Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 296824 Details for
Bug 436032
SEtroubleshoot browser hangs 'mark delete' or 'remove marked deleted'
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
audit_listener_database.xml (3Mb)
audit_listener_database.xml (text/plain), 3.01 MB, created by
Andrew Farris
on 2008-03-04 22:42:10 UTC
(
hide
)
Description:
audit_listener_database.xml (3Mb)
Filename:
MIME Type:
Creator:
Andrew Farris
Created:
2008-03-04 22:42:10 UTC
Size:
3.01 MB
patch
obsolete
><?xml version="1.0" encoding="utf-8"?> ><sigs version="3.0"> > <signature_list> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="635" seconds="1203251500" serial="21"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { search } for pid=3750 comm="gnome-system-mo" name="misc" dev=sdb3 ino=346400 scontext=system_u:system_r:system_dbusd_t:s0 tcontext=system_u:object_r:system_crond_var_lib_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="635" seconds="1203251500" serial="21"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=292 success=no exit=-13 a0=6 a1=6c05400 a2=106 a3=864b7b8 items=0 ppid=1 pid=3750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gnome-system-mo" exe="/usr/libexec/gnome-system-monitor-mechanism" subj=system_u:system_r:system_dbusd_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="635" seconds="1203251500" serial="21"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.24.1-28.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.7-6.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>21</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.24.1-28.fc9 #1 SMP Sun Feb 10 17:27:37 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-17T12:31:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-17T12:31:40Z</last_seen_date> > <local_id>5eed9a1e-181e-4362-bd53-87f40fa65142</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="system_dbusd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>search</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="system_dbusd_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="system_crond_var_lib_t" user="system_u"/> > <tpath>./misc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for ./misc, > <p> > restorecon -v './misc' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by gnome-system-mo. It is not > expected that this access is required by gnome-system-mo and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing gnome-system-mo (system_dbusd_t) "search" to ./misc (system_crond_var_lib_t). > ]]></summary> > </solution> > <source>gnome-system-mo</source> > <spath>/usr/libexec/gnome-system-monitor-mechanism</spath> > <src_rpm_list> > <rpm>gnome-system-monitor-2.21.5-1.fc9</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="system_crond_var_lib_t" user="system_u"/> > <tpath>./misc</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="684" seconds="1203423872" serial="38"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=4471 comm="df" name="/" dev=sdc3 ino=1 scontext=system_u:system_r:logwatch_t:s0-s0:c0.c1023 tcontext=system_u:object_r:public_content_rw_t:s0 tclass=filesystem</body_text> > <event_id host="cirithungol" milli="684" seconds="1203423872" serial="38"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=268 success=no exit=-13 a0=8b6d5d8 a1=54 a2=bfdfad98 a3=0 items=0 ppid=4469 pid=4471 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="df" exe="/bin/df" subj=system_u:system_r:logwatch_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="684" seconds="1203423872" serial="38"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.40.rc1.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.7-6.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.40.rc1.git2.fc9 #1 SMP Wed Feb 13 17:55:35 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-14T12:24:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-19T12:24:32Z</last_seen_date> > <local_id>9dfb98dc-bf07-43a8-9d56-1a8add1ef40a</local_id> > <report_count>10</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="logwatch_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="logwatch_t" user="system_u"/> > <tclass>filesystem</tclass> > <tcontext mls="s0" role="object_r" type="public_content_rw_t" user="system_u"/> > <tpath>/</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by df. It is not > expected that this access is required by df and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing df (logwatch_t) "getattr" to / (public_content_rw_t). > ]]></summary> > </solution> > <source>df</source> > <spath>/bin/df</spath> > <src_rpm_list> > <rpm>coreutils-6.10-7.fc9</rpm> > </src_rpm_list> > <tclass>filesystem</tclass> > <tcontext mls="s0" role="object_r" type="public_content_rw_t" user="system_u"/> > <tgt_rpm_list> > <rpm>filesystem-2.4.11-1.fc8</rpm> > </tgt_rpm_list> > <tpath>/</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>10</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="449" seconds="1203463294" serial="120"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { name_connect } for pid=2584 comm="kerneloops" dest=80 scontext=system_u:system_r:kerneloops_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket</body_text> > <event_id host="cirithungol" milli="449" seconds="1203463294" serial="120"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=3 a1=bfcf0400 a2=745a6a4 a3=0 items=0 ppid=1 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kerneloops" exe="/usr/sbin/kerneloops" subj=system_u:system_r:kerneloops_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="449" seconds="1203463294" serial="120"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.40.rc1.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.7-6.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.40.rc1.git2.fc9 #1 SMP Wed Feb 13 17:55:35 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-19T21:47:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-19T23:21:34Z</last_seen_date> > <local_id>7277e2aa-8c1c-4520-88d4-cfdc8de3a12c</local_id> > <port>80</port> > <report_count>2</report_count> > <scontext mls="s0" role="system_r" type="kerneloops_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>name_connect</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="kerneloops_t" user="system_u"/> > <tclass>tcp_socket</tclass> > <tcontext mls="s0" role="object_r" type="http_port_t" user="system_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by kerneloops. It is not > expected that this access is required by kerneloops and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing kerneloops (kerneloops_t) "name_connect" to <Unknown> (http_port_t). > ]]></summary> > </solution> > <source>kerneloops</source> > <spath>/usr/sbin/kerneloops</spath> > <src_rpm_list> > <rpm>kerneloops-0.10-2.fc9</rpm> > </src_rpm_list> > <tclass>tcp_socket</tclass> > <tcontext mls="s0" role="object_r" type="http_port_t" user="system_u"/> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>2</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="39" seconds="1203588876" serial="36"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { link } for pid=2859 comm="login" scontext=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=key</body_text> > <event_id host="cirithungol" milli="39" seconds="1203588876" serial="36"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=288 success=no exit=-13 a0=8 a1=fffffffc a2=fffffffd a3=1f4 items=0 ppid=1 pid=2859 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty2 ses=3 comm="login" exe="/bin/login" subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="39" seconds="1203588876" serial="36"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.54.rc2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.8-2.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.54.rc2.fc9 #1 SMP Wed Feb 20 10:02:04 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-21T10:14:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-21T10:14:36Z</last_seen_date> > <local_id>098d94a6-91ed-482d-b8fa-46e473c48410</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="local_login_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>link</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="local_login_t" user="system_u"/> > <tclass>key</tclass> > <tcontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by login. It is not > expected that this access is required by login and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing login (local_login_t) "link" to <Unknown> (xdm_t). > ]]></summary> > </solution> > <source>login</source> > <spath>/bin/login</spath> > <src_rpm_list> > <rpm>util-linux-ng-2.13.1-3.fc9</rpm> > </src_rpm_list> > <tclass>key</tclass> > <tcontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="615" seconds="1203669724" serial="985"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getcap } for pid=25755 comm="ntpd" scontext=unconfined_u:system_r:ntpd_t:s0 tcontext=unconfined_u:system_r:ntpd_t:s0 tclass=process</body_text> > <event_id host="cirithungol" milli="615" seconds="1203669724" serial="985"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=184 success=no exit=-13 a0=b81abdac a1=0 a2=2ad0f0 a3=b81abda8 items=0 ppid=1 pid=25755 auid=500 uid=38 gid=38 euid=38 suid=38 fsuid=38 egid=38 sgid=38 fsgid=38 tty=(none) ses=9 comm="ntpd" exe="/usr/sbin/ntpd" subj=unconfined_u:system_r:ntpd_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="615" seconds="1203669724" serial="985"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.54.rc2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.9-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.54.rc2.fc9 #1 SMP Wed Feb 20 10:02:04 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-22T08:42:04Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-22T08:42:04Z</last_seen_date> > <local_id>328c068b-54d0-4f6a-be5e-4e19d9966180</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="ntpd_t" user="unconfined_u"/> > <sig version="3.0"> > <access> > <operation>getcap</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="ntpd_t" user="unconfined_u"/> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="ntpd_t" user="unconfined_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by ntpd. It is not > expected that this access is required by ntpd and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing ntpd (ntpd_t) "getcap" to <Unknown> (ntpd_t). > ]]></summary> > </solution> > <source>ntpd</source> > <spath>/usr/sbin/ntpd</spath> > <src_rpm_list> > <rpm>ntp-4.2.4p4-3.fc9</rpm> > </src_rpm_list> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="ntpd_t" user="unconfined_u"/> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="733" seconds="1203905612" serial="13"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getcap } for pid=2478 comm="ntpd" scontext=system_u:system_r:ntpd_t:s0 tcontext=system_u:system_r:ntpd_t:s0 tclass=process</body_text> > <event_id host="cirithungol" milli="733" seconds="1203905612" serial="13"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=184 success=no exit=-13 a0=b8d17edc a1=0 a2=2ad0f0 a3=b8d17ed8 items=0 ppid=1 pid=2478 auid=4294967295 uid=38 gid=38 euid=38 suid=38 fsuid=38 egid=38 sgid=38 fsgid=38 tty=(none) ses=4294967295 comm="ntpd" exe="/usr/sbin/ntpd" subj=system_u:system_r:ntpd_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="733" seconds="1203905612" serial="13"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.54.rc2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.9-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.54.rc2.fc9 #1 SMP Wed Feb 20 10:02:04 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-25T02:13:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-25T02:13:32Z</last_seen_date> > <local_id>ceb28cc8-a94f-4619-954b-bca9bbeaaaf7</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="ntpd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getcap</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="ntpd_t" user="system_u"/> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="ntpd_t" user="system_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by ntpd. It is not > expected that this access is required by ntpd and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing ntpd (ntpd_t) "getcap" to <Unknown> (ntpd_t). > ]]></summary> > </solution> > <source>ntpd</source> > <spath>/usr/sbin/ntpd</spath> > <src_rpm_list> > <rpm>ntp-4.2.4p4-3.fc9</rpm> > </src_rpm_list> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="ntpd_t" user="system_u"/> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>allow_execmod</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="233" seconds="1203933353" serial="46"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { execmod } for pid=10671 comm="ld-linux.so.2" path="/usr/lib/libOSMesa32.so.6" dev=sdb6 ino=816740 scontext=system_u:system_r:prelink_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="233" seconds="1203933353" serial="46"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=125 success=no exit=-13 a0=111000 a1=222000 a2=5 a3=bff597b0 items=0 ppid=5293 pid=10671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ld-linux.so.2" exe="/lib/ld-2.7.90.so" subj=system_u:system_r:prelink_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="233" seconds="1203933353" serial="46"/> > </audit_record> > </records> > </audit_event> > <category>Memory</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.2.9-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-25T09:55:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-25T09:55:53Z</last_seen_date> > <local_id>bb54a4df-c917-4069-adb8-a804d17abac9</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="prelink_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>execmod</operation> > </access> > <analysis_id>allow_execmod</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="prelink_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="lib_t" user="system_u"/> > <tpath>/usr/lib/libOSMesa32.so.6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd>chcon -t textrel_shlib_t '/usr/lib/libOSMesa32.so.6'</fix_cmd> > <fix_description><![CDATA[ > If you trust /usr/lib/libOSMesa32.so.6 to run correctly, you can change the > file context to textrel_shlib_t. "chcon -t textrel_shlib_t > '/usr/lib/libOSMesa32.so.6'" > You must also change the default file context files on the system in order to preserve them even on a full relabel. "semanage fcontext -a -t textrel_shlib_t '/usr/lib/libOSMesa32.so.6'" > > ]]></fix_description> > <problem_description><![CDATA[ > The ld-linux.so.2 application attempted to load /usr/lib/libOSMesa32.so.6 which > requires text relocation. This is a potential security problem. > Most libraries do not need this permission. Libraries are > sometimes coded incorrectly and request this permission. The > <a href="http://people.redhat.com/drepper/selinux-mem.html">SELinux Memory Protection Tests</a> > web page explains how to remove this requirement. You can configure > SELinux temporarily to allow /usr/lib/libOSMesa32.so.6 to use relocation as a > workaround, until the library is fixed. Please file a > <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing ld-linux.so.2 from loading /usr/lib/libOSMesa32.so.6 which requires text relocation. > ]]></summary> > </solution> > <source>ld-linux.so.2</source> > <spath>/lib/ld-2.7.90.so</spath> > <src_rpm_list> > <rpm>glibc-2.7.90-7</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="lib_t" user="system_u"/> > <tgt_rpm_list> > <rpm>mesa-libOSMesa-7.1-0.10.fc9</rpm> > </tgt_rpm_list> > <tpath>/usr/lib/libOSMesa32.so.6</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="443" seconds="1203935347" serial="58"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getcap } for pid=12986 comm="avahi-daemon" scontext=unconfined_u:system_r:avahi_t:s0 tcontext=unconfined_u:system_r:avahi_t:s0 tclass=process</body_text> > <event_id host="cirithungol" milli="443" seconds="1203935347" serial="58"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=184 success=no exit=-13 a0=8a290bc a1=0 a2=be20f0 a3=8a290b8 items=0 ppid=1 pid=12986 auid=500 uid=498 gid=495 euid=498 suid=498 fsuid=498 egid=495 sgid=495 fsgid=495 tty=(none) ses=1 comm="avahi-daemon" exe="/usr/sbin/avahi-daemon" subj=unconfined_u:system_r:avahi_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="443" seconds="1203935347" serial="58"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-25T10:29:07Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-25T10:29:07Z</last_seen_date> > <local_id>4eceb1b6-527f-4f34-9665-6b7dfa06a7b4</local_id> > <report_count>4</report_count> > <scontext mls="s0" role="system_r" type="avahi_t" user="unconfined_u"/> > <sig version="3.0"> > <access> > <operation>getcap</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="avahi_t" user="unconfined_u"/> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="avahi_t" user="unconfined_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by avahi-daemon. It is not > expected that this access is required by avahi-daemon and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing avahi-daemon (avahi_t) "getcap" to <Unknown> (avahi_t). > ]]></summary> > </solution> > <source>avahi-daemon</source> > <spath>/usr/sbin/avahi-daemon</spath> > <src_rpm_list> > <rpm>avahi-0.6.22-7.fc9</rpm> > </src_rpm_list> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="avahi_t" user="unconfined_u"/> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>4</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="732" seconds="1204006015" serial="12"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getcap } for pid=2612 comm="avahi-daemon" scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=process</body_text> > <event_id host="cirithungol" milli="732" seconds="1204006015" serial="12"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=184 success=no exit=-13 a0=8d55584 a1=0 a2=be20f0 a3=8d55580 items=0 ppid=1 pid=2612 auid=4294967295 uid=498 gid=495 euid=498 suid=498 fsuid=498 egid=495 sgid=495 fsgid=495 tty=(none) ses=4294967295 comm="avahi-daemon" exe="/usr/sbin/avahi-daemon" subj=system_u:system_r:avahi_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="732" seconds="1204006015" serial="12"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T05:48:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T06:06:55Z</last_seen_date> > <local_id>5890b469-420a-4a09-8cb8-7dbf57e74ed6</local_id> > <report_count>8</report_count> > <scontext mls="s0" role="system_r" type="avahi_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getcap</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="avahi_t" user="system_u"/> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="avahi_t" user="system_u"/> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by avahi-daemon. It is not > expected that this access is required by avahi-daemon and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing avahi-daemon (avahi_t) "getcap" to <Unknown> (avahi_t). > ]]></summary> > </solution> > <source>avahi-daemon</source> > <spath>/usr/sbin/avahi-daemon</spath> > <src_rpm_list> > <rpm>avahi-0.6.22-7.fc9</rpm> > </src_rpm_list> > <tclass>process</tclass> > <tcontext mls="s0" role="system_r" type="avahi_t" user="system_u"/> > </siginfo> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="603" seconds="1204009930" serial="101"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { entrypoint } for pid=12790 comm="gdm-session-wor" path="/usr/bin/gnome-keyring-daemon" dev=sdb6 ino=65615 scontext=user_u:system_r:bootloader_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="603" seconds="1204009930" serial="101"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=11 success=no exit=-13 a0=13aff0 a1=bf8b3bac a2=94b9140 a3=13b02a items=0 ppid=12574 pid=12790 auid=500 uid=500 gid=500 euid=500 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=7 comm="gdm-session-wor" exe="/usr/libexec/gdm-session-worker" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="603" seconds="1204009930" serial="101"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T06:27:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T07:12:10Z</last_seen_date> > <local_id>13e8c035-1b16-4c81-8b10-f814bf6ed5d4</local_id> > <report_count>3</report_count> > <scontext mls="s0" role="system_r" type="bootloader_t" user="user_u"/> > <sig version="3.0"> > <access> > <operation>entrypoint</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="bootloader_t" user="user_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="bin_t" user="system_u"/> > <tpath>/usr/bin/gnome-keyring-daemon</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for /usr/bin/gnome-keyring-daemon, > <p> > restorecon -v '/usr/bin/gnome-keyring-daemon' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by gdm-session-wor. It is not > expected that this access is required by gdm-session-wor and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing gdm-session-wor (bootloader_t) "entrypoint" to /usr/bin/gnome-keyring-daemon (bin_t). > ]]></summary> > </solution> > <source>gdm-session-wor</source> > <spath>/usr/libexec/gdm-session-worker</spath> > <src_rpm_list> > <rpm>gdm-2.21.7-1.fc9</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="bin_t" user="system_u"/> > <tgt_rpm_list> > <rpm>gnome-keyring-2.21.92-1.fc9</rpm> > </tgt_rpm_list> > <tpath>/usr/bin/gnome-keyring-daemon</tpath> > </siginfo> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="846" seconds="1204009930" serial="104"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { entrypoint } for pid=12811 comm="gdm-session-wor" path="/etc/X11/xinit/Xsession" dev=sdb3 ino=363255 scontext=user_u:system_r:bootloader_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="846" seconds="1204009930" serial="104"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=11 success=no exit=-13 a0=94b9460 a1=94b8120 a2=94bb010 a3=94b9460 items=0 ppid=12574 pid=12811 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=7 comm="gdm-session-wor" exe="/usr/libexec/gdm-session-worker" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="846" seconds="1204009930" serial="104"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T06:27:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T07:12:10Z</last_seen_date> > <local_id>cd178af5-13aa-4996-94cc-334fdf249bd1</local_id> > <report_count>3</report_count> > <scontext mls="s0" role="system_r" type="bootloader_t" user="user_u"/> > <sig version="3.0"> > <access> > <operation>entrypoint</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="bootloader_t" user="user_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="bin_t" user="system_u"/> > <tpath>/etc/X11/xinit/Xsession</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for /etc/X11/xinit/Xsession, > <p> > restorecon -v '/etc/X11/xinit/Xsession' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by gdm-session-wor. It is not > expected that this access is required by gdm-session-wor and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing gdm-session-wor (bootloader_t) "entrypoint" to /etc/X11/xinit/Xsession (bin_t). > ]]></summary> > </solution> > <source>gdm-session-wor</source> > <spath>/usr/libexec/gdm-session-worker</spath> > <src_rpm_list> > <rpm>gdm-2.21.7-1.fc9</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="bin_t" user="system_u"/> > <tgt_rpm_list> > <rpm>xorg-x11-xinit-1.0.7-5.fc9</rpm> > </tgt_rpm_list> > <tpath>/etc/X11/xinit/Xsession</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="154" seconds="1204061469" serial="274"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23473 comm="gconfd-2" name="linc-5bb1-0-d98c2e725aec" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="154" seconds="1204061469" serial="274"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd7e50 a2=382e8c a3=b80b56d8 items=0 ppid=1 pid=23473 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="154" seconds="1204061469" serial="274"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:09Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:09Z</last_seen_date> > <local_id>0c09f2fb-5d42-4144-a2db-deacbeea2192</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bb1-0-d98c2e725aec</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5bb1-0-d98c2e725aec'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5bb1-0-d98c2e725aec). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5bb1-0-d98c2e725aec). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bb1-0-d98c2e725aec</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="572" seconds="1204061469" serial="275"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23507 comm="gconfd-2" name="linc-5bd3-0-689ca7a28bb03" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="572" seconds="1204061469" serial="275"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc42cc0 a2=382e8c a3=b801e6d8 items=0 ppid=1 pid=23507 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="572" seconds="1204061469" serial="275"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:09Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:09Z</last_seen_date> > <local_id>f4851ddd-acb2-4a19-9a3c-b1ad5569ad0c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bd3-0-689ca7a28bb03</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5bd3-0-689ca7a28bb03'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5bd3-0-689ca7a28bb03). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5bd3-0-689ca7a28bb03). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bd3-0-689ca7a28bb03</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="673" seconds="1204061469" serial="276"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23510 comm="gconfd-2" name="linc-5bd6-0-44a379e6a451b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="673" seconds="1204061469" serial="276"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfddb650 a2=382e8c a3=b80b86d8 items=0 ppid=1 pid=23510 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="673" seconds="1204061469" serial="276"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:09Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:09Z</last_seen_date> > <local_id>eb17e805-5d15-46de-af35-06d6acb676c7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bd6-0-44a379e6a451b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5bd6-0-44a379e6a451b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5bd6-0-44a379e6a451b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5bd6-0-44a379e6a451b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bd6-0-44a379e6a451b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="735" seconds="1204061469" serial="277"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23514 comm="gconfd-2" name="linc-5bda-0-4237b507b3aa3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="735" seconds="1204061469" serial="277"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf883100 a2=382e8c a3=b805e6d8 items=0 ppid=1 pid=23514 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="735" seconds="1204061469" serial="277"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:09Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:09Z</last_seen_date> > <local_id>771d64d7-2733-4e33-b48a-69a3f394838c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bda-0-4237b507b3aa3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5bda-0-4237b507b3aa3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5bda-0-4237b507b3aa3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5bda-0-4237b507b3aa3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bda-0-4237b507b3aa3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="843" seconds="1204061469" serial="278"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23517 comm="gconfd-2" name="linc-5bdd-0-30be9e0ccdf2f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="843" seconds="1204061469" serial="278"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa342b0 a2=382e8c a3=b800f6d8 items=0 ppid=1 pid=23517 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="843" seconds="1204061469" serial="278"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:09Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:09Z</last_seen_date> > <local_id>9d1c812b-e1b8-4f09-bd01-f5fd9f525838</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bdd-0-30be9e0ccdf2f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5bdd-0-30be9e0ccdf2f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5bdd-0-30be9e0ccdf2f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5bdd-0-30be9e0ccdf2f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5bdd-0-30be9e0ccdf2f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="792" seconds="1204061470" serial="279"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23565 comm="gconfd-2" name="linc-5c0d-0-532a226ec159d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="792" seconds="1204061470" serial="279"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdda650 a2=382e8c a3=b7fb76d8 items=0 ppid=1 pid=23565 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="792" seconds="1204061470" serial="279"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:10Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:10Z</last_seen_date> > <local_id>e33c418a-ae2d-4356-92b0-4b3b61af10b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c0d-0-532a226ec159d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c0d-0-532a226ec159d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c0d-0-532a226ec159d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c0d-0-532a226ec159d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c0d-0-532a226ec159d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="878" seconds="1204061470" serial="280"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23567 comm="gconfd-2" name="linc-5c0f-0-41e4bf53d66bb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="878" seconds="1204061470" serial="280"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8458c0 a2=382e8c a3=b80236d8 items=0 ppid=1 pid=23567 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="878" seconds="1204061470" serial="280"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:10Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:10Z</last_seen_date> > <local_id>6561384e-601f-40db-9400-26feaabc9960</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c0f-0-41e4bf53d66bb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c0f-0-41e4bf53d66bb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c0f-0-41e4bf53d66bb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c0f-0-41e4bf53d66bb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c0f-0-41e4bf53d66bb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="974" seconds="1204061470" serial="281"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23571 comm="gconfd-2" name="linc-5c13-0-40bc7549e5f1b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="974" seconds="1204061470" serial="281"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcbed40 a2=382e8c a3=b809a6d8 items=0 ppid=1 pid=23571 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="974" seconds="1204061470" serial="281"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:10Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:10Z</last_seen_date> > <local_id>c9f3f764-ff3b-40a8-bba8-cc959c2f2762</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c13-0-40bc7549e5f1b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c13-0-40bc7549e5f1b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c13-0-40bc7549e5f1b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c13-0-40bc7549e5f1b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c13-0-40bc7549e5f1b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="91" seconds="1204061471" serial="282"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23575 comm="gconfd-2" name="linc-5c17-0-32a4f31516710" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="91" seconds="1204061471" serial="282"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff27fa0 a2=382e8c a3=b7f036d8 items=0 ppid=1 pid=23575 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="91" seconds="1204061471" serial="282"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>bd6d2fac-a2ad-4c03-88f3-5926d706f781</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c17-0-32a4f31516710</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c17-0-32a4f31516710'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c17-0-32a4f31516710). