid=0 ogid=0 rdev=00:00 >type=AVC msg=audit(1175816062.862:384474): avc: denied { getattr } for pid=30595 comm="php" name=".index" dev=sdb1 ino=690338 scontext=root:system_r:http >d_sys_script_t tcontext=system_u:object_r:snmpd_var_lib_t tclass=file >type=SYSCALL msg=audit(1175816062.862:384474): arch=c000003e syscall=4 success=yes exit=0 a0=7fbffff3a0 a1=7fbffff0d0 a2=7fbffff0d0 a3=0 items=1 pid=30595 a >uid=0 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 comm="php" exe="/usr/bin/php" >type=AVC_PATH msg=audit(1175816062.862:384474): path="/usr/share/snmp/mibs/.index" >type=CWD msg=audit(1175816062.862:384474): cwd="/var/www/vhost/test1" >type=PATH msg=audit(1175816062.862:384474): name="/usr/share/snmp/mibs/.index" flags=1 inode=690338 dev=08:11 mode=0100644 ouid=0 ogid=0 rdev=00:00 >type=AVC msg=audit(1175816062.862:384475): avc: denied { read } for pid=30595 comm="php" name=".index" dev=sdb1 ino=690338 scontext=root:system_r:httpd_s >ys_script_t tcontext=system_u:object_r:snmpd_var_lib_t tclass=file >type=SYSCALL msg=audit(1175816062.862:384475): arch=c000003e syscall=2 success=yes exit=13 a0=7fbffff3a0 a1=0 a2=1b6 a3=4 items=1 pid=30595 auid=0 uid=48 gi >d=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 comm="php" exe="/usr/bin/php" >type=CWD msg=audit(1175816062.862:384475): cwd="/var/www/vhost/test1" >type=PATH msg=audit(1175816062.862:384475): name="/usr/share/snmp/mibs/.index" flags=101 inode=690338 dev=08:11 mode=0100644 ouid=0 ogid=0 rdev=00:00 >type=AVC msg=audit(1175816062.893:384476): avc: denied { getattr } for pid=30595 comm="php" name="var" dev=sdb1 ino=6111233 scontext=root:system_r:httpd_ >sys_script_t tcontext=system_u:object_r:var_t tclass=dir >type=SYSCALL msg=audit(1175816062.893:384476): arch=c000003e syscall=6 success=yes exit=0 a0=7fbfffd4a0 a1=7fbfffd3b0 a2=7fbfffd3b0 a3=916115 items=1 pid=30 >595 auid=0 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 comm="php" exe="/usr/bin/php" >type=AVC_PATH msg=audit(1175816062.893:384476): path="/var" >type=CWD msg=audit(1175816062.893:384476): cwd="/var/www/vhost/test1" >type=PATH msg=audit(1175816062.893:384476): name="/var" flags=0 inode=6111233 dev=08:11 mode=040755 ouid=0 ogid=0 rdev=00:00
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 178692
: 151819