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c17-0-32a4f31516710). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c17-0-32a4f31516710</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="161" seconds="1204061471" serial="283"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23580 comm="gconfd-2" name="linc-5c1c-0-1692c7ef2772c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="161" seconds="1204061471" serial="283"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa2fab0 a2=382e8c a3=b7f0d6d8 items=0 ppid=1 pid=23580 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="161" seconds="1204061471" serial="283"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>44e380a8-75a7-48ae-b9b5-4e1a2916a168</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c1c-0-1692c7ef2772c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c1c-0-1692c7ef2772c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c1c-0-1692c7ef2772c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c1c-0-1692c7ef2772c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c1c-0-1692c7ef2772c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="297" seconds="1204061471" serial="284"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23582 comm="gconfd-2" name="linc-5c1e-0-5626030c48a9d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="297" seconds="1204061471" serial="284"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd9a610 a2=382e8c a3=b80756d8 items=0 ppid=1 pid=23582 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="297" seconds="1204061471" serial="284"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>a13db964-3bb3-4885-8c9c-65f886513552</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c1e-0-5626030c48a9d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c1e-0-5626030c48a9d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c1e-0-5626030c48a9d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c1e-0-5626030c48a9d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c1e-0-5626030c48a9d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="320" seconds="1204061471" serial="285"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23585 comm="gconfd-2" name="linc-5c21-0-670cffe14e524" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="320" seconds="1204061471" serial="285"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeae730 a2=382e8c a3=b808b6d8 items=0 ppid=1 pid=23585 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="320" seconds="1204061471" serial="285"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>0cb9dbc4-9818-4419-8be1-73764046d71f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c21-0-670cffe14e524</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c21-0-670cffe14e524'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c21-0-670cffe14e524). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c21-0-670cffe14e524). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c21-0-670cffe14e524</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="374" seconds="1204061471" serial="286"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23589 comm="gconfd-2" name="linc-5c25-0-1e05f225b6b3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="374" seconds="1204061471" serial="286"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff4afc0 a2=382e8c a3=b7f266d8 items=0 ppid=1 pid=23589 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="374" seconds="1204061471" serial="286"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>5468955e-3384-4fb5-a699-637ba69b632c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c25-0-1e05f225b6b3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c25-0-1e05f225b6b3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c25-0-1e05f225b6b3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c25-0-1e05f225b6b3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c25-0-1e05f225b6b3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="429" seconds="1204061471" serial="287"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23592 comm="gconfd-2" name="linc-5c28-0-67a2cae068be8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="429" seconds="1204061471" serial="287"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff62fe0 a2=382e8c a3=b7f406d8 items=0 ppid=1 pid=23592 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="429" seconds="1204061471" serial="287"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>abc61e7f-bdee-419e-809a-8c2cb6b78a33</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c28-0-67a2cae068be8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c28-0-67a2cae068be8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c28-0-67a2cae068be8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c28-0-67a2cae068be8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c28-0-67a2cae068be8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="594" seconds="1204061471" serial="288"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23598 comm="gconfd-2" name="linc-5c2e-0-79745d6c91287" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="594" seconds="1204061471" serial="288"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfee4760 a2=382e8c a3=b80c16d8 items=0 ppid=1 pid=23598 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="594" seconds="1204061471" serial="288"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>72555a42-788a-4359-9c9a-f8f0b50e267c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c2e-0-79745d6c91287</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c2e-0-79745d6c91287'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c2e-0-79745d6c91287). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c2e-0-79745d6c91287). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c2e-0-79745d6c91287</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="599" seconds="1204061471" serial="289"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23594 comm="gconfd-2" name="linc-5c2a-0-4f8974de92497" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061471" serial="289"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea1720 a2=382e8c a3=b7f7c6d8 items=0 ppid=1 pid=23594 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061471" serial="289"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>088820d4-0d04-4191-9584-b35fdde9da78</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c2a-0-4f8974de92497</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c2a-0-4f8974de92497'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c2a-0-4f8974de92497). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c2a-0-4f8974de92497). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c2a-0-4f8974de92497</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="754" seconds="1204061471" serial="290"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23605 comm="gconfd-2" name="linc-5c35-0-1663fa90b828a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="754" seconds="1204061471" serial="290"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff80000 a2=382e8c a3=b7f5b6d8 items=0 ppid=23604 pid=23605 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="754" seconds="1204061471" serial="290"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>c48347fc-54c4-4976-b12c-6a3c452ff8af</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c35-0-1663fa90b828a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c35-0-1663fa90b828a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c35-0-1663fa90b828a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c35-0-1663fa90b828a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c35-0-1663fa90b828a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="781" seconds="1204061471" serial="291"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23607 comm="gconfd-2" name="linc-5c37-0-6d1d1f11bee20" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="781" seconds="1204061471" serial="291"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8f8170 a2=382e8c a3=b7fd36d8 items=0 ppid=1 pid=23607 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="781" seconds="1204061471" serial="291"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>b5c13345-743c-4aa4-821a-d7db70d1d62b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c37-0-6d1d1f11bee20</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c37-0-6d1d1f11bee20'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c37-0-6d1d1f11bee20). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c37-0-6d1d1f11bee20). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c37-0-6d1d1f11bee20</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="924" seconds="1204061471" serial="292"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23610 comm="gconfd-2" name="linc-5c3a-0-5fac61cbe1c43" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="924" seconds="1204061471" serial="292"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffbc040 a2=382e8c a3=b7f996d8 items=0 ppid=1 pid=23610 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="924" seconds="1204061471" serial="292"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>bb0acc57-22e7-4058-a8b5-c29d353b0622</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c3a-0-5fac61cbe1c43</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c3a-0-5fac61cbe1c43'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c3a-0-5fac61cbe1c43). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c3a-0-5fac61cbe1c43). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c3a-0-5fac61cbe1c43</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="928" seconds="1204061471" serial="293"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23612 comm="gconfd-2" name="linc-5c3c-0-a20b524e2a79" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="928" seconds="1204061471" serial="293"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9be9d0 a2=382e8c a3=b809a6d8 items=0 ppid=1 pid=23612 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="928" seconds="1204061471" serial="293"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>f47e6497-13de-488a-852f-b9d81b8896ad</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c3c-0-a20b524e2a79</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c3c-0-a20b524e2a79'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c3c-0-a20b524e2a79). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c3c-0-a20b524e2a79). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c3c-0-a20b524e2a79</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="980" seconds="1204061471" serial="294"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23617 comm="gconfd-2" name="linc-5c41-0-5b76cc98ef5c4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="980" seconds="1204061471" serial="294"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa95310 a2=382e8c a3=b7f726d8 items=0 ppid=23616 pid=23617 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="980" seconds="1204061471" serial="294"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:11Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:11Z</last_seen_date> > <local_id>7222decf-2798-4a4e-8f93-32cdba82ebd5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c41-0-5b76cc98ef5c4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c41-0-5b76cc98ef5c4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c41-0-5b76cc98ef5c4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c41-0-5b76cc98ef5c4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c41-0-5b76cc98ef5c4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="39" seconds="1204061472" serial="295"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23620 comm="gconfd-2" name="linc-5c44-0-47bddd8998d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="39" seconds="1204061472" serial="295"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9241a0 a2=382e8c a3=b7f016d8 items=0 ppid=1 pid=23620 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="39" seconds="1204061472" serial="295"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>114422b9-573a-43be-80d5-5ae1bc49f0d2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c44-0-47bddd8998d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c44-0-47bddd8998d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c44-0-47bddd8998d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c44-0-47bddd8998d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c44-0-47bddd8998d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="153" seconds="1204061472" serial="296"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23622 comm="gconfd-2" name="linc-5c46-0-742cbeb525834" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="153" seconds="1204061472" serial="296"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd0a4b0 a2=382e8c a3=b7ee56d8 items=0 ppid=1 pid=23622 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="153" seconds="1204061472" serial="296"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>575a6164-ca02-4dfb-90dc-6d2965beba75</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c46-0-742cbeb525834</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c46-0-742cbeb525834'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c46-0-742cbeb525834). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c46-0-742cbeb525834). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c46-0-742cbeb525834</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="218" seconds="1204061472" serial="297"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23625 comm="gconfd-2" name="linc-5c49-0-54fc414e3564a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="218" seconds="1204061472" serial="297"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb95410 a2=382e8c a3=b7f706d8 items=0 ppid=1 pid=23625 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="218" seconds="1204061472" serial="297"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>c10d0b21-f504-45b5-8552-ed93c34bce13</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c49-0-54fc414e3564a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c49-0-54fc414e3564a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c49-0-54fc414e3564a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c49-0-54fc414e3564a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c49-0-54fc414e3564a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="233" seconds="1204061472" serial="298"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23630 comm="gconfd-2" name="linc-5c4e-0-28a037473900f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="233" seconds="1204061472" serial="298"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd1eda0 a2=382e8c a3=b7efa6d8 items=0 ppid=1 pid=23630 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="233" seconds="1204061472" serial="298"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>0f1f6de7-1e06-4c34-8ff8-bb1815151df9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c4e-0-28a037473900f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c4e-0-28a037473900f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c4e-0-28a037473900f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c4e-0-28a037473900f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c4e-0-28a037473900f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="325" seconds="1204061472" serial="299"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23633 comm="gconfd-2" name="linc-5c51-0-33889fce4f6ab" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="325" seconds="1204061472" serial="299"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed8750 a2=382e8c a3=b7fb36d8 items=0 ppid=1 pid=23633 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="325" seconds="1204061472" serial="299"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>ce585c87-fbbc-4723-b256-af2885efb9ae</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c51-0-33889fce4f6ab</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c51-0-33889fce4f6ab'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c51-0-33889fce4f6ab). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c51-0-33889fce4f6ab). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c51-0-33889fce4f6ab</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="404" seconds="1204061472" serial="300"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23634 comm="gconfd-2" name="linc-5c52-0-6ea4654d62c6c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="404" seconds="1204061472" serial="300"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc544d0 a2=382e8c a3=b7f2f6d8 items=0 ppid=1 pid=23634 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="404" seconds="1204061472" serial="300"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>b6cfddad-d0c3-48ef-8b7f-6ecad34401ba</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c52-0-6ea4654d62c6c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c52-0-6ea4654d62c6c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c52-0-6ea4654d62c6c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c52-0-6ea4654d62c6c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c52-0-6ea4654d62c6c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="493" seconds="1204061472" serial="301"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23638 comm="gconfd-2" name="linc-5c56-0-721eb69d785db" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="493" seconds="1204061472" serial="301"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb443c0 a2=382e8c a3=b801f6d8 items=0 ppid=1 pid=23638 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="493" seconds="1204061472" serial="301"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>9c43a50a-6ffd-4d90-b278-63733f1961a6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c56-0-721eb69d785db</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c56-0-721eb69d785db'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c56-0-721eb69d785db). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c56-0-721eb69d785db). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c56-0-721eb69d785db</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="495" seconds="1204061472" serial="302"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23641 comm="gconfd-2" name="linc-5c59-0-54e8a6f878e31" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061472" serial="302"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe0ce90 a2=382e8c a3=b7fea6d8 items=0 ppid=1 pid=23641 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061472" serial="302"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>dc8443b8-abb2-4100-af6d-360d56fb9ade</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c59-0-54e8a6f878e31</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c59-0-54e8a6f878e31'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c59-0-54e8a6f878e31). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c59-0-54e8a6f878e31). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c59-0-54e8a6f878e31</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="583" seconds="1204061472" serial="303"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23647 comm="gconfd-2" name="linc-5c5f-0-516533a38e582" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="583" seconds="1204061472" serial="303"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe23ea0 a2=382e8c a3=b80016d8 items=0 ppid=1 pid=23647 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="583" seconds="1204061472" serial="303"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>0bb4b75b-138e-4390-90c9-768252875f93</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c5f-0-516533a38e582</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c5f-0-516533a38e582'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c5f-0-516533a38e582). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c5f-0-516533a38e582). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c5f-0-516533a38e582</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="663" seconds="1204061472" serial="304"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23644 comm="gconfd-2" name="linc-5c5c-0-4e1491b6a1ef4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="663" seconds="1204061472" serial="304"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbbd440 a2=382e8c a3=b7f9a6d8 items=0 ppid=1 pid=23644 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="663" seconds="1204061472" serial="304"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>6dc84adb-ceef-4e92-8458-10cfa5fe280b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c5c-0-4e1491b6a1ef4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c5c-0-4e1491b6a1ef4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c5c-0-4e1491b6a1ef4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c5c-0-4e1491b6a1ef4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c5c-0-4e1491b6a1ef4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="744" seconds="1204061472" serial="305"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23653 comm="gconfd-2" name="linc-5c65-0-522a2673b5cd2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="744" seconds="1204061472" serial="305"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf98fa10 a2=382e8c a3=b806b6d8 items=0 ppid=1 pid=23653 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="744" seconds="1204061472" serial="305"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>2d109809-45ea-4cb8-a5b6-b4293eefb371</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c65-0-522a2673b5cd2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c65-0-522a2673b5cd2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c65-0-522a2673b5cd2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c65-0-522a2673b5cd2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c65-0-522a2673b5cd2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="747" seconds="1204061472" serial="306"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23650 comm="gconfd-2" name="linc-5c62-0-7feb029cb6860" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="747" seconds="1204061472" serial="306"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbc9c40 a2=382e8c a3=b80a56d8 items=0 ppid=1 pid=23650 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="747" seconds="1204061472" serial="306"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>10fadb4c-ed7b-444c-a5bc-e79e98e5b5c2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c62-0-7feb029cb6860</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c62-0-7feb029cb6860'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c62-0-7feb029cb6860). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c62-0-7feb029cb6860). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c62-0-7feb029cb6860</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="840" seconds="1204061472" serial="307"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23660 comm="gconfd-2" name="linc-5c6c-0-9af218cd183" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="840" seconds="1204061472" serial="307"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd695e0 a2=382e8c a3=b80446d8 items=0 ppid=1 pid=23660 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="840" seconds="1204061472" serial="307"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>806efc96-ad5f-4108-9a0c-0c3ee493e42f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c6c-0-9af218cd183</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c6c-0-9af218cd183'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c6c-0-9af218cd183). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c6c-0-9af218cd183). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c6c-0-9af218cd183</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="907" seconds="1204061472" serial="308"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23657 comm="gconfd-2" name="linc-5c69-0-2005c8cedd6bd" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="907" seconds="1204061472" serial="308"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc4840 a2=382e8c a3=b80a16d8 items=0 ppid=1 pid=23657 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="907" seconds="1204061472" serial="308"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>ab8423b8-660f-4405-b52e-46be770af932</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c69-0-2005c8cedd6bd</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c69-0-2005c8cedd6bd'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c69-0-2005c8cedd6bd). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c69-0-2005c8cedd6bd). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c69-0-2005c8cedd6bd</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="965" seconds="1204061472" serial="309"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23666 comm="gconfd-2" name="linc-5c72-0-71a4fcf0ebb2f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="965" seconds="1204061472" serial="309"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcd2550 a2=382e8c a3=b80af6d8 items=0 ppid=1 pid=23666 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="965" seconds="1204061472" serial="309"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:12Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:12Z</last_seen_date> > <local_id>3abd0bba-1968-4818-bd6b-267534173730</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c72-0-71a4fcf0ebb2f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c72-0-71a4fcf0ebb2f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c72-0-71a4fcf0ebb2f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c72-0-71a4fcf0ebb2f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c72-0-71a4fcf0ebb2f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="33" seconds="1204061473" serial="310"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23662 comm="gconfd-2" name="linc-5c6e-0-37bfc5ae8189" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="33" seconds="1204061473" serial="310"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc51030 a2=382e8c a3=b802d6d8 items=0 ppid=1 pid=23662 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="33" seconds="1204061473" serial="310"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>e0052142-0e7f-4645-843e-70ff65e9c201</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c6e-0-37bfc5ae8189</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c6e-0-37bfc5ae8189'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c6e-0-37bfc5ae8189). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c6e-0-37bfc5ae8189). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c6e-0-37bfc5ae8189</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="101" seconds="1204061473" serial="311"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23672 comm="gconfd-2" name="linc-5c78-0-3173451d18de4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="101" seconds="1204061473" serial="311"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe2fe10 a2=382e8c a3=b800d6d8 items=0 ppid=23671 pid=23672 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="101" seconds="1204061473" serial="311"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>8566359e-3083-43a2-969f-592ee3477a76</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c78-0-3173451d18de4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c78-0-3173451d18de4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c78-0-3173451d18de4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c78-0-3173451d18de4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c78-0-3173451d18de4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="129" seconds="1204061473" serial="312"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23669 comm="gconfd-2" name="linc-5c75-0-7f70f9e21f8b2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="129" seconds="1204061473" serial="312"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf909180 a2=382e8c a3=b7fe66d8 items=0 ppid=1 pid=23669 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="129" seconds="1204061473" serial="312"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>b987810e-7d7a-4765-bee0-92e855f515f0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c75-0-7f70f9e21f8b2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c75-0-7f70f9e21f8b2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c75-0-7f70f9e21f8b2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c75-0-7f70f9e21f8b2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c75-0-7f70f9e21f8b2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="230" seconds="1204061473" serial="313"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23678 comm="gconfd-2" name="linc-5c7e-0-22f8ba3e385f1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="230" seconds="1204061473" serial="313"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfde3f50 a2=382e8c a3=b80c06d8 items=0 ppid=1 pid=23678 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="230" seconds="1204061473" serial="313"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>b02b1b82-b78f-433a-91e0-8a4d33cdf7a9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c7e-0-22f8ba3e385f1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c7e-0-22f8ba3e385f1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c7e-0-22f8ba3e385f1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c7e-0-22f8ba3e385f1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c7e-0-22f8ba3e385f1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="307" seconds="1204061473" serial="314"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23676 comm="gconfd-2" name="linc-5c7c-0-58d323c04b24d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="307" seconds="1204061473" serial="314"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcc3540 a2=382e8c a3=b7f9e6d8 items=0 ppid=1 pid=23676 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="307" seconds="1204061473" serial="314"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>5a25d80c-dc27-4126-9e1a-daf19366d6ab</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c7c-0-58d323c04b24d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c7c-0-58d323c04b24d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c7c-0-58d323c04b24d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c7c-0-58d323c04b24d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c7c-0-58d323c04b24d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="393" seconds="1204061473" serial="315"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23681 comm="gconfd-2" name="linc-5c81-0-63aa854260011" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="393" seconds="1204061473" serial="315"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc9a510 a2=382e8c a3=b7f756d8 items=0 ppid=1 pid=23681 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="393" seconds="1204061473" serial="315"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>76ad31e0-c6dd-4c98-83ac-01041d377116</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c81-0-63aa854260011</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c81-0-63aa854260011'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c81-0-63aa854260011). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c81-0-63aa854260011). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c81-0-63aa854260011</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="398" seconds="1204061473" serial="316"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23685 comm="gconfd-2" name="linc-5c85-0-56446ce56140f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="398" seconds="1204061473" serial="316"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdb4e30 a2=382e8c a3=b7f926d8 items=0 ppid=1 pid=23685 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="398" seconds="1204061473" serial="316"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>a81f1e02-92db-4dd5-a5b0-f86b56d0a75e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c85-0-56446ce56140f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c85-0-56446ce56140f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c85-0-56446ce56140f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c85-0-56446ce56140f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c85-0-56446ce56140f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="504" seconds="1204061473" serial="317"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23688 comm="gconfd-2" name="linc-5c88-0-7611395f7b396" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="504" seconds="1204061473" serial="317"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9f2a70 a2=382e8c a3=b80d06d8 items=0 ppid=1 pid=23688 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="504" seconds="1204061473" serial="317"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>192c9f04-9b40-4ab8-8a72-1fe106f36e5a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c88-0-7611395f7b396</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c88-0-7611395f7b396'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c88-0-7611395f7b396). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c88-0-7611395f7b396). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c88-0-7611395f7b396</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="597" seconds="1204061473" serial="318"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23690 comm="gconfd-2" name="linc-5c8a-0-2a1aace191f00" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="597" seconds="1204061473" serial="318"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf81fcc0 a2=382e8c a3=b7ffd6d8 items=0 ppid=1 pid=23690 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="597" seconds="1204061473" serial="318"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>2e9e4626-f77c-4a4f-89ad-075159a55a94</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c8a-0-2a1aace191f00</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c8a-0-2a1aace191f00'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c8a-0-2a1aace191f00). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c8a-0-2a1aace191f00). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c8a-0-2a1aace191f00</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="648" seconds="1204061473" serial="319"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23694 comm="gconfd-2" name="linc-5c8e-0-74f07aaa9e613" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="648" seconds="1204061473" serial="319"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd867c0 a2=382e8c a3=b7f626d8 items=0 ppid=1 pid=23694 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="648" seconds="1204061473" serial="319"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>87fcf74a-3ac7-48e7-9ded-f828a5361230</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c8e-0-74f07aaa9e613</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c8e-0-74f07aaa9e613'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c8e-0-74f07aaa9e613). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c8e-0-74f07aaa9e613). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c8e-0-74f07aaa9e613</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="698" seconds="1204061473" serial="320"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23700 comm="gconfd-2" name="linc-5c94-0-62b30ae2a90e5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="698" seconds="1204061473" serial="320"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf983a00 a2=382e8c a3=b805f6d8 items=0 ppid=23699 pid=23700 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="698" seconds="1204061473" serial="320"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>6114d350-d0fc-4859-acfb-2eb927e7e322</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c94-0-62b30ae2a90e5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c94-0-62b30ae2a90e5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c94-0-62b30ae2a90e5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c94-0-62b30ae2a90e5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c94-0-62b30ae2a90e5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="760" seconds="1204061473" serial="321"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23698 comm="gconfd-2" name="linc-5c92-0-78ecb6d8b9bd7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="760" seconds="1204061473" serial="321"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa3aab0 a2=382e8c a3=b7f166d8 items=0 ppid=1 pid=23698 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="760" seconds="1204061473" serial="321"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>ac4ee345-c685-4baa-b67d-99b6cbd34248</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c92-0-78ecb6d8b9bd7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c92-0-78ecb6d8b9bd7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c92-0-78ecb6d8b9bd7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c92-0-78ecb6d8b9bd7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c92-0-78ecb6d8b9bd7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="883" seconds="1204061473" serial="322"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23704 comm="gconfd-2" name="linc-5c98-0-467d689dd7b06" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="883" seconds="1204061473" serial="322"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe526d0 a2=382e8c a3=b802d6d8 items=0 ppid=1 pid=23704 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="883" seconds="1204061473" serial="322"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>d6ff8a7b-3eda-4887-bc37-2c0c2fe1ad0f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c98-0-467d689dd7b06</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c98-0-467d689dd7b06'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c98-0-467d689dd7b06). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c98-0-467d689dd7b06). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c98-0-467d689dd7b06</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="889" seconds="1204061473" serial="323"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23706 comm="gconfd-2" name="linc-5c9a-0-58e46b92d925f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="889" seconds="1204061473" serial="323"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea3f20 a2=382e8c a3=b807f6d8 items=0 ppid=1 pid=23706 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="889" seconds="1204061473" serial="323"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>4832b1e5-87ff-43f4-9a88-f294b509118b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c9a-0-58e46b92d925f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c9a-0-58e46b92d925f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c9a-0-58e46b92d925f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c9a-0-58e46b92d925f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c9a-0-58e46b92d925f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="983" seconds="1204061473" serial="324"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23711 comm="gconfd-2" name="linc-5c9f-0-225a2df7f00ea" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="983" seconds="1204061473" serial="324"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb633e0 a2=382e8c a3=b7f406d8 items=0 ppid=1 pid=23711 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="983" seconds="1204061473" serial="324"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:13Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:13Z</last_seen_date> > <local_id>aaad2461-06e1-41d5-89db-39f0c261ecd8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c9f-0-225a2df7f00ea</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5c9f-0-225a2df7f00ea'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5c9f-0-225a2df7f00ea). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5c9f-0-225a2df7f00ea). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5c9f-0-225a2df7f00ea</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="15" seconds="1204061474" serial="325"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23714 comm="gconfd-2" name="linc-5ca2-0-60d190703ad1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="15" seconds="1204061474" serial="325"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcb5d30 a2=382e8c a3=b7f936d8 items=0 ppid=23713 pid=23714 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="15" seconds="1204061474" serial="325"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>2c735783-1da1-4ed7-85dd-1a54f79e0a06</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca2-0-60d190703ad1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ca2-0-60d190703ad1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ca2-0-60d190703ad1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ca2-0-60d190703ad1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca2-0-60d190703ad1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="142" seconds="1204061474" serial="326"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23716 comm="gconfd-2" name="linc-5ca4-0-11f9c35d22c09" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="142" seconds="1204061474" serial="326"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa212a0 a2=382e8c a3=b7ffc6d8 items=0 ppid=1 pid=23716 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="142" seconds="1204061474" serial="326"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>275adf44-b1ff-4463-9494-c517a1790532</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca4-0-11f9c35d22c09</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ca4-0-11f9c35d22c09'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ca4-0-11f9c35d22c09). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ca4-0-11f9c35d22c09). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca4-0-11f9c35d22c09</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="201" seconds="1204061474" serial="327"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23723 comm="gconfd-2" name="linc-5cab-0-6f68ffad31361" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="201" seconds="1204061474" serial="327"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa5d2d0 a2=382e8c a3=b80386d8 items=0 ppid=1 pid=23723 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="201" seconds="1204061474" serial="327"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>b62c4c7a-2e73-461c-aa42-2194539b2d17</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cab-0-6f68ffad31361</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cab-0-6f68ffad31361'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cab-0-6f68ffad31361). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cab-0-6f68ffad31361). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cab-0-6f68ffad31361</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="216" seconds="1204061474" serial="328"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23720 comm="gconfd-2" name="linc-5ca8-0-73ec8b7e34d54" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="216" seconds="1204061474" serial="328"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9c3250 a2=382e8c a3=b809f6d8 items=0 ppid=1 pid=23720 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="216" seconds="1204061474" serial="328"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>98b3c79a-6bf8-4ad3-82e9-7bdd59106a66</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca8-0-73ec8b7e34d54</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ca8-0-73ec8b7e34d54'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ca8-0-73ec8b7e34d54). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ca8-0-73ec8b7e34d54). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ca8-0-73ec8b7e34d54</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="316" seconds="1204061474" serial="329"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23730 comm="gconfd-2" name="linc-5cb2-0-4a295c624d2fe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061474" serial="329"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb483c0 a2=382e8c a3=b7f236d8 items=0 ppid=23729 pid=23730 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061474" serial="329"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>06fef26a-5d74-46a7-a28b-c937e302270f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb2-0-4a295c624d2fe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cb2-0-4a295c624d2fe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cb2-0-4a295c624d2fe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cb2-0-4a295c624d2fe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb2-0-4a295c624d2fe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="374" seconds="1204061474" serial="330"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23726 comm="gconfd-2" name="linc-5cae-0-330f8eba5b64f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="374" seconds="1204061474" serial="330"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe60ee0 a2=382e8c a3=b803c6d8 items=0 ppid=1 pid=23726 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="374" seconds="1204061474" serial="330"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>2d406474-3a22-4f18-8c2a-09bf049d2a12</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cae-0-330f8eba5b64f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cae-0-330f8eba5b64f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cae-0-330f8eba5b64f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cae-0-330f8eba5b64f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cae-0-330f8eba5b64f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="461" seconds="1204061474" serial="331"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23736 comm="gconfd-2" name="linc-5cb8-0-68f59f0f70b45" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="461" seconds="1204061474" serial="331"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9a9220 a2=382e8c a3=b80866d8 items=0 ppid=1 pid=23736 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="461" seconds="1204061474" serial="331"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>c87028c9-5e25-49d1-b2ce-cd6a66ec9274</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb8-0-68f59f0f70b45</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cb8-0-68f59f0f70b45'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cb8-0-68f59f0f70b45). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cb8-0-68f59f0f70b45). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb8-0-68f59f0f70b45</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="495" seconds="1204061474" serial="332"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23733 comm="gconfd-2" name="linc-5cb5-0-2f20a06178ddb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061474" serial="332"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9a6030 a2=382e8c a3=b7f826d8 items=0 ppid=1 pid=23733 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061474" serial="332"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>b43f0486-7751-4e6d-8f27-6823cc63a9a0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb5-0-2f20a06178ddb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cb5-0-2f20a06178ddb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cb5-0-2f20a06178ddb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cb5-0-2f20a06178ddb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cb5-0-2f20a06178ddb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="586" seconds="1204061474" serial="333"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23742 comm="gconfd-2" name="linc-5cbe-0-1e115c5b8f16d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="586" seconds="1204061474" serial="333"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8b7130 a2=382e8c a3=b7f926d8 items=0 ppid=23741 pid=23742 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="586" seconds="1204061474" serial="333"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>95028da5-6742-4fb3-a3ad-fbffbc036511</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cbe-0-1e115c5b8f16d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cbe-0-1e115c5b8f16d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cbe-0-1e115c5b8f16d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cbe-0-1e115c5b8f16d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cbe-0-1e115c5b8f16d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="610" seconds="1204061474" serial="334"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23739 comm="gconfd-2" name="linc-5cbb-0-53a5ce0195164" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="610" seconds="1204061474" serial="334"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8a6120 a2=382e8c a3=b80836d8 items=0 ppid=1 pid=23739 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="610" seconds="1204061474" serial="334"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>1b2e3e02-f870-4c5b-ada5-5d74af65b611</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cbb-0-53a5ce0195164</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cbb-0-53a5ce0195164'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cbb-0-53a5ce0195164). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cbb-0-53a5ce0195164). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cbb-0-53a5ce0195164</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="695" seconds="1204061474" serial="335"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23746 comm="gconfd-2" name="linc-5cc2-0-64ec4891a9e04" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="695" seconds="1204061474" serial="335"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb7cbf0 a2=382e8c a3=b7f586d8 items=0 ppid=1 pid=23746 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="695" seconds="1204061474" serial="335"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>3f87265e-5c8d-4aba-b4b3-e4f548fc7035</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc2-0-64ec4891a9e04</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cc2-0-64ec4891a9e04'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cc2-0-64ec4891a9e04). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cc2-0-64ec4891a9e04). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc2-0-64ec4891a9e04</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="818" seconds="1204061474" serial="336"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23748 comm="gconfd-2" name="linc-5cc4-0-421786f6c7cea" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="818" seconds="1204061474" serial="336"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff8f010 a2=382e8c a3=b7f6c6d8 items=0 ppid=1 pid=23748 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="818" seconds="1204061474" serial="336"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>2873a860-2910-4a54-9c0a-a03b9dc349c9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc4-0-421786f6c7cea</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cc4-0-421786f6c7cea'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cc4-0-421786f6c7cea). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cc4-0-421786f6c7cea). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc4-0-421786f6c7cea</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="839" seconds="1204061474" serial="337"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23751 comm="gconfd-2" name="linc-5cc7-0-1da33fc4cd0b8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="839" seconds="1204061474" serial="337"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf90c190 a2=382e8c a3=b7fe96d8 items=0 ppid=1 pid=23751 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="839" seconds="1204061474" serial="337"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>aebb37f0-7f6e-4eca-a747-b2aea54aa142</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc7-0-1da33fc4cd0b8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cc7-0-1da33fc4cd0b8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cc7-0-1da33fc4cd0b8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cc7-0-1da33fc4cd0b8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cc7-0-1da33fc4cd0b8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="883" seconds="1204061474" serial="338"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23755 comm="gconfd-2" name="linc-5ccb-0-5412bed0d7b04" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="883" seconds="1204061474" serial="338"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe00680 a2=382e8c a3=b7edd6d8 items=0 ppid=23754 pid=23755 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="883" seconds="1204061474" serial="338"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>f44a4474-85a8-46b8-8a51-7b0e62080841</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ccb-0-5412bed0d7b04</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ccb-0-5412bed0d7b04'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ccb-0-5412bed0d7b04). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ccb-0-5412bed0d7b04). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ccb-0-5412bed0d7b04</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="959" seconds="1204061474" serial="339"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23758 comm="gconfd-2" name="linc-5cce-0-3146ecceea344" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="959" seconds="1204061474" serial="339"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff90d60 a2=382e8c a3=b7f6d6d8 items=0 ppid=1 pid=23758 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="959" seconds="1204061474" serial="339"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:14Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:14Z</last_seen_date> > <local_id>e05762ea-883b-461d-b417-8d0ea098f712</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cce-0-3146ecceea344</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cce-0-3146ecceea344'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cce-0-3146ecceea344). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cce-0-3146ecceea344). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cce-0-3146ecceea344</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="78" seconds="1204061475" serial="340"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23760 comm="gconfd-2" name="linc-5cd0-0-4675d2861329c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="78" seconds="1204061475" serial="340"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff57fd0 a2=382e8c a3=b80356d8 items=0 ppid=1 pid=23760 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="78" seconds="1204061475" serial="340"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>0c7770d3-7481-4150-a2d6-a72f05203353</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd0-0-4675d2861329c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cd0-0-4675d2861329c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cd0-0-4675d2861329c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cd0-0-4675d2861329c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd0-0-4675d2861329c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="94" seconds="1204061475" serial="341"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23763 comm="gconfd-2" name="linc-5cd3-0-4bc69b571717f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="94" seconds="1204061475" serial="341"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8688e0 a2=382e8c a3=b7f466d8 items=0 ppid=1 pid=23763 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="94" seconds="1204061475" serial="341"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>967885c2-9533-42b6-aec7-e8522f3b23df</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd3-0-4bc69b571717f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cd3-0-4bc69b571717f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cd3-0-4bc69b571717f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cd3-0-4bc69b571717f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd3-0-4bc69b571717f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="165" seconds="1204061475" serial="342"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23770 comm="gconfd-2" name="linc-5cda-0-3ebc5dff28718" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="165" seconds="1204061475" serial="342"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe84700 a2=382e8c a3=b805f6d8 items=0 ppid=23769 pid=23770 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="165" seconds="1204061475" serial="342"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>33108e00-291c-49ae-9da2-979a860fdf40</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cda-0-3ebc5dff28718</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cda-0-3ebc5dff28718'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cda-0-3ebc5dff28718). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cda-0-3ebc5dff28718). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cda-0-3ebc5dff28718</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="196" seconds="1204061475" serial="343"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23768 comm="gconfd-2" name="linc-5cd8-0-7d0350242fe8d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="196" seconds="1204061475" serial="343"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeaef30 a2=382e8c a3=b7f8a6d8 items=0 ppid=1 pid=23768 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="196" seconds="1204061475" serial="343"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>c5d1d0bd-d066-4a7d-8b52-f3e6e4231187</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd8-0-7d0350242fe8d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cd8-0-7d0350242fe8d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cd8-0-7d0350242fe8d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cd8-0-7d0350242fe8d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cd8-0-7d0350242fe8d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="327" seconds="1204061475" serial="344"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23772 comm="gconfd-2" name="linc-5cdc-0-6236ead64ff33" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="327" seconds="1204061475" serial="344"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf81e8a0 a2=382e8c a3=b7ffc6d8 items=0 ppid=1 pid=23772 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="327" seconds="1204061475" serial="344"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>0fdf050b-f63d-4be2-9d59-bf0f38956f9f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cdc-0-6236ead64ff33</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cdc-0-6236ead64ff33'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cdc-0-6236ead64ff33). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cdc-0-6236ead64ff33). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cdc-0-6236ead64ff33</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="343" seconds="1204061475" serial="345"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23774 comm="gconfd-2" name="linc-5cde-0-66f38f6953eb5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="343" seconds="1204061475" serial="345"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf860090 a2=382e8c a3=b803c6d8 items=0 ppid=1 pid=23774 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="343" seconds="1204061475" serial="345"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>6eadc0ba-6c9a-4dba-b5ba-530f65bded4d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cde-0-66f38f6953eb5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cde-0-66f38f6953eb5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cde-0-66f38f6953eb5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cde-0-66f38f6953eb5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cde-0-66f38f6953eb5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="455" seconds="1204061475" serial="346"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23779 comm="gconfd-2" name="linc-5ce3-0-3453bd786f268" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="455" seconds="1204061475" serial="346"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdc1640 a2=382e8c a3=b7f9c6d8 items=0 ppid=1 pid=23779 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="455" seconds="1204061475" serial="346"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>4fbe6acf-3268-43f4-86ca-53c2974b3326</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce3-0-3453bd786f268</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ce3-0-3453bd786f268'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ce3-0-3453bd786f268). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ce3-0-3453bd786f268). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce3-0-3453bd786f268</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="467" seconds="1204061475" serial="347"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23781 comm="gconfd-2" name="linc-5ce5-0-70090dcd72120" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="467" seconds="1204061475" serial="347"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbe4c60 a2=382e8c a3=b80c26d8 items=0 ppid=1 pid=23781 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="467" seconds="1204061475" serial="347"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>9618b6ae-f59f-4816-86c2-ae484bd561d6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce5-0-70090dcd72120</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ce5-0-70090dcd72120'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ce5-0-70090dcd72120). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ce5-0-70090dcd72120). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce5-0-70090dcd72120</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="607" seconds="1204061475" serial="348"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23784 comm="gconfd-2" name="linc-5ce8-0-622f31d394474" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="607" seconds="1204061475" serial="348"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfca1520 a2=382e8c a3=b807e6d8 items=0 ppid=1 pid=23784 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="607" seconds="1204061475" serial="348"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>90281e9f-56ed-46bd-800b-505fe1af537e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce8-0-622f31d394474</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ce8-0-622f31d394474'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ce8-0-622f31d394474). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ce8-0-622f31d394474). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ce8-0-622f31d394474</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="612" seconds="1204061475" serial="349"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23787 comm="gconfd-2" name="linc-5ceb-0-5210472b95932" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="612" seconds="1204061475" serial="349"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa5cae0 a2=382e8c a3=b803a6d8 items=0 ppid=1 pid=23787 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="612" seconds="1204061475" serial="349"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>5280130d-c137-4faa-a3f8-40d856b5a79e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ceb-0-5210472b95932</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ceb-0-5210472b95932'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ceb-0-5210472b95932). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ceb-0-5210472b95932). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ceb-0-5210472b95932</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="691" seconds="1204061475" serial="350"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23791 comm="gconfd-2" name="linc-5cef-0-6ee0858ea8d43" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="691" seconds="1204061475" serial="350"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffcc840 a2=382e8c a3=b80a76d8 items=0 ppid=1 pid=23791 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="691" seconds="1204061475" serial="350"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>566ad6e5-239c-41bb-8d95-202c03342ae9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cef-0-6ee0858ea8d43</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cef-0-6ee0858ea8d43'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cef-0-6ee0858ea8d43). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cef-0-6ee0858ea8d43). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cef-0-6ee0858ea8d43</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="802" seconds="1204061475" serial="351"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23794 comm="gconfd-2" name="linc-5cf2-0-500b168dc4049" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="802" seconds="1204061475" serial="351"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcdd560 a2=382e8c a3=b80ba6d8 items=0 ppid=1 pid=23794 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="802" seconds="1204061475" serial="351"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>4c6b0ac2-815c-4836-8631-3f53210028a0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cf2-0-500b168dc4049</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cf2-0-500b168dc4049'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cf2-0-500b168dc4049). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cf2-0-500b168dc4049). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cf2-0-500b168dc4049</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="859" seconds="1204061475" serial="352"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23799 comm="gconfd-2" name="linc-5cf7-0-3d395655d1cd4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="859" seconds="1204061475" serial="352"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9b3a30 a2=382e8c a3=b80916d8 items=0 ppid=1 pid=23799 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="859" seconds="1204061475" serial="352"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>b65d75c1-8406-4bd8-a79b-4313703387a7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cf7-0-3d395655d1cd4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cf7-0-3d395655d1cd4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cf7-0-3d395655d1cd4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cf7-0-3d395655d1cd4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cf7-0-3d395655d1cd4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="976" seconds="1204061475" serial="353"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23803 comm="gconfd-2" name="linc-5cfb-0-54fb2263ee67b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="976" seconds="1204061475" serial="353"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc414c0 a2=382e8c a3=b801c6d8 items=0 ppid=1 pid=23803 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="976" seconds="1204061475" serial="353"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:15Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:15Z</last_seen_date> > <local_id>d4c702f0-00a3-4f77-944d-57fa3f1aedfb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cfb-0-54fb2263ee67b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cfb-0-54fb2263ee67b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cfb-0-54fb2263ee67b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cfb-0-54fb2263ee67b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cfb-0-54fb2263ee67b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="46" seconds="1204061476" serial="354"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23807 comm="gconfd-2" name="linc-5cff-0-25c5f651b4a2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="46" seconds="1204061476" serial="354"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea7720 a2=382e8c a3=b7f846d8 items=0 ppid=1 pid=23807 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="46" seconds="1204061476" serial="354"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>615672fa-ea03-4bc8-ada8-fccb6fe55ded</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cff-0-25c5f651b4a2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5cff-0-25c5f651b4a2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5cff-0-25c5f651b4a2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5cff-0-25c5f651b4a2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5cff-0-25c5f651b4a2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="170" seconds="1204061476" serial="355"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23811 comm="gconfd-2" name="linc-5d03-0-6b4711cd2991f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="170" seconds="1204061476" serial="355"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb1cb90 a2=382e8c a3=b7ff86d8 items=0 ppid=1 pid=23811 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="170" seconds="1204061476" serial="355"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>26fa5cf3-342a-4a96-8886-e3b92a939e0b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d03-0-6b4711cd2991f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d03-0-6b4711cd2991f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d03-0-6b4711cd2991f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d03-0-6b4711cd2991f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d03-0-6b4711cd2991f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="224" seconds="1204061476" serial="356"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23815 comm="gconfd-2" name="linc-5d07-0-4563ba6e36df2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="224" seconds="1204061476" serial="356"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb8e410 a2=382e8c a3=b80696d8 items=0 ppid=1 pid=23815 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="224" seconds="1204061476" serial="356"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>5bff55b4-204d-45b8-861c-4dd37dcf5cdf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d07-0-4563ba6e36df2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d07-0-4563ba6e36df2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d07-0-4563ba6e36df2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d07-0-4563ba6e36df2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d07-0-4563ba6e36df2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="361" seconds="1204061476" serial="357"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23819 comm="gconfd-2" name="linc-5d0b-0-3f15d37d58496" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="361" seconds="1204061476" serial="357"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8af8c0 a2=382e8c a3=b7f8d6d8 items=0 ppid=1 pid=23819 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="361" seconds="1204061476" serial="357"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>821ece00-d942-4e63-9ba1-97251ac0ff4e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d0b-0-3f15d37d58496</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d0b-0-3f15d37d58496'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d0b-0-3f15d37d58496). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d0b-0-3f15d37d58496). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d0b-0-3f15d37d58496</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="392" seconds="1204061476" serial="358"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23824 comm="gconfd-2" name="linc-5d10-0-5773e895fdce" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="392" seconds="1204061476" serial="358"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa68ae0 a2=382e8c a3=b80446d8 items=0 ppid=23823 pid=23824 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="392" seconds="1204061476" serial="358"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>e6355b51-3d43-4840-8b62-ca4c19ed8f6e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d10-0-5773e895fdce</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d10-0-5773e895fdce'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d10-0-5773e895fdce). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d10-0-5773e895fdce). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d10-0-5773e895fdce</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="537" seconds="1204061476" serial="359"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23827 comm="gconfd-2" name="linc-5d13-0-7dcd04f5831d6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="537" seconds="1204061476" serial="359"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7cd00 a2=382e8c a3=b7f5a6d8 items=0 ppid=1 pid=23827 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="537" seconds="1204061476" serial="359"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>5709c2c0-c63c-4c5d-ad6d-ebc5863cd672</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d13-0-7dcd04f5831d6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d13-0-7dcd04f5831d6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d13-0-7dcd04f5831d6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d13-0-7dcd04f5831d6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d13-0-7dcd04f5831d6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="583" seconds="1204061476" serial="360"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23831 comm="gconfd-2" name="linc-5d17-0-583d97b58e5f6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="583" seconds="1204061476" serial="360"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf87a8f0 a2=382e8c a3=b7f586d8 items=0 ppid=23830 pid=23831 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="583" seconds="1204061476" serial="360"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>1282fe7d-7ef0-4124-875c-7746b25c7fc6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d17-0-583d97b58e5f6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d17-0-583d97b58e5f6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d17-0-583d97b58e5f6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d17-0-583d97b58e5f6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d17-0-583d97b58e5f6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="674" seconds="1204061476" serial="361"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23833 comm="gconfd-2" name="linc-5d19-0-6d10b8c4a4bfe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="674" seconds="1204061476" serial="361"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcc0d40 a2=382e8c a3=b7f9e6d8 items=0 ppid=1 pid=23833 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="674" seconds="1204061476" serial="361"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>39a80f4c-876c-4352-a8c4-ed64b685dae6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d19-0-6d10b8c4a4bfe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d19-0-6d10b8c4a4bfe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d19-0-6d10b8c4a4bfe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d19-0-6d10b8c4a4bfe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d19-0-6d10b8c4a4bfe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="732" seconds="1204061476" serial="362"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23835 comm="gconfd-2" name="linc-5d1b-0-4cb40aab2e34" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="732" seconds="1204061476" serial="362"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffb4830 a2=382e8c a3=b80916d8 items=0 ppid=1 pid=23835 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="732" seconds="1204061476" serial="362"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>7c75bee6-f061-4b69-9c45-584c7db4c7a5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1b-0-4cb40aab2e34</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d1b-0-4cb40aab2e34'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d1b-0-4cb40aab2e34). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d1b-0-4cb40aab2e34). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1b-0-4cb40aab2e34</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="829" seconds="1204061476" serial="363"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23837 comm="gconfd-2" name="linc-5d1d-0-7e1cc9aeca808" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="829" seconds="1204061476" serial="363"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7dd00 a2=382e8c a3=b7f5b6d8 items=0 ppid=1 pid=23837 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="829" seconds="1204061476" serial="363"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>5984674d-798c-4822-9740-b27476033c0a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1d-0-7e1cc9aeca808</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d1d-0-7e1cc9aeca808'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d1d-0-7e1cc9aeca808). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d1d-0-7e1cc9aeca808). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1d-0-7e1cc9aeca808</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="878" seconds="1204061476" serial="364"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23839 comm="gconfd-2" name="linc-5d1f-0-1618f0c5d6773" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="878" seconds="1204061476" serial="364"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd455c0 a2=382e8c a3=b80226d8 items=0 ppid=23838 pid=23839 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="878" seconds="1204061476" serial="364"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>2f9142cb-546e-47a7-a767-bbb0038bf925</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1f-0-1618f0c5d6773</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d1f-0-1618f0c5d6773'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d1f-0-1618f0c5d6773). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d1f-0-1618f0c5d6773). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d1f-0-1618f0c5d6773</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="972" seconds="1204061476" serial="365"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23841 comm="gconfd-2" name="linc-5d21-0-56eeb226ed718" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="972" seconds="1204061476" serial="365"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff01780 a2=382e8c a3=b7fdc6d8 items=0 ppid=1 pid=23841 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="972" seconds="1204061476" serial="365"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:16Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:16Z</last_seen_date> > <local_id>b43073a7-7c21-4449-b06b-c53d4c115af8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d21-0-56eeb226ed718</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d21-0-56eeb226ed718'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d21-0-56eeb226ed718). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d21-0-56eeb226ed718). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d21-0-56eeb226ed718</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="39" seconds="1204061477" serial="366"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23843 comm="gconfd-2" name="linc-5d23-0-18715909a8e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="39" seconds="1204061477" serial="366"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa0ca90 a2=382e8c a3=b7eea6d8 items=0 ppid=1 pid=23843 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="39" seconds="1204061477" serial="366"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>7ce6f899-ec43-4a2c-90ec-68e26b9b19f7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d23-0-18715909a8e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d23-0-18715909a8e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d23-0-18715909a8e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d23-0-18715909a8e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d23-0-18715909a8e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="129" seconds="1204061477" serial="367"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23845 comm="gconfd-2" name="linc-5d25-0-5693a6d71f970" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="129" seconds="1204061477" serial="367"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfedff60 a2=382e8c a3=b7fbb6d8 items=0 ppid=1 pid=23845 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="129" seconds="1204061477" serial="367"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>8be5c8ec-da4b-468e-b1ea-ef91eb0308cb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d25-0-5693a6d71f970</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d25-0-5693a6d71f970'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d25-0-5693a6d71f970). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d25-0-5693a6d71f970). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d25-0-5693a6d71f970</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="209" seconds="1204061477" serial="368"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23847 comm="gconfd-2" name="linc-5d27-0-308ac0b3327c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="209" seconds="1204061477" serial="368"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd2fdb0 a2=382e8c a3=b7f0b6d8 items=0 ppid=1 pid=23847 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="209" seconds="1204061477" serial="368"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>47c9ed43-b721-4ae3-a7e6-24af4d9eb65f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d27-0-308ac0b3327c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d27-0-308ac0b3327c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d27-0-308ac0b3327c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d27-0-308ac0b3327c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d27-0-308ac0b3327c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="278" seconds="1204061477" serial="369"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23849 comm="gconfd-2" name="linc-5d29-0-6b08d4cd43e56" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="278" seconds="1204061477" serial="369"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbb4c30 a2=382e8c a3=b7f926d8 items=0 ppid=1 pid=23849 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="278" seconds="1204061477" serial="369"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>a634a2bb-0e84-4118-9aa2-c145b5e0094d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d29-0-6b08d4cd43e56</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d29-0-6b08d4cd43e56'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d29-0-6b08d4cd43e56). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d29-0-6b08d4cd43e56). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d29-0-6b08d4cd43e56</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="352" seconds="1204061477" serial="370"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23851 comm="gconfd-2" name="linc-5d2b-0-4ee9c66b561e1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="352" seconds="1204061477" serial="370"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ef970 a2=382e8c a3=b7fcd6d8 items=0 ppid=1 pid=23851 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="352" seconds="1204061477" serial="370"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>b611a4c7-428f-4b08-aad4-8ced1be69068</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2b-0-4ee9c66b561e1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d2b-0-4ee9c66b561e1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d2b-0-4ee9c66b561e1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d2b-0-4ee9c66b561e1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2b-0-4ee9c66b561e1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="410" seconds="1204061477" serial="371"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23853 comm="gconfd-2" name="linc-5d2d-0-17c94cc0641ac" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="410" seconds="1204061477" serial="371"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc8840 a2=382e8c a3=b80a56d8 items=0 ppid=1 pid=23853 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="410" seconds="1204061477" serial="371"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>89843e02-6234-4249-bffe-dcda76cf0709</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2d-0-17c94cc0641ac</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d2d-0-17c94cc0641ac'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d2d-0-17c94cc0641ac). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d2d-0-17c94cc0641ac). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2d-0-17c94cc0641ac</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="486" seconds="1204061477" serial="372"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23855 comm="gconfd-2" name="linc-5d2f-0-566a291576c75" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="486" seconds="1204061477" serial="372"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8e2090 a2=382e8c a3=b7fbe6d8 items=0 ppid=1 pid=23855 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="486" seconds="1204061477" serial="372"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>3af0290a-4563-4713-9cc2-e023bd8e2c86</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2f-0-566a291576c75</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d2f-0-566a291576c75'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d2f-0-566a291576c75). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d2f-0-566a291576c75). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d2f-0-566a291576c75</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="558" seconds="1204061477" serial="373"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23857 comm="gconfd-2" name="linc-5d31-0-12258ccd8852e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="558" seconds="1204061477" serial="373"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd34db0 a2=382e8c a3=b7f126d8 items=0 ppid=1 pid=23857 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="558" seconds="1204061477" serial="373"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>06e47d3b-b11b-41d2-9071-e6661be7cb2e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d31-0-12258ccd8852e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d31-0-12258ccd8852e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d31-0-12258ccd8852e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d31-0-12258ccd8852e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d31-0-12258ccd8852e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="655" seconds="1204061477" serial="374"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23859 comm="gconfd-2" name="linc-5d33-0-5aee5e40a00b5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="655" seconds="1204061477" serial="374"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffbf840 a2=382e8c a3=b7f9a6d8 items=0 ppid=1 pid=23859 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="655" seconds="1204061477" serial="374"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>f97874ac-855e-4443-aa31-1e77acd82467</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d33-0-5aee5e40a00b5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d33-0-5aee5e40a00b5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d33-0-5aee5e40a00b5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d33-0-5aee5e40a00b5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d33-0-5aee5e40a00b5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="716" seconds="1204061477" serial="375"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23862 comm="gconfd-2" name="linc-5d36-0-6746ea2aedf9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="716" seconds="1204061477" serial="375"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8570d0 a2=382e8c a3=b80346d8 items=0 ppid=1 pid=23862 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="716" seconds="1204061477" serial="375"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>74f84468-3340-44e9-a8f4-592d6feec492</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d36-0-6746ea2aedf9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d36-0-6746ea2aedf9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d36-0-6746ea2aedf9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d36-0-6746ea2aedf9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d36-0-6746ea2aedf9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="793" seconds="1204061477" serial="376"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23863 comm="gconfd-2" name="linc-5d37-0-227001ddc1ca8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="793" seconds="1204061477" serial="376"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd57dd0 a2=382e8c a3=b7f336d8 items=0 ppid=1 pid=23863 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="793" seconds="1204061477" serial="376"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>8ae4fef0-a2d9-4828-bbe2-88690729ab96</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d37-0-227001ddc1ca8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d37-0-227001ddc1ca8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d37-0-227001ddc1ca8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d37-0-227001ddc1ca8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d37-0-227001ddc1ca8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="838" seconds="1204061477" serial="377"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23865 comm="gconfd-2" name="linc-5d39-0-81e0e7dccb88" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="838" seconds="1204061477" serial="377"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa4c370 a2=382e8c a3=b7f296d8 items=0 ppid=1 pid=23865 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="838" seconds="1204061477" serial="377"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>b4b5e1c9-4626-4962-bc8a-ca38795981e4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d39-0-81e0e7dccb88</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d39-0-81e0e7dccb88'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d39-0-81e0e7dccb88). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d39-0-81e0e7dccb88). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d39-0-81e0e7dccb88</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="874" seconds="1204061477" serial="378"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23867 comm="gconfd-2" name="linc-5d3b-0-52dc155ad5766" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="874" seconds="1204061477" serial="378"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc07c80 a2=382e8c a3=b7fe36d8 items=0 ppid=1 pid=23867 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="874" seconds="1204061477" serial="378"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>74439ded-b1b5-490c-9ceb-3fa22d856cb6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3b-0-52dc155ad5766</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d3b-0-52dc155ad5766'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d3b-0-52dc155ad5766). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d3b-0-52dc155ad5766). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3b-0-52dc155ad5766</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="895" seconds="1204061477" serial="379"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23869 comm="gconfd-2" name="linc-5d3d-0-740807f5daa8f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="895" seconds="1204061477" serial="379"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdaa620 a2=382e8c a3=b80856d8 items=0 ppid=1 pid=23869 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="895" seconds="1204061477" serial="379"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>e49fab01-9804-4c17-b1eb-3f5a5535756b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3d-0-740807f5daa8f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d3d-0-740807f5daa8f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d3d-0-740807f5daa8f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d3d-0-740807f5daa8f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3d-0-740807f5daa8f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="998" seconds="1204061477" serial="380"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23873 comm="gconfd-2" name="linc-5d41-0-2b4005fbf3bcf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="998" seconds="1204061477" serial="380"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd0e50 a2=382e8c a3=b80ac6d8 items=0 ppid=1 pid=23873 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="998" seconds="1204061477" serial="380"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:17Z</last_seen_date> > <local_id>3ca78190-8529-41ee-991c-d4fcf85deb45</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d41-0-2b4005fbf3bcf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d41-0-2b4005fbf3bcf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d41-0-2b4005fbf3bcf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d41-0-2b4005fbf3bcf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d41-0-2b4005fbf3bcf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="0" seconds="1204061478" serial="381"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23871 comm="gconfd-2" name="linc-5d3f-0-6000d1bb8c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="0" seconds="1204061478" serial="381"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb1eba0 a2=382e8c a3=b7ffa6d8 items=0 ppid=1 pid=23871 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="0" seconds="1204061478" serial="381"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>7c53403d-e7c5-4b33-b5a7-b836f541e54d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3f-0-6000d1bb8c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d3f-0-6000d1bb8c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d3f-0-6000d1bb8c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d3f-0-6000d1bb8c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d3f-0-6000d1bb8c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="55" seconds="1204061478" serial="382"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23875 comm="gconfd-2" name="linc-5d43-0-4aee9bccd6be" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="55" seconds="1204061478" serial="382"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc1b340 a2=382e8c a3=b7ef86d8 items=0 ppid=1 pid=23875 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="55" seconds="1204061478" serial="382"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>4e4b1753-bfa2-4b7f-97a0-6c78cc8b83bd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d43-0-4aee9bccd6be</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d43-0-4aee9bccd6be'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d43-0-4aee9bccd6be). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d43-0-4aee9bccd6be). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d43-0-4aee9bccd6be</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="122" seconds="1204061478" serial="383"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23877 comm="gconfd-2" name="linc-5d45-0-b74f1931dc5a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="122" seconds="1204061478" serial="383"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff45fc0 a2=382e8c a3=b80216d8 items=0 ppid=1 pid=23877 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="122" seconds="1204061478" serial="383"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>de22e60d-e4b8-40a1-8306-b9ae010031c5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d45-0-b74f1931dc5a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d45-0-b74f1931dc5a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d45-0-b74f1931dc5a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d45-0-b74f1931dc5a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d45-0-b74f1931dc5a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="276" seconds="1204061478" serial="384"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23879 comm="gconfd-2" name="linc-5d47-0-15c3ced143742" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="276" seconds="1204061478" serial="384"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffe5860 a2=382e8c a3=b7fc26d8 items=0 ppid=23878 pid=23879 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="276" seconds="1204061478" serial="384"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>2cf193e9-910c-4779-967a-7117e73d966e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d47-0-15c3ced143742</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d47-0-15c3ced143742'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d47-0-15c3ced143742). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d47-0-15c3ced143742). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d47-0-15c3ced143742</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="350" seconds="1204061478" serial="385"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23881 comm="gconfd-2" name="linc-5d49-0-90849115596f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="350" seconds="1204061478" serial="385"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc4e4d0 a2=382e8c a3=b802b6d8 items=0 ppid=1 pid=23881 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="350" seconds="1204061478" serial="385"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>2a78d599-068a-4b86-8c1b-4d3eaff65ae3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d49-0-90849115596f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d49-0-90849115596f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d49-0-90849115596f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d49-0-90849115596f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d49-0-90849115596f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="417" seconds="1204061478" serial="386"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23883 comm="gconfd-2" name="linc-5d4b-0-402bad7965f06" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="417" seconds="1204061478" serial="386"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd82600 a2=382e8c a3=b805d6d8 items=0 ppid=23882 pid=23883 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="417" seconds="1204061478" serial="386"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>12979eaf-06f1-4c50-bc1a-571f4ed75743</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4b-0-402bad7965f06</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d4b-0-402bad7965f06'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d4b-0-402bad7965f06). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d4b-0-402bad7965f06). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4b-0-402bad7965f06</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="513" seconds="1204061478" serial="387"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23885 comm="gconfd-2" name="linc-5d4d-0-375af117d719" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="513" seconds="1204061478" serial="387"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdc90a0 a2=382e8c a3=b80a46d8 items=0 ppid=1 pid=23885 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="513" seconds="1204061478" serial="387"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>e0c02cf6-9c12-499b-ab71-46e8fa55a55b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4d-0-375af117d719</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d4d-0-375af117d719'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d4d-0-375af117d719). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d4d-0-375af117d719). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4d-0-375af117d719</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="562" seconds="1204061478" serial="388"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23887 comm="gconfd-2" name="linc-5d4f-0-60ae75a1895e6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="562" seconds="1204061478" serial="388"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaafb30 a2=382e8c a3=b808b6d8 items=0 ppid=23886 pid=23887 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="562" seconds="1204061478" serial="388"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>f05eff68-1aee-43e5-a4a9-f43c763835f6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4f-0-60ae75a1895e6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d4f-0-60ae75a1895e6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d4f-0-60ae75a1895e6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d4f-0-60ae75a1895e6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d4f-0-60ae75a1895e6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="627" seconds="1204061478" serial="389"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23889 comm="gconfd-2" name="linc-5d51-0-7d4329139945d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="627" seconds="1204061478" serial="389"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb0e10 a2=382e8c a3=b7f8e6d8 items=0 ppid=1 pid=23889 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="627" seconds="1204061478" serial="389"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>f0873102-8165-45f0-b413-0cffc9951330</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d51-0-7d4329139945d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d51-0-7d4329139945d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d51-0-7d4329139945d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d51-0-7d4329139945d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d51-0-7d4329139945d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="680" seconds="1204061478" serial="390"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23891 comm="gconfd-2" name="linc-5d53-0-a37a225a6276" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="680" seconds="1204061478" serial="390"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfebcf30 a2=382e8c a3=b80986d8 items=0 ppid=1 pid=23891 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="680" seconds="1204061478" serial="390"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>6a95ac3a-99ff-4f8e-9c0d-aafce47277df</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d53-0-a37a225a6276</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d53-0-a37a225a6276'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d53-0-a37a225a6276). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d53-0-a37a225a6276). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d53-0-a37a225a6276</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="783" seconds="1204061478" serial="391"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23893 comm="gconfd-2" name="linc-5d55-0-7890479abf3ae" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="783" seconds="1204061478" serial="391"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff7a820 a2=382e8c a3=b80566d8 items=0 ppid=1 pid=23893 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="783" seconds="1204061478" serial="391"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>e1b994ba-0899-465a-a26a-be26f4928082</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d55-0-7890479abf3ae</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d55-0-7890479abf3ae'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d55-0-7890479abf3ae). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d55-0-7890479abf3ae). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d55-0-7890479abf3ae</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="833" seconds="1204061478" serial="392"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23895 comm="gconfd-2" name="linc-5d57-0-383278bcb87d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="833" seconds="1204061478" serial="392"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd7b5f0 a2=382e8c a3=b7f566d8 items=0 ppid=23894 pid=23895 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="833" seconds="1204061478" serial="392"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>139c6c10-a1c2-4099-8a73-dc3d5bfeb03b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d57-0-383278bcb87d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d57-0-383278bcb87d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d57-0-383278bcb87d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d57-0-383278bcb87d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d57-0-383278bcb87d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="950" seconds="1204061478" serial="393"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23897 comm="gconfd-2" name="linc-5d59-0-5ff255ce7ea2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="950" seconds="1204061478" serial="393"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb4c30 a2=382e8c a3=b80916d8 items=0 ppid=1 pid=23897 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="950" seconds="1204061478" serial="393"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>a289cbfe-7697-430d-a389-2733a1c1fd82</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d59-0-5ff255ce7ea2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d59-0-5ff255ce7ea2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d59-0-5ff255ce7ea2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d59-0-5ff255ce7ea2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d59-0-5ff255ce7ea2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="988" seconds="1204061478" serial="394"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23899 comm="gconfd-2" name="linc-5d5b-0-1eb00d20f15c2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="988" seconds="1204061478" serial="394"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfffa870 a2=382e8c a3=b7fd76d8 items=0 ppid=23898 pid=23899 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="988" seconds="1204061478" serial="394"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:18Z</last_seen_date> > <local_id>7c60cb7a-955d-4f24-aa9b-2eb85a4f4ea8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5b-0-1eb00d20f15c2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d5b-0-1eb00d20f15c2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d5b-0-1eb00d20f15c2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d5b-0-1eb00d20f15c2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5b-0-1eb00d20f15c2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="90" seconds="1204061479" serial="395"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23901 comm="gconfd-2" name="linc-5d5d-0-18e9cf29161a3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="90" seconds="1204061479" serial="395"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8730f0 a2=382e8c a3=b80506d8 items=0 ppid=1 pid=23901 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="90" seconds="1204061479" serial="395"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>23b18c89-08a9-45c6-a736-f975f5661e55</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5d-0-18e9cf29161a3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d5d-0-18e9cf29161a3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d5d-0-18e9cf29161a3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d5d-0-18e9cf29161a3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5d-0-18e9cf29161a3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="135" seconds="1204061479" serial="396"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23903 comm="gconfd-2" name="linc-5d5f-0-6ed7b5a321211" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="135" seconds="1204061479" serial="396"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea5f20 a2=382e8c a3=b80816d8 items=0 ppid=1 pid=23903 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="135" seconds="1204061479" serial="396"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>cef813ff-989e-47f3-8ef4-54527fbb52e4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5f-0-6ed7b5a321211</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d5f-0-6ed7b5a321211'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d5f-0-6ed7b5a321211). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d5f-0-6ed7b5a321211). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d5f-0-6ed7b5a321211</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="214" seconds="1204061479" serial="397"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23905 comm="gconfd-2" name="linc-5d61-0-f9b02dc34771" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="214" seconds="1204061479" serial="397"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9fa270 a2=382e8c a3=b7fd56d8 items=0 ppid=1 pid=23905 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="214" seconds="1204061479" serial="397"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>a947ae20-d006-49a9-9b7b-1110fb6dc91a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d61-0-f9b02dc34771</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d61-0-f9b02dc34771'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d61-0-f9b02dc34771). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d61-0-f9b02dc34771). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d61-0-f9b02dc34771</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="272" seconds="1204061479" serial="398"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23907 comm="gconfd-2" name="linc-5d63-0-526c0698427dd" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="272" seconds="1204061479" serial="398"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb25ba0 a2=382e8c a3=b7f036d8 items=0 ppid=1 pid=23907 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="272" seconds="1204061479" serial="398"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>df2441fd-0eb5-4a2b-b7cf-07919d1883fe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d63-0-526c0698427dd</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d63-0-526c0698427dd'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d63-0-526c0698427dd). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d63-0-526c0698427dd). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d63-0-526c0698427dd</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="401" seconds="1204061479" serial="399"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23909 comm="gconfd-2" name="linc-5d65-0-7006caa461e22" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="401" seconds="1204061479" serial="399"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfece750 a2=382e8c a3=b80ab6d8 items=0 ppid=1 pid=23909 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="401" seconds="1204061479" serial="399"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>cd27f333-1d70-4f20-977e-8627181d9594</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d65-0-7006caa461e22</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d65-0-7006caa461e22'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d65-0-7006caa461e22). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d65-0-7006caa461e22). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d65-0-7006caa461e22</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="460" seconds="1204061479" serial="400"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23911 comm="gconfd-2" name="linc-5d67-0-14414d5a7069e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="460" seconds="1204061479" serial="400"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff07780 a2=382e8c a3=b7fe46d8 items=0 ppid=1 pid=23911 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="460" seconds="1204061479" serial="400"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>9ba8c12a-df40-482a-a0c4-fa8dd23c76f1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d67-0-14414d5a7069e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d67-0-14414d5a7069e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d67-0-14414d5a7069e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d67-0-14414d5a7069e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d67-0-14414d5a7069e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="578" seconds="1204061479" serial="401"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23913 comm="gconfd-2" name="linc-5d69-0-681485ca8d243" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="578" seconds="1204061479" serial="401"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff3dfc0 a2=382e8c a3=b801b6d8 items=0 ppid=1 pid=23913 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="578" seconds="1204061479" serial="401"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>c7880318-df21-4807-abfe-e59636213c81</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d69-0-681485ca8d243</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d69-0-681485ca8d243'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d69-0-681485ca8d243). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d69-0-681485ca8d243). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d69-0-681485ca8d243</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="611" seconds="1204061479" serial="402"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23917 comm="gconfd-2" name="linc-5d6d-0-3d6c3bba953a4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="611" seconds="1204061479" serial="402"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa622e0 a2=382e8c a3=b803f6d8 items=0 ppid=1 pid=23917 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="611" seconds="1204061479" serial="402"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>d05e9fce-fa94-4ef8-9a57-c7c7071d7807</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d6d-0-3d6c3bba953a4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d6d-0-3d6c3bba953a4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d6d-0-3d6c3bba953a4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d6d-0-3d6c3bba953a4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d6d-0-3d6c3bba953a4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="683" seconds="1204061479" serial="403"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23919 comm="gconfd-2" name="linc-5d6f-0-1a198701a6de8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="683" seconds="1204061479" serial="403"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfab6b30 a2=382e8c a3=b7f926d8 items=0 ppid=1 pid=23919 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="683" seconds="1204061479" serial="403"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>f3c69aa1-9fac-4242-ad17-ef6d4084be52</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d6f-0-1a198701a6de8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d6f-0-1a198701a6de8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d6f-0-1a198701a6de8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d6f-0-1a198701a6de8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d6f-0-1a198701a6de8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="735" seconds="1204061479" serial="404"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23921 comm="gconfd-2" name="linc-5d71-0-236ed25ab386c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="735" seconds="1204061479" serial="404"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfef4f70 a2=382e8c a3=b80d06d8 items=0 ppid=1 pid=23921 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="735" seconds="1204061479" serial="404"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>6a57db5d-64e2-4457-8ca6-82781271c935</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d71-0-236ed25ab386c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d71-0-236ed25ab386c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d71-0-236ed25ab386c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d71-0-236ed25ab386c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d71-0-236ed25ab386c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="804" seconds="1204061479" serial="405"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23923 comm="gconfd-2" name="linc-5d73-0-68f3ee97c46f3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="804" seconds="1204061479" serial="405"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9e4a60 a2=382e8c a3=b80c06d8 items=0 ppid=1 pid=23923 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="804" seconds="1204061479" serial="405"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>26696e1f-b5d2-4624-ae58-4cd38a07744c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d73-0-68f3ee97c46f3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d73-0-68f3ee97c46f3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d73-0-68f3ee97c46f3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d73-0-68f3ee97c46f3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d73-0-68f3ee97c46f3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="860" seconds="1204061479" serial="406"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23925 comm="gconfd-2" name="linc-5d75-0-65264817d20d2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="860" seconds="1204061479" serial="406"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa602e0 a2=382e8c a3=b7f3b6d8 items=0 ppid=1 pid=23925 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="860" seconds="1204061479" serial="406"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>105ea9c6-55b0-478b-a9af-f598140330e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d75-0-65264817d20d2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d75-0-65264817d20d2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d75-0-65264817d20d2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d75-0-65264817d20d2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d75-0-65264817d20d2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="916" seconds="1204061479" serial="407"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23927 comm="gconfd-2" name="linc-5d77-0-16e4a91fdfd17" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="916" seconds="1204061479" serial="407"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff9c820 a2=382e8c a3=b80796d8 items=0 ppid=1 pid=23927 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="916" seconds="1204061479" serial="407"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>398a7cd2-2dd7-4cab-a873-f50c5ae2b0f7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d77-0-16e4a91fdfd17</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d77-0-16e4a91fdfd17'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d77-0-16e4a91fdfd17). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d77-0-16e4a91fdfd17). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d77-0-16e4a91fdfd17</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="968" seconds="1204061479" serial="408"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23929 comm="gconfd-2" name="linc-5d79-0-4747c0d5ec799" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="968" seconds="1204061479" serial="408"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcac520 a2=382e8c a3=b80876d8 items=0 ppid=1 pid=23929 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="968" seconds="1204061479" serial="408"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:19Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:19Z</last_seen_date> > <local_id>05d4df3d-d697-404f-ba39-d3232ec3f908</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d79-0-4747c0d5ec799</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d79-0-4747c0d5ec799'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d79-0-4747c0d5ec799). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d79-0-4747c0d5ec799). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d79-0-4747c0d5ec799</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="35" seconds="1204061480" serial="409"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23931 comm="gconfd-2" name="linc-5d7b-0-248f6948ad1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="35" seconds="1204061480" serial="409"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdaf630 a2=382e8c a3=b7f8a6d8 items=0 ppid=1 pid=23931 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="35" seconds="1204061480" serial="409"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>77e859d9-3f65-4742-bcb0-c931ced3a38a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7b-0-248f6948ad1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d7b-0-248f6948ad1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d7b-0-248f6948ad1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d7b-0-248f6948ad1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7b-0-248f6948ad1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="85" seconds="1204061480" serial="410"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23933 comm="gconfd-2" name="linc-5d7d-0-6c8b8d1714cbe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="85" seconds="1204061480" serial="410"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9d3a50 a2=382e8c a3=b80af6d8 items=0 ppid=23932 pid=23933 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="85" seconds="1204061480" serial="410"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>7c021c48-b840-4eab-8ad8-9c6ca8d7c2b2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7d-0-6c8b8d1714cbe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d7d-0-6c8b8d1714cbe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d7d-0-6c8b8d1714cbe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d7d-0-6c8b8d1714cbe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7d-0-6c8b8d1714cbe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="156" seconds="1204061480" serial="411"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23935 comm="gconfd-2" name="linc-5d7f-0-7c62ca32632f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="156" seconds="1204061480" serial="411"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf82c0b0 a2=382e8c a3=b80096d8 items=0 ppid=1 pid=23935 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="156" seconds="1204061480" serial="411"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>79db79da-1359-4aeb-abff-4263427d5465</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7f-0-7c62ca32632f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d7f-0-7c62ca32632f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d7f-0-7c62ca32632f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d7f-0-7c62ca32632f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d7f-0-7c62ca32632f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="206" seconds="1204061480" serial="412"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23937 comm="gconfd-2" name="linc-5d81-0-5eb5d8ff3272b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="206" seconds="1204061480" serial="412"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfad9350 a2=382e8c a3=b80b66d8 items=0 ppid=1 pid=23937 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="206" seconds="1204061480" serial="412"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>844872b4-cf1e-460f-83d7-ff1765cbdde4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d81-0-5eb5d8ff3272b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d81-0-5eb5d8ff3272b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d81-0-5eb5d8ff3272b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d81-0-5eb5d8ff3272b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d81-0-5eb5d8ff3272b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="265" seconds="1204061480" serial="413"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23939 comm="gconfd-2" name="linc-5d83-0-542ca3b940e4a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="265" seconds="1204061480" serial="413"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe1b690 a2=382e8c a3=b7ef86d8 items=0 ppid=1 pid=23939 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="265" seconds="1204061480" serial="413"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>1f4a0594-a8ff-4ee5-99c8-8ad516c16109</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d83-0-542ca3b940e4a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d83-0-542ca3b940e4a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d83-0-542ca3b940e4a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d83-0-542ca3b940e4a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d83-0-542ca3b940e4a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="319" seconds="1204061480" serial="414"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23941 comm="gconfd-2" name="linc-5d85-0-2daada5b4e0d1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="319" seconds="1204061480" serial="414"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb7d400 a2=382e8c a3=b7f5a6d8 items=0 ppid=1 pid=23941 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="319" seconds="1204061480" serial="414"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>fd3c06b0-430d-4afa-874b-004535622601</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d85-0-2daada5b4e0d1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d85-0-2daada5b4e0d1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d85-0-2daada5b4e0d1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d85-0-2daada5b4e0d1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d85-0-2daada5b4e0d1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="389" seconds="1204061480" serial="415"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23943 comm="gconfd-2" name="linc-5d87-0-10f6ceb35f1af" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="389" seconds="1204061480" serial="415"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8c4140 a2=382e8c a3=b7f9f6d8 items=0 ppid=1 pid=23943 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="389" seconds="1204061480" serial="415"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>e91fd43f-8df9-42ae-8f92-6ce02209b528</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d87-0-10f6ceb35f1af</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d87-0-10f6ceb35f1af'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d87-0-10f6ceb35f1af). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d87-0-10f6ceb35f1af). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d87-0-10f6ceb35f1af</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="434" seconds="1204061480" serial="416"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23945 comm="gconfd-2" name="linc-5d89-0-d0bcee86a152" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="434" seconds="1204061480" serial="416"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf989a00 a2=382e8c a3=b80676d8 items=0 ppid=1 pid=23945 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="434" seconds="1204061480" serial="416"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>d20f9697-fee2-42ca-bacd-ba82392471b6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d89-0-d0bcee86a152</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d89-0-d0bcee86a152'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d89-0-d0bcee86a152). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d89-0-d0bcee86a152). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d89-0-d0bcee86a152</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="501" seconds="1204061480" serial="417"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23947 comm="gconfd-2" name="linc-5d8b-0-587497137a846" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="501" seconds="1204061480" serial="417"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc4c4c0 a2=382e8c a3=b7f276d8 items=0 ppid=1 pid=23947 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="501" seconds="1204061480" serial="417"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>7c239821-e025-465f-8b39-4ea113683844</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8b-0-587497137a846</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d8b-0-587497137a846'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d8b-0-587497137a846). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d8b-0-587497137a846). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8b-0-587497137a846</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="554" seconds="1204061480" serial="418"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23949 comm="gconfd-2" name="linc-5d8d-0-6c35c3e187755" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="554" seconds="1204061480" serial="418"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa8f310 a2=382e8c a3=b806c6d8 items=0 ppid=1 pid=23949 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="554" seconds="1204061480" serial="418"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>7cdcdac0-5981-425d-99ec-f05e957a5abf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8d-0-6c35c3e187755</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d8d-0-6c35c3e187755'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d8d-0-6c35c3e187755). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d8d-0-6c35c3e187755). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8d-0-6c35c3e187755</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="615" seconds="1204061480" serial="419"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23951 comm="gconfd-2" name="linc-5d8f-0-68b6472b96362" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="615" seconds="1204061480" serial="419"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb88c00 a2=382e8c a3=b7f646d8 items=0 ppid=1 pid=23951 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="615" seconds="1204061480" serial="419"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>732a11ce-401b-4d87-9c61-729710d56558</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8f-0-68b6472b96362</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d8f-0-68b6472b96362'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d8f-0-68b6472b96362). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d8f-0-68b6472b96362). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d8f-0-68b6472b96362</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="669" seconds="1204061480" serial="420"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23953 comm="gconfd-2" name="linc-5d91-0-be0b943a3650" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061480" serial="420"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf983a00 a2=382e8c a3=b80616d8 items=0 ppid=1 pid=23953 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061480" serial="420"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>c8bde09c-0f69-46c0-8da0-807f7b2a5260</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d91-0-be0b943a3650</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d91-0-be0b943a3650'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d91-0-be0b943a3650). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d91-0-be0b943a3650). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d91-0-be0b943a3650</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="733" seconds="1204061480" serial="421"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23955 comm="gconfd-2" name="linc-5d93-0-e06f671b3251" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="733" seconds="1204061480" serial="421"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9baa30 a2=382e8c a3=b80966d8 items=0 ppid=1 pid=23955 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="733" seconds="1204061480" serial="421"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>205bdbdc-fda6-4a8a-ab64-2de35acc04fb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d93-0-e06f671b3251</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d93-0-e06f671b3251'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d93-0-e06f671b3251). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d93-0-e06f671b3251). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d93-0-e06f671b3251</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="781" seconds="1204061480" serial="422"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23957 comm="gconfd-2" name="linc-5d95-0-6a72a199beb98" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="781" seconds="1204061480" serial="422"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf981a00 a2=382e8c a3=b7f5f6d8 items=0 ppid=1 pid=23957 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="781" seconds="1204061480" serial="422"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>115fdfb0-ce44-4e0a-9f74-1dee5431bd9b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d95-0-6a72a199beb98</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d95-0-6a72a199beb98'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d95-0-6a72a199beb98). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d95-0-6a72a199beb98). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d95-0-6a72a199beb98</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="848" seconds="1204061480" serial="423"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23959 comm="gconfd-2" name="linc-5d97-0-5652e74ecf259" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="848" seconds="1204061480" serial="423"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf805880 a2=382e8c a3=b7fe26d8 items=0 ppid=1 pid=23959 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="848" seconds="1204061480" serial="423"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>3bab3121-01ed-4e70-ba36-6665935adaf7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d97-0-5652e74ecf259</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d97-0-5652e74ecf259'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d97-0-5652e74ecf259). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d97-0-5652e74ecf259). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d97-0-5652e74ecf259</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="903" seconds="1204061480" serial="424"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23961 comm="gconfd-2" name="linc-5d99-0-58f58535dc750" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="903" seconds="1204061480" serial="424"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa6faf0 a2=382e8c a3=b7f4b6d8 items=0 ppid=1 pid=23961 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="903" seconds="1204061480" serial="424"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>40361e57-49b7-410a-ab5c-19a59a21f5a5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d99-0-58f58535dc750</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d99-0-58f58535dc750'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d99-0-58f58535dc750). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d99-0-58f58535dc750). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d99-0-58f58535dc750</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="970" seconds="1204061480" serial="425"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23963 comm="gconfd-2" name="linc-5d9b-0-7060e0e6ecd39" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="970" seconds="1204061480" serial="425"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf982a00 a2=382e8c a3=b80606d8 items=0 ppid=1 pid=23963 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="970" seconds="1204061480" serial="425"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:20Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:20Z</last_seen_date> > <local_id>83724c42-1e17-4ce4-bc3e-e02a8cfe626e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9b-0-7060e0e6ecd39</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d9b-0-7060e0e6ecd39'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d9b-0-7060e0e6ecd39). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d9b-0-7060e0e6ecd39). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9b-0-7060e0e6ecd39</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="12" seconds="1204061481" serial="426"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23965 comm="gconfd-2" name="linc-5d9d-0-353ad9031ce" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="12" seconds="1204061481" serial="426"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb8730 a2=382e8c a3=b80936d8 items=0 ppid=1 pid=23965 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="12" seconds="1204061481" serial="426"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>f432aff9-e6fe-42b4-99fa-4b5f265541a8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9d-0-353ad9031ce</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d9d-0-353ad9031ce'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d9d-0-353ad9031ce). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d9d-0-353ad9031ce). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9d-0-353ad9031ce</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="83" seconds="1204061481" serial="427"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23967 comm="gconfd-2" name="linc-5d9f-0-642ead2914683" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="83" seconds="1204061481" serial="427"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa232a0 a2=382e8c a3=b80006d8 items=0 ppid=1 pid=23967 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="83" seconds="1204061481" serial="427"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>2f18e964-6e94-4d1d-a495-3ff6933110d2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9f-0-642ead2914683</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5d9f-0-642ead2914683'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5d9f-0-642ead2914683). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5d9f-0-642ead2914683). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5d9f-0-642ead2914683</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="133" seconds="1204061481" serial="428"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23969 comm="gconfd-2" name="linc-5da1-0-6e67ab6420744" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="133" seconds="1204061481" serial="428"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa13a90 a2=382e8c a3=b7ef16d8 items=0 ppid=23968 pid=23969 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="133" seconds="1204061481" serial="428"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>d567fe01-5c61-4a4d-acce-cfc719705687</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da1-0-6e67ab6420744</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5da1-0-6e67ab6420744'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5da1-0-6e67ab6420744). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5da1-0-6e67ab6420744). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da1-0-6e67ab6420744</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="201" seconds="1204061481" serial="429"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23971 comm="gconfd-2" name="linc-5da3-0-ebceaec3144c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="201" seconds="1204061481" serial="429"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff26ef0 a2=382e8c a3=b80036d8 items=0 ppid=1 pid=23971 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="201" seconds="1204061481" serial="429"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>c65951cd-9d2a-43a9-9492-dcb743691e26</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da3-0-ebceaec3144c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5da3-0-ebceaec3144c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5da3-0-ebceaec3144c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5da3-0-ebceaec3144c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da3-0-ebceaec3144c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="249" seconds="1204061481" serial="430"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23973 comm="gconfd-2" name="linc-5da5-0-7b5d47583cca5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="249" seconds="1204061481" serial="430"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96f930 a2=382e8c a3=b804b6d8 items=0 ppid=23972 pid=23973 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="249" seconds="1204061481" serial="430"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>8b357539-14dc-443d-b1f0-db97812baa24</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da5-0-7b5d47583cca5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5da5-0-7b5d47583cca5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5da5-0-7b5d47583cca5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5da5-0-7b5d47583cca5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da5-0-7b5d47583cca5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="316" seconds="1204061481" serial="431"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23975 comm="gconfd-2" name="linc-5da7-0-101bb3314d41c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061481" serial="431"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbfcc80 a2=382e8c a3=b7fda6d8 items=0 ppid=1 pid=23975 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061481" serial="431"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>3512bd42-5e65-4167-8f4b-05e0014c9b57</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da7-0-101bb3314d41c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5da7-0-101bb3314d41c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5da7-0-101bb3314d41c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5da7-0-101bb3314d41c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da7-0-101bb3314d41c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="361" seconds="1204061481" serial="432"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23977 comm="gconfd-2" name="linc-5da9-0-4873f3235840d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="361" seconds="1204061481" serial="432"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe24ea0 a2=382e8c a3=b7f006d8 items=0 ppid=1 pid=23977 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="361" seconds="1204061481" serial="432"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>e5321915-c8c3-402d-bfac-20353bd32aae</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da9-0-4873f3235840d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5da9-0-4873f3235840d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5da9-0-4873f3235840d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5da9-0-4873f3235840d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5da9-0-4873f3235840d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="428" seconds="1204061481" serial="433"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23979 comm="gconfd-2" name="linc-5dab-0-7bace9b3687d2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="428" seconds="1204061481" serial="433"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9d9250 a2=382e8c a3=b80b46d8 items=0 ppid=1 pid=23979 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="428" seconds="1204061481" serial="433"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>c62c6d51-0f3e-4dcd-8a04-ea735d463580</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dab-0-7bace9b3687d2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dab-0-7bace9b3687d2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dab-0-7bace9b3687d2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dab-0-7bace9b3687d2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dab-0-7bace9b3687d2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="494" seconds="1204061481" serial="434"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23981 comm="gconfd-2" name="linc-5dad-0-39d234b375b85" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="494" seconds="1204061481" serial="434"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd1650 a2=382e8c a3=b80ae6d8 items=0 ppid=1 pid=23981 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="494" seconds="1204061481" serial="434"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>f1e1fa43-f241-479d-9a7c-f12a3971e3b1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dad-0-39d234b375b85</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dad-0-39d234b375b85'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dad-0-39d234b375b85). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dad-0-39d234b375b85). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dad-0-39d234b375b85</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="557" seconds="1204061481" serial="435"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23983 comm="gconfd-2" name="linc-5daf-0-f89bc2787f7c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="557" seconds="1204061481" serial="435"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb04380 a2=382e8c a3=b7fe16d8 items=0 ppid=1 pid=23983 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="557" seconds="1204061481" serial="435"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>4c8dea56-048e-445b-9039-46903eaae7a4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5daf-0-f89bc2787f7c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5daf-0-f89bc2787f7c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5daf-0-f89bc2787f7c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5daf-0-f89bc2787f7c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5daf-0-f89bc2787f7c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="610" seconds="1204061481" serial="436"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23985 comm="gconfd-2" name="linc-5db1-0-13a3124e95063" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="610" seconds="1204061481" serial="436"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf6370 a2=382e8c a3=b7fd16d8 items=0 ppid=1 pid=23985 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="610" seconds="1204061481" serial="436"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>7be4fcad-37fa-46ed-ac32-17542d19322c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db1-0-13a3124e95063</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5db1-0-13a3124e95063'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5db1-0-13a3124e95063). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5db1-0-13a3124e95063). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db1-0-13a3124e95063</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="669" seconds="1204061481" serial="437"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23987 comm="gconfd-2" name="linc-5db3-0-1a8f0c70a384e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061481" serial="437"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc92d10 a2=382e8c a3=b7f706d8 items=0 ppid=1 pid=23987 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061481" serial="437"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>e2099bab-d7fa-472e-a0cc-2763a2c5b6f7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db3-0-1a8f0c70a384e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5db3-0-1a8f0c70a384e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5db3-0-1a8f0c70a384e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5db3-0-1a8f0c70a384e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db3-0-1a8f0c70a384e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="731" seconds="1204061481" serial="438"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23989 comm="gconfd-2" name="linc-5db5-0-1246ea6db0c82" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="731" seconds="1204061481" serial="438"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdb7630 a2=382e8c a3=b7f946d8 items=0 ppid=1 pid=23989 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="731" seconds="1204061481" serial="438"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>692df4cd-0fce-4dcb-9adf-88fca6597059</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db5-0-1246ea6db0c82</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5db5-0-1246ea6db0c82'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5db5-0-1246ea6db0c82). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5db5-0-1246ea6db0c82). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db5-0-1246ea6db0c82</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="786" seconds="1204061481" serial="439"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23991 comm="gconfd-2" name="linc-5db7-0-6172e08fc0153" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="786" seconds="1204061481" serial="439"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8f1170 a2=382e8c a3=b7fce6d8 items=0 ppid=1 pid=23991 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="786" seconds="1204061481" serial="439"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>3c0cc17f-c6a9-4db2-8eb3-c02c3d879622</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db7-0-6172e08fc0153</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5db7-0-6172e08fc0153'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5db7-0-6172e08fc0153). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5db7-0-6172e08fc0153). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db7-0-6172e08fc0153</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="842" seconds="1204061481" serial="440"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23993 comm="gconfd-2" name="linc-5db9-0-1e1929c5cd9af" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="842" seconds="1204061481" serial="440"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb33bb0 a2=382e8c a3=b7f0f6d8 items=0 ppid=1 pid=23993 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="842" seconds="1204061481" serial="440"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>0580966c-65a3-4973-9804-80c394ca6346</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db9-0-1e1929c5cd9af</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5db9-0-1e1929c5cd9af'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5db9-0-1e1929c5cd9af). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5db9-0-1e1929c5cd9af). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5db9-0-1e1929c5cd9af</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="902" seconds="1204061481" serial="441"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23995 comm="gconfd-2" name="linc-5dbb-0-3dc71996dc5e2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="902" seconds="1204061481" serial="441"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaba330 a2=382e8c a3=b7f956d8 items=0 ppid=1 pid=23995 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="902" seconds="1204061481" serial="441"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>46a5e75f-f97d-4b6f-9b5f-aaefb96b3798</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbb-0-3dc71996dc5e2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dbb-0-3dc71996dc5e2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dbb-0-3dc71996dc5e2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dbb-0-3dc71996dc5e2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbb-0-3dc71996dc5e2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="954" seconds="1204061481" serial="442"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23997 comm="gconfd-2" name="linc-5dbd-0-43eaaad1e8e4d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="954" seconds="1204061481" serial="442"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfba7420 a2=382e8c a3=b7f846d8 items=0 ppid=1 pid=23997 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="954" seconds="1204061481" serial="442"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:21Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:21Z</last_seen_date> > <local_id>e48cc797-2292-48e7-86c7-9d5b58d94f8a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbd-0-43eaaad1e8e4d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dbd-0-43eaaad1e8e4d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dbd-0-43eaaad1e8e4d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dbd-0-43eaaad1e8e4d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbd-0-43eaaad1e8e4d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="23" seconds="1204061482" serial="443"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=23999 comm="gconfd-2" name="linc-5dbf-0-34369dc5b68" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="23" seconds="1204061482" serial="443"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffbb030 a2=382e8c a3=b7f986d8 items=0 ppid=1 pid=23999 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="23" seconds="1204061482" serial="443"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>5cdf4df6-cf0e-413c-9b75-e49ca4574f96</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbf-0-34369dc5b68</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dbf-0-34369dc5b68'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dbf-0-34369dc5b68). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dbf-0-34369dc5b68). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dbf-0-34369dc5b68</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="69" seconds="1204061482" serial="444"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24001 comm="gconfd-2" name="linc-5dc1-0-6551a38f10fef" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="69" seconds="1204061482" serial="444"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd7e50 a2=382e8c a3=b7fb56d8 items=0 ppid=1 pid=24001 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="69" seconds="1204061482" serial="444"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>99135074-f13a-4d8a-8814-18b7fecf8680</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc1-0-6551a38f10fef</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dc1-0-6551a38f10fef'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dc1-0-6551a38f10fef). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dc1-0-6551a38f10fef). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc1-0-6551a38f10fef</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="136" seconds="1204061482" serial="445"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24003 comm="gconfd-2" name="linc-5dc3-0-527f00e2139f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="136" seconds="1204061482" serial="445"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8b7130 a2=382e8c a3=b7f926d8 items=0 ppid=1 pid=24003 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="136" seconds="1204061482" serial="445"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>c6b97d72-e78d-40e2-9a29-29dded9909e9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc3-0-527f00e2139f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dc3-0-527f00e2139f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dc3-0-527f00e2139f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dc3-0-527f00e2139f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc3-0-527f00e2139f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="193" seconds="1204061482" serial="446"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24005 comm="gconfd-2" name="linc-5dc5-0-2fd658962f3fc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061482" serial="446"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb54bd0 a2=382e8c a3=b80326d8 items=0 ppid=1 pid=24005 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061482" serial="446"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>dec7d79b-67ed-407f-883b-0c81bee5cea7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc5-0-2fd658962f3fc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dc5-0-2fd658962f3fc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dc5-0-2fd658962f3fc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dc5-0-2fd658962f3fc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc5-0-2fd658962f3fc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="248" seconds="1204061482" serial="447"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24007 comm="gconfd-2" name="linc-5dc7-0-738c35e53c9e5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="248" seconds="1204061482" serial="447"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa84b00 a2=382e8c a3=b7f626d8 items=0 ppid=1 pid=24007 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="248" seconds="1204061482" serial="447"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>f64b6428-69f6-40dd-b3e8-c86fe9eded3e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc7-0-738c35e53c9e5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dc7-0-738c35e53c9e5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dc7-0-738c35e53c9e5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dc7-0-738c35e53c9e5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc7-0-738c35e53c9e5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="304" seconds="1204061482" serial="448"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24009 comm="gconfd-2" name="linc-5dc9-0-cfac2224a6aa" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="304" seconds="1204061482" serial="448"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff1f7a0 a2=382e8c a3=b7efc6d8 items=0 ppid=1 pid=24009 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="304" seconds="1204061482" serial="448"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>cf7c3057-3c69-4c73-bdde-14c6edc36ff3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc9-0-cfac2224a6aa</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dc9-0-cfac2224a6aa'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dc9-0-cfac2224a6aa). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dc9-0-cfac2224a6aa). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dc9-0-cfac2224a6aa</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="367" seconds="1204061482" serial="449"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24011 comm="gconfd-2" name="linc-5dcb-0-5db5d84159a48" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="367" seconds="1204061482" serial="449"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd2b5a0 a2=382e8c a3=b80086d8 items=0 ppid=1 pid=24011 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="367" seconds="1204061482" serial="449"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>b6ea5714-4239-4f5e-b4d1-c327be1544c7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcb-0-5db5d84159a48</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dcb-0-5db5d84159a48'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dcb-0-5db5d84159a48). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dcb-0-5db5d84159a48). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcb-0-5db5d84159a48</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="417" seconds="1204061482" serial="450"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24013 comm="gconfd-2" name="linc-5dcd-0-444177426605b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="417" seconds="1204061482" serial="450"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd7cc00 a2=382e8c a3=b80586d8 items=0 ppid=24012 pid=24013 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="417" seconds="1204061482" serial="450"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>d744e124-c218-4998-8977-931597691a34</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcd-0-444177426605b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dcd-0-444177426605b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dcd-0-444177426605b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dcd-0-444177426605b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcd-0-444177426605b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="481" seconds="1204061482" serial="451"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24015 comm="gconfd-2" name="linc-5dcf-0-77a493fb759a6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="481" seconds="1204061482" serial="451"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7a4f0 a2=382e8c a3=b7f576d8 items=0 ppid=1 pid=24015 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="481" seconds="1204061482" serial="451"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>c486745c-4a83-4e11-8486-5254402b7621</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcf-0-77a493fb759a6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dcf-0-77a493fb759a6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dcf-0-77a493fb759a6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dcf-0-77a493fb759a6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dcf-0-77a493fb759a6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="536" seconds="1204061482" serial="452"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24017 comm="gconfd-2" name="linc-5dd1-0-6fdd430182f1e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="536" seconds="1204061482" serial="452"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff28fa0 a2=382e8c a3=b80046d8 items=0 ppid=24016 pid=24017 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="536" seconds="1204061482" serial="452"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>10f070eb-4d4a-442b-ae83-d0b29e04b2a9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd1-0-6fdd430182f1e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dd1-0-6fdd430182f1e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dd1-0-6fdd430182f1e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dd1-0-6fdd430182f1e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd1-0-6fdd430182f1e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="599" seconds="1204061482" serial="453"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24019 comm="gconfd-2" name="linc-5dd3-0-1de06d58923c1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061482" serial="453"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbad430 a2=382e8c a3=b7f8a6d8 items=0 ppid=1 pid=24019 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061482" serial="453"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>8006726c-1ff7-4c9c-9912-23b9d1f3fe06</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd3-0-1de06d58923c1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dd3-0-1de06d58923c1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dd3-0-1de06d58923c1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dd3-0-1de06d58923c1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd3-0-1de06d58923c1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="640" seconds="1204061482" serial="454"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24021 comm="gconfd-2" name="linc-5dd5-0-17cdbac49c4bd" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="640" seconds="1204061482" serial="454"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdb4630 a2=382e8c a3=b80916d8 items=0 ppid=24020 pid=24021 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="640" seconds="1204061482" serial="454"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>2d91b2b0-2216-4bcd-be86-eaa85a38a96d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd5-0-17cdbac49c4bd</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dd5-0-17cdbac49c4bd'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dd5-0-17cdbac49c4bd). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dd5-0-17cdbac49c4bd). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd5-0-17cdbac49c4bd</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="725" seconds="1204061482" serial="455"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24023 comm="gconfd-2" name="linc-5dd7-0-6e4595a7b118b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="725" seconds="1204061482" serial="455"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd16d90 a2=382e8c a3=b7ef46d8 items=0 ppid=1 pid=24023 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="725" seconds="1204061482" serial="455"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>d3b702ce-df2c-4559-8400-0779d13914e1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd7-0-6e4595a7b118b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dd7-0-6e4595a7b118b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dd7-0-6e4595a7b118b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dd7-0-6e4595a7b118b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd7-0-6e4595a7b118b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="768" seconds="1204061482" serial="456"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24025 comm="gconfd-2" name="linc-5dd9-0-5858b24dbba50" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="768" seconds="1204061482" serial="456"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd0650 a2=382e8c a3=b80ab6d8 items=0 ppid=1 pid=24025 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="768" seconds="1204061482" serial="456"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>2aa95fe0-6141-4130-9252-fb2aa811ef62</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd9-0-5858b24dbba50</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dd9-0-5858b24dbba50'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dd9-0-5858b24dbba50). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dd9-0-5858b24dbba50). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dd9-0-5858b24dbba50</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="837" seconds="1204061482" serial="457"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24027 comm="gconfd-2" name="linc-5ddb-0-1b82e8edcc86e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="837" seconds="1204061482" serial="457"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8a6790 a2=382e8c a3=b80826d8 items=0 ppid=1 pid=24027 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="837" seconds="1204061482" serial="457"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>d4cd7723-a9dd-4d47-8c46-bd0776260a9d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddb-0-1b82e8edcc86e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ddb-0-1b82e8edcc86e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ddb-0-1b82e8edcc86e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ddb-0-1b82e8edcc86e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddb-0-1b82e8edcc86e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="892" seconds="1204061482" serial="458"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24029 comm="gconfd-2" name="linc-5ddd-0-4061e072d9e9f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="892" seconds="1204061482" serial="458"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd349a0 a2=382e8c a3=b7f106d8 items=0 ppid=1 pid=24029 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="892" seconds="1204061482" serial="458"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>5f386530-c9cd-4e67-ba68-0f16e02d7414</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddd-0-4061e072d9e9f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ddd-0-4061e072d9e9f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ddd-0-4061e072d9e9f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ddd-0-4061e072d9e9f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddd-0-4061e072d9e9f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="948" seconds="1204061482" serial="459"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24031 comm="gconfd-2" name="linc-5ddf-0-9dc0fb9e7a1c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="948" seconds="1204061482" serial="459"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd585d0 a2=382e8c a3=b7f336d8 items=0 ppid=1 pid=24031 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="948" seconds="1204061482" serial="459"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:22Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:22Z</last_seen_date> > <local_id>d0a50b93-0661-43dd-ba48-6b022dfc31ae</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddf-0-9dc0fb9e7a1c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ddf-0-9dc0fb9e7a1c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ddf-0-9dc0fb9e7a1c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ddf-0-9dc0fb9e7a1c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ddf-0-9dc0fb9e7a1c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="6" seconds="1204061483" serial="460"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24033 comm="gconfd-2" name="linc-5de1-0-3f3e54a81a54" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="6" seconds="1204061483" serial="460"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ae930 a2=382e8c a3=b808a6d8 items=0 ppid=1 pid=24033 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="6" seconds="1204061483" serial="460"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>7677b67b-10e6-4aea-9e37-bf40839c09c1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de1-0-3f3e54a81a54</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5de1-0-3f3e54a81a54'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5de1-0-3f3e54a81a54). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5de1-0-3f3e54a81a54). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de1-0-3f3e54a81a54</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="76" seconds="1204061483" serial="461"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24035 comm="gconfd-2" name="linc-5de3-0-38dd544b1297d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="76" seconds="1204061483" serial="461"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb87c00 a2=382e8c a3=b80656d8 items=0 ppid=1 pid=24035 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="76" seconds="1204061483" serial="461"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>20caafd9-7dfe-4355-8141-2c85f431cbab</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de3-0-38dd544b1297d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5de3-0-38dd544b1297d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5de3-0-38dd544b1297d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5de3-0-38dd544b1297d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de3-0-38dd544b1297d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="151" seconds="1204061483" serial="462"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24037 comm="gconfd-2" name="linc-5de5-0-2225562825073" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="151" seconds="1204061483" serial="462"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe04680 a2=382e8c a3=b7fe16d8 items=0 ppid=1 pid=24037 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="151" seconds="1204061483" serial="462"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>e8277711-6689-4e51-a16e-2e7608f20caf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de5-0-2225562825073</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5de5-0-2225562825073'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5de5-0-2225562825073). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5de5-0-2225562825073). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de5-0-2225562825073</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="200" seconds="1204061483" serial="463"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24039 comm="gconfd-2" name="linc-5de7-0-37d364e30fd0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="200" seconds="1204061483" serial="463"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbd6470 a2=382e8c a3=b7fb26d8 items=0 ppid=1 pid=24039 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="200" seconds="1204061483" serial="463"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>cb802d39-5e27-480a-8bc3-d474c2ac9d99</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de7-0-37d364e30fd0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5de7-0-37d364e30fd0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5de7-0-37d364e30fd0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5de7-0-37d364e30fd0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de7-0-37d364e30fd0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="258" seconds="1204061483" serial="464"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24041 comm="gconfd-2" name="linc-5de9-0-2c50a8f53ef96" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="258" seconds="1204061483" serial="464"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbb4430 a2=382e8c a3=b808f6d8 items=0 ppid=1 pid=24041 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="258" seconds="1204061483" serial="464"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>118e74d1-8a95-4d5f-856c-632b94a28400</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de9-0-2c50a8f53ef96</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5de9-0-2c50a8f53ef96'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5de9-0-2c50a8f53ef96). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5de9-0-2c50a8f53ef96). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5de9-0-2c50a8f53ef96</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="316" seconds="1204061483" serial="465"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24043 comm="gconfd-2" name="linc-5deb-0-14a742464d340" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061483" serial="465"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb1eba0 a2=382e8c a3=b7ffc6d8 items=0 ppid=1 pid=24043 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="316" seconds="1204061483" serial="465"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>5eff5528-bbb8-4da1-aef1-84b34c8a37e3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5deb-0-14a742464d340</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5deb-0-14a742464d340'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5deb-0-14a742464d340). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5deb-0-14a742464d340). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5deb-0-14a742464d340</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="375" seconds="1204061483" serial="466"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24045 comm="gconfd-2" name="linc-5ded-0-1a3846c95ba03" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="375" seconds="1204061483" serial="466"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff3d7b0 a2=382e8c a3=b80186d8 items=0 ppid=1 pid=24045 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="375" seconds="1204061483" serial="466"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>300c1af5-24f6-431a-b89d-b1704ce6e65f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ded-0-1a3846c95ba03</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ded-0-1a3846c95ba03'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ded-0-1a3846c95ba03). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ded-0-1a3846c95ba03). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ded-0-1a3846c95ba03</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="431" seconds="1204061483" serial="467"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24047 comm="gconfd-2" name="linc-5def-0-28975f8b696c3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="431" seconds="1204061483" serial="467"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdb3c40 a2=382e8c a3=b80906d8 items=0 ppid=1 pid=24047 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="431" seconds="1204061483" serial="467"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>20bd904e-6cf4-4ead-b3f7-b7e260ddce11</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5def-0-28975f8b696c3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5def-0-28975f8b696c3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5def-0-28975f8b696c3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5def-0-28975f8b696c3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5def-0-28975f8b696c3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="506" seconds="1204061483" serial="468"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24049 comm="gconfd-2" name="linc-5df1-0-31314dfa7b884" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="506" seconds="1204061483" serial="468"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff4efd0 a2=382e8c a3=b802c6d8 items=0 ppid=1 pid=24049 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="506" seconds="1204061483" serial="468"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>8591ade4-069d-4039-8740-02f5a7b01a95</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df1-0-31314dfa7b884</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5df1-0-31314dfa7b884'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5df1-0-31314dfa7b884). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5df1-0-31314dfa7b884). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df1-0-31314dfa7b884</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="563" seconds="1204061483" serial="469"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24051 comm="gconfd-2" name="linc-5df3-0-34d1c82489a72" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="563" seconds="1204061483" serial="469"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd21da0 a2=382e8c a3=b7fff6d8 items=0 ppid=1 pid=24051 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="563" seconds="1204061483" serial="469"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>a6cfe74a-1b76-4c7e-bd40-b0e308172d01</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df3-0-34d1c82489a72</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5df3-0-34d1c82489a72'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5df3-0-34d1c82489a72). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5df3-0-34d1c82489a72). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df3-0-34d1c82489a72</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="619" seconds="1204061483" serial="470"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24053 comm="gconfd-2" name="linc-5df5-0-3406338197239" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="619" seconds="1204061483" serial="470"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9611e0 a2=382e8c a3=b7f3c6d8 items=0 ppid=1 pid=24053 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="619" seconds="1204061483" serial="470"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>6e985b54-bac3-4904-ad24-d39ab7fa9022</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df5-0-3406338197239</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5df5-0-3406338197239'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5df5-0-3406338197239). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5df5-0-3406338197239). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df5-0-3406338197239</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="672" seconds="1204061483" serial="471"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24055 comm="gconfd-2" name="linc-5df7-0-470e872da43b3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="672" seconds="1204061483" serial="471"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd07d80 a2=382e8c a3=b7fe36d8 items=0 ppid=1 pid=24055 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="672" seconds="1204061483" serial="471"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>9bdadbb7-e296-4e74-b15e-7d7210aebb1f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df7-0-470e872da43b3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5df7-0-470e872da43b3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5df7-0-470e872da43b3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5df7-0-470e872da43b3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df7-0-470e872da43b3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="738" seconds="1204061483" serial="472"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24057 comm="gconfd-2" name="linc-5df9-0-3d75ed60b441d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="738" seconds="1204061483" serial="472"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff50fd0 a2=382e8c a3=b802c6d8 items=0 ppid=1 pid=24057 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="738" seconds="1204061483" serial="472"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>cb0d57ef-4ff6-4d51-8cc8-0dbee88059d6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df9-0-3d75ed60b441d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5df9-0-3d75ed60b441d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5df9-0-3d75ed60b441d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5df9-0-3d75ed60b441d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5df9-0-3d75ed60b441d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="785" seconds="1204061483" serial="473"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24059 comm="gconfd-2" name="linc-5dfb-0-10bd769ebfb30" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="785" seconds="1204061483" serial="473"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa8fb10 a2=382e8c a3=b7f6b6d8 items=0 ppid=24058 pid=24059 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="785" seconds="1204061483" serial="473"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>fac8daaa-6e8e-4187-84dc-b7687f592d58</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dfb-0-10bd769ebfb30</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dfb-0-10bd769ebfb30'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dfb-0-10bd769ebfb30). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dfb-0-10bd769ebfb30). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dfb-0-10bd769ebfb30</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="857" seconds="1204061483" serial="474"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24061 comm="gconfd-2" name="linc-5dfd-0-570be751d158d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="857" seconds="1204061483" serial="474"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc16c90 a2=382e8c a3=b7ff46d8 items=0 ppid=1 pid=24061 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="857" seconds="1204061483" serial="474"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>82a64e2e-e29e-468b-aaa0-afe8f8ee5208</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dfd-0-570be751d158d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dfd-0-570be751d158d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dfd-0-570be751d158d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dfd-0-570be751d158d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dfd-0-570be751d158d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="906" seconds="1204061483" serial="475"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24063 comm="gconfd-2" name="linc-5dff-0-df88291dd338" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="906" seconds="1204061483" serial="475"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcbf540 a2=382e8c a3=b809c6d8 items=0 ppid=1 pid=24063 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="906" seconds="1204061483" serial="475"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>6cfb9c55-0b82-4a1e-867e-b79d34a11f27</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dff-0-df88291dd338</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5dff-0-df88291dd338'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5dff-0-df88291dd338). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5dff-0-df88291dd338). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5dff-0-df88291dd338</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="973" seconds="1204061483" serial="476"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24065 comm="gconfd-2" name="linc-5e01-0-4d8efa99edb7a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="973" seconds="1204061483" serial="476"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9419c0 a2=382e8c a3=b801d6d8 items=0 ppid=1 pid=24065 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="973" seconds="1204061483" serial="476"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:23Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:23Z</last_seen_date> > <local_id>85793921-f879-40fe-a6eb-00bbb405429a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e01-0-4d8efa99edb7a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e01-0-4d8efa99edb7a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e01-0-4d8efa99edb7a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e01-0-4d8efa99edb7a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e01-0-4d8efa99edb7a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="26" seconds="1204061484" serial="477"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24067 comm="gconfd-2" name="linc-5e03-0-5c0629db67e4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="26" seconds="1204061484" serial="477"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdfc680 a2=382e8c a3=b80d96d8 items=0 ppid=1 pid=24067 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="26" seconds="1204061484" serial="477"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>71286887-1187-4268-be3c-2e3df4e625db</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e03-0-5c0629db67e4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e03-0-5c0629db67e4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e03-0-5c0629db67e4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e03-0-5c0629db67e4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e03-0-5c0629db67e4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="88" seconds="1204061484" serial="478"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24069 comm="gconfd-2" name="linc-5e05-0-13f708e159cb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="88" seconds="1204061484" serial="478"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb643e0 a2=382e8c a3=b80416d8 items=0 ppid=1 pid=24069 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="88" seconds="1204061484" serial="478"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>4b8c58db-d5c1-4273-8988-9b894a442eea</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e05-0-13f708e159cb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e05-0-13f708e159cb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e05-0-13f708e159cb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e05-0-13f708e159cb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e05-0-13f708e159cb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="136" seconds="1204061484" serial="479"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24071 comm="gconfd-2" name="linc-5e07-0-6d26875f2151d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="136" seconds="1204061484" serial="479"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9629e0 a2=382e8c a3=b80406d8 items=0 ppid=1 pid=24071 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="136" seconds="1204061484" serial="479"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>0557fc91-9960-4fb6-ae8c-e70642bd4240</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e07-0-6d26875f2151d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e07-0-6d26875f2151d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e07-0-6d26875f2151d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e07-0-6d26875f2151d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e07-0-6d26875f2151d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="214" seconds="1204061484" serial="480"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24073 comm="gconfd-2" name="linc-5e09-0-529352e834784" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="214" seconds="1204061484" serial="480"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9689e0 a2=382e8c a3=b7f446d8 items=0 ppid=1 pid=24073 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="214" seconds="1204061484" serial="480"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>52765c3a-7cb6-4367-910d-69630bc5b47e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e09-0-529352e834784</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e09-0-529352e834784'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e09-0-529352e834784). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e09-0-529352e834784). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e09-0-529352e834784</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="263" seconds="1204061484" serial="481"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24075 comm="gconfd-2" name="linc-5e0b-0-4540704940664" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="263" seconds="1204061484" serial="481"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ff980 a2=382e8c a3=b7edb6d8 items=0 ppid=1 pid=24075 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="263" seconds="1204061484" serial="481"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>a433173c-fff1-4086-848b-60bfeed1c12d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0b-0-4540704940664</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e0b-0-4540704940664'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e0b-0-4540704940664). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e0b-0-4540704940664). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0b-0-4540704940664</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="321" seconds="1204061484" serial="482"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24077 comm="gconfd-2" name="linc-5e0d-0-1b1008884e74d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="321" seconds="1204061484" serial="482"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc49cc0 a2=382e8c a3=b7f276d8 items=0 ppid=1 pid=24077 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="321" seconds="1204061484" serial="482"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>71804d78-56c1-4d5c-8de2-ace6f983e14e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0d-0-1b1008884e74d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e0d-0-1b1008884e74d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e0d-0-1b1008884e74d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e0d-0-1b1008884e74d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0d-0-1b1008884e74d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="379" seconds="1204061484" serial="483"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24079 comm="gconfd-2" name="linc-5e0f-0-4a7a4bcd5c8ce" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="379" seconds="1204061484" serial="483"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8cf150 a2=382e8c a3=b7faa6d8 items=0 ppid=1 pid=24079 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="379" seconds="1204061484" serial="483"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>ec088117-e419-44dd-86f6-00baa495d026</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0f-0-4a7a4bcd5c8ce</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e0f-0-4a7a4bcd5c8ce'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e0f-0-4a7a4bcd5c8ce). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e0f-0-4a7a4bcd5c8ce). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e0f-0-4a7a4bcd5c8ce</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="442" seconds="1204061484" serial="484"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24081 comm="gconfd-2" name="linc-5e11-0-3c27ef746c1fe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="442" seconds="1204061484" serial="484"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9ee270 a2=382e8c a3=b7fcb6d8 items=0 ppid=1 pid=24081 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="442" seconds="1204061484" serial="484"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>a7852d54-a8ab-44a1-b7eb-971707301708</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e11-0-3c27ef746c1fe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e11-0-3c27ef746c1fe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e11-0-3c27ef746c1fe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e11-0-3c27ef746c1fe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e11-0-3c27ef746c1fe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="491" seconds="1204061484" serial="485"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24083 comm="gconfd-2" name="linc-5e13-0-711d874d780b6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="491" seconds="1204061484" serial="485"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfca6d20 a2=382e8c a3=b7f846d8 items=0 ppid=1 pid=24083 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="491" seconds="1204061484" serial="485"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>a0b22beb-c8db-4efd-b669-e15ed81bd8d2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e13-0-711d874d780b6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e13-0-711d874d780b6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e13-0-711d874d780b6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e13-0-711d874d780b6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e13-0-711d874d780b6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="560" seconds="1204061484" serial="486"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24085 comm="gconfd-2" name="linc-5e15-0-273069dc88c1e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="560" seconds="1204061484" serial="486"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd94610 a2=382e8c a3=b80716d8 items=0 ppid=1 pid=24085 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="560" seconds="1204061484" serial="486"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>aa83e924-9934-4103-b2bd-5f0ef95e44eb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e15-0-273069dc88c1e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e15-0-273069dc88c1e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e15-0-273069dc88c1e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e15-0-273069dc88c1e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e15-0-273069dc88c1e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="608" seconds="1204061484" serial="487"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24087 comm="gconfd-2" name="linc-5e17-0-7163217c949a3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="608" seconds="1204061484" serial="487"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe90710 a2=382e8c a3=b806b6d8 items=0 ppid=24086 pid=24087 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="608" seconds="1204061484" serial="487"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>6a8b4ac5-fe7b-4de5-b27f-1fec1a7a018d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e17-0-7163217c949a3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e17-0-7163217c949a3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e17-0-7163217c949a3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e17-0-7163217c949a3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e17-0-7163217c949a3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="675" seconds="1204061484" serial="488"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24089 comm="gconfd-2" name="linc-5e19-0-76ef7499a4f54" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="675" seconds="1204061484" serial="488"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbbdb00 a2=382e8c a3=b809b6d8 items=0 ppid=1 pid=24089 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="675" seconds="1204061484" serial="488"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>9d0a8ca7-b9bc-4aca-ba38-3017c66c3512</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e19-0-76ef7499a4f54</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e19-0-76ef7499a4f54'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e19-0-76ef7499a4f54). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e19-0-76ef7499a4f54). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e19-0-76ef7499a4f54</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="724" seconds="1204061484" serial="489"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24091 comm="gconfd-2" name="linc-5e1b-0-f95c0e5b0fac" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="724" seconds="1204061484" serial="489"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ef170 a2=382e8c a3=b80cc6d8 items=0 ppid=1 pid=24091 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="724" seconds="1204061484" serial="489"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>1e16ef46-da75-4432-99e0-d0cb579aeeef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1b-0-f95c0e5b0fac</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e1b-0-f95c0e5b0fac'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e1b-0-f95c0e5b0fac). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e1b-0-f95c0e5b0fac). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1b-0-f95c0e5b0fac</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="793" seconds="1204061484" serial="490"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24093 comm="gconfd-2" name="linc-5e1d-0-58d9e706c1b1f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="793" seconds="1204061484" serial="490"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaa3320 a2=382e8c a3=b807e6d8 items=0 ppid=1 pid=24093 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="793" seconds="1204061484" serial="490"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>75bb582d-9e8f-4a81-9098-3cacffb09603</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1d-0-58d9e706c1b1f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e1d-0-58d9e706c1b1f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e1d-0-58d9e706c1b1f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e1d-0-58d9e706c1b1f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1d-0-58d9e706c1b1f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="841" seconds="1204061484" serial="491"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24095 comm="gconfd-2" name="linc-5e1f-0-41f6453bcd83c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="841" seconds="1204061484" serial="491"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe3a6b0 a2=382e8c a3=b80156d8 items=0 ppid=1 pid=24095 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="841" seconds="1204061484" serial="491"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>84b9894f-4615-4abe-b063-c62496bf3b5c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1f-0-41f6453bcd83c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e1f-0-41f6453bcd83c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e1f-0-41f6453bcd83c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e1f-0-41f6453bcd83c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e1f-0-41f6453bcd83c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="908" seconds="1204061484" serial="492"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24097 comm="gconfd-2" name="linc-5e21-0-6f662a9dddc6f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="908" seconds="1204061484" serial="492"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff747f0 a2=382e8c a3=b7f516d8 items=0 ppid=1 pid=24097 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="908" seconds="1204061484" serial="492"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>109b06cb-3f3c-4492-afbe-2fc4879dcb8d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e21-0-6f662a9dddc6f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e21-0-6f662a9dddc6f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e21-0-6f662a9dddc6f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e21-0-6f662a9dddc6f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e21-0-6f662a9dddc6f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="962" seconds="1204061484" serial="493"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24099 comm="gconfd-2" name="linc-5e23-0-44ee0e0eafdc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="962" seconds="1204061484" serial="493"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb31bb0 a2=382e8c a3=b800f6d8 items=0 ppid=1 pid=24099 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="962" seconds="1204061484" serial="493"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:24Z</last_seen_date> > <local_id>9dac81c0-134d-491a-b87d-530044c76de5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e23-0-44ee0e0eafdc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e23-0-44ee0e0eafdc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e23-0-44ee0e0eafdc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e23-0-44ee0e0eafdc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e23-0-44ee0e0eafdc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="25" seconds="1204061485" serial="494"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24101 comm="gconfd-2" name="linc-5e25-0-5db68d0563d0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="25" seconds="1204061485" serial="494"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff34fb0 a2=382e8c a3=b80126d8 items=0 ppid=1 pid=24101 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="25" seconds="1204061485" serial="494"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>acb24ff0-3d5b-485a-818a-e2bb522cb227</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e25-0-5db68d0563d0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e25-0-5db68d0563d0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e25-0-5db68d0563d0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e25-0-5db68d0563d0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e25-0-5db68d0563d0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="77" seconds="1204061485" serial="495"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24103 comm="gconfd-2" name="linc-5e27-0-405f89e812f6e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="77" seconds="1204061485" serial="495"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcead60 a2=382e8c a3=b80c86d8 items=0 ppid=1 pid=24103 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="77" seconds="1204061485" serial="495"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>62e2f142-dd5b-4a35-b64f-9c8746fcc702</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e27-0-405f89e812f6e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e27-0-405f89e812f6e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e27-0-405f89e812f6e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e27-0-405f89e812f6e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e27-0-405f89e812f6e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="141" seconds="1204061485" serial="496"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24105 comm="gconfd-2" name="linc-5e29-0-77888bc522890" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="141" seconds="1204061485" serial="496"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff68fe0 a2=382e8c a3=b7f446d8 items=0 ppid=1 pid=24105 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="141" seconds="1204061485" serial="496"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>fbc63315-9f94-4921-ad2a-57c46d4d1c50</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e29-0-77888bc522890</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e29-0-77888bc522890'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e29-0-77888bc522890). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e29-0-77888bc522890). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e29-0-77888bc522890</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="193" seconds="1204061485" serial="497"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24107 comm="gconfd-2" name="linc-5e2b-0-6ec3e2db2f2b1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061485" serial="497"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb6ebf0 a2=382e8c a3=b7f4c6d8 items=0 ppid=1 pid=24107 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061485" serial="497"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>74424acd-e567-491d-8e90-eeac6489430e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2b-0-6ec3e2db2f2b1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e2b-0-6ec3e2db2f2b1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e2b-0-6ec3e2db2f2b1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e2b-0-6ec3e2db2f2b1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2b-0-6ec3e2db2f2b1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="260" seconds="1204061485" serial="498"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24109 comm="gconfd-2" name="linc-5e2d-0-634934393fa9f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="260" seconds="1204061485" serial="498"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffb9030 a2=382e8c a3=b80966d8 items=0 ppid=1 pid=24109 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="260" seconds="1204061485" serial="498"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>2d5572a5-2687-491a-a353-d66e5a18060e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2d-0-634934393fa9f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e2d-0-634934393fa9f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e2d-0-634934393fa9f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e2d-0-634934393fa9f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2d-0-634934393fa9f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="303" seconds="1204061485" serial="499"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24111 comm="gconfd-2" name="linc-5e2f-0-36d391004a14b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="303" seconds="1204061485" serial="499"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc9fd20 a2=382e8c a3=b7f7b6d8 items=0 ppid=24110 pid=24111 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="303" seconds="1204061485" serial="499"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>54bb24a3-fa6f-46c2-b1bc-c97409dded4a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2f-0-36d391004a14b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e2f-0-36d391004a14b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e2f-0-36d391004a14b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e2f-0-36d391004a14b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e2f-0-36d391004a14b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="379" seconds="1204061485" serial="500"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24113 comm="gconfd-2" name="linc-5e31-0-4e8c00055cb1f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="379" seconds="1204061485" serial="500"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfafd370 a2=382e8c a3=b80d86d8 items=0 ppid=1 pid=24113 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="379" seconds="1204061485" serial="500"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>6bdc8e3c-6768-40a7-be65-710da7b26e8b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e31-0-4e8c00055cb1f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e31-0-4e8c00055cb1f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e31-0-4e8c00055cb1f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e31-0-4e8c00055cb1f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e31-0-4e8c00055cb1f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="423" seconds="1204061485" serial="501"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24115 comm="gconfd-2" name="linc-5e33-0-cecdc016754f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="423" seconds="1204061485" serial="501"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe636e0 a2=382e8c a3=b803e6d8 items=0 ppid=24114 pid=24115 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="423" seconds="1204061485" serial="501"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>ff93b904-f115-4069-9be9-fd561d2c9c47</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e33-0-cecdc016754f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e33-0-cecdc016754f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e33-0-cecdc016754f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e33-0-cecdc016754f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e33-0-cecdc016754f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="495" seconds="1204061485" serial="502"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24117 comm="gconfd-2" name="linc-5e35-0-77dc671578f51" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061485" serial="502"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc49cc0 a2=382e8c a3=b7f276d8 items=0 ppid=1 pid=24117 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="495" seconds="1204061485" serial="502"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>ac05c7d6-d74d-4a2c-a520-d7928774a686</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e35-0-77dc671578f51</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e35-0-77dc671578f51'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e35-0-77dc671578f51). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e35-0-77dc671578f51). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e35-0-77dc671578f51</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="553" seconds="1204061485" serial="503"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24119 comm="gconfd-2" name="linc-5e37-0-42624cbb87091" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="553" seconds="1204061485" serial="503"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff7d800 a2=382e8c a3=b7f5a6d8 items=0 ppid=24118 pid=24119 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="553" seconds="1204061485" serial="503"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>57133ad1-b25b-40de-bd03-3239f05f0dfa</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e37-0-42624cbb87091</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e37-0-42624cbb87091'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e37-0-42624cbb87091). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e37-0-42624cbb87091). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e37-0-42624cbb87091</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="617" seconds="1204061485" serial="504"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24121 comm="gconfd-2" name="linc-5e39-0-26cad27096abb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="617" seconds="1204061485" serial="504"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff7e800 a2=382e8c a3=b7f5b6d8 items=0 ppid=1 pid=24121 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="617" seconds="1204061485" serial="504"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>35e95ffa-1b51-4936-b5cf-bdb958c5c5bf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e39-0-26cad27096abb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e39-0-26cad27096abb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e39-0-26cad27096abb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e39-0-26cad27096abb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e39-0-26cad27096abb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="669" seconds="1204061485" serial="505"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24123 comm="gconfd-2" name="linc-5e3b-0-171d3a5ba372b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061485" serial="505"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfad5350 a2=382e8c a3=b80b06d8 items=0 ppid=24122 pid=24123 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="669" seconds="1204061485" serial="505"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>12061788-bdc6-4aa9-b486-57c39a58a002</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3b-0-171d3a5ba372b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e3b-0-171d3a5ba372b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e3b-0-171d3a5ba372b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e3b-0-171d3a5ba372b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3b-0-171d3a5ba372b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="736" seconds="1204061485" serial="506"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24125 comm="gconfd-2" name="linc-5e3d-0-6b905f7cb3bd6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="736" seconds="1204061485" serial="506"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9479c0 a2=382e8c a3=b80256d8 items=0 ppid=1 pid=24125 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="736" seconds="1204061485" serial="506"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>e00f7183-3823-454a-afa4-0a43a39eb244</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3d-0-6b905f7cb3bd6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e3d-0-6b905f7cb3bd6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e3d-0-6b905f7cb3bd6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e3d-0-6b905f7cb3bd6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3d-0-6b905f7cb3bd6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="784" seconds="1204061485" serial="507"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24127 comm="gconfd-2" name="linc-5e3f-0-64ffc50fbf81a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="784" seconds="1204061485" serial="507"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfce3450 a2=382e8c a3=b7fbf6d8 items=0 ppid=24126 pid=24127 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="784" seconds="1204061485" serial="507"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>fb22ba93-2d17-4f6e-89b2-9c1bfb9bc61b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3f-0-64ffc50fbf81a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e3f-0-64ffc50fbf81a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e3f-0-64ffc50fbf81a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e3f-0-64ffc50fbf81a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e3f-0-64ffc50fbf81a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="856" seconds="1204061485" serial="508"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24129 comm="gconfd-2" name="linc-5e41-0-755874c8d12aa" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="856" seconds="1204061485" serial="508"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbd0450 a2=382e8c a3=b80ad6d8 items=0 ppid=1 pid=24129 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="856" seconds="1204061485" serial="508"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>36778587-1bf4-48de-b27e-a1a005018d4b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e41-0-755874c8d12aa</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e41-0-755874c8d12aa'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e41-0-755874c8d12aa). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e41-0-755874c8d12aa). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e41-0-755874c8d12aa</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="898" seconds="1204061485" serial="509"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24131 comm="gconfd-2" name="linc-5e43-0-4c809813db6ef" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="898" seconds="1204061485" serial="509"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdf2670 a2=382e8c a3=b7fcf6d8 items=0 ppid=24130 pid=24131 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="898" seconds="1204061485" serial="509"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>cd3dc62a-29fc-47e4-b9ee-37f903fc9b98</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e43-0-4c809813db6ef</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e43-0-4c809813db6ef'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e43-0-4c809813db6ef). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e43-0-4c809813db6ef). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e43-0-4c809813db6ef</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="964" seconds="1204061485" serial="510"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24133 comm="gconfd-2" name="linc-5e45-0-301277d6eb896" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="964" seconds="1204061485" serial="510"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaee370 a2=382e8c a3=b80c96d8 items=0 ppid=1 pid=24133 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="964" seconds="1204061485" serial="510"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:25Z</last_seen_date> > <local_id>c10cbb7e-1112-4fed-b318-1aefc3221ca9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e45-0-301277d6eb896</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e45-0-301277d6eb896'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e45-0-301277d6eb896). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e45-0-301277d6eb896). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e45-0-301277d6eb896</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="20" seconds="1204061486" serial="511"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24135 comm="gconfd-2" name="linc-5e47-0-1441169d4e07" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="20" seconds="1204061486" serial="511"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff667e0 a2=382e8c a3=b7f416d8 items=0 ppid=24134 pid=24135 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="20" seconds="1204061486" serial="511"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>2a031de2-5f73-4c09-97f9-c131358321f5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e47-0-1441169d4e07</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e47-0-1441169d4e07'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e47-0-1441169d4e07). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e47-0-1441169d4e07). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e47-0-1441169d4e07</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="84" seconds="1204061486" serial="512"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24137 comm="gconfd-2" name="linc-5e49-0-6e8611ff148cf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="84" seconds="1204061486" serial="512"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe346b0 a2=382e8c a3=b800f6d8 items=0 ppid=1 pid=24137 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="84" seconds="1204061486" serial="512"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>0f8f2d61-ae49-4d30-bef8-a5f3876119e6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e49-0-6e8611ff148cf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e49-0-6e8611ff148cf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e49-0-6e8611ff148cf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e49-0-6e8611ff148cf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e49-0-6e8611ff148cf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="134" seconds="1204061486" serial="513"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24139 comm="gconfd-2" name="linc-5e4b-0-6f39677f20c07" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="134" seconds="1204061486" serial="513"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf97a1f0 a2=382e8c a3=b7f556d8 items=0 ppid=24138 pid=24139 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="134" seconds="1204061486" serial="513"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>33a04a71-44bc-411b-94d2-713ec34813d7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4b-0-6f39677f20c07</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e4b-0-6f39677f20c07'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e4b-0-6f39677f20c07). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e4b-0-6f39677f20c07). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4b-0-6f39677f20c07</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="203" seconds="1204061486" serial="514"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24141 comm="gconfd-2" name="linc-5e4d-0-15a9637231b8f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="203" seconds="1204061486" serial="514"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeeb760 a2=382e8c a3=b80c66d8 items=0 ppid=1 pid=24141 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="203" seconds="1204061486" serial="514"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>22979da0-072f-49cd-a71d-be20672a7857</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4d-0-15a9637231b8f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e4d-0-15a9637231b8f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e4d-0-15a9637231b8f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e4d-0-15a9637231b8f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4d-0-15a9637231b8f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="255" seconds="1204061486" serial="515"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24143 comm="gconfd-2" name="linc-5e4f-0-854f04c3e718" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="255" seconds="1204061486" serial="515"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd745f0 a2=382e8c a3=b80516d8 items=0 ppid=24142 pid=24143 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="255" seconds="1204061486" serial="515"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>21502b1b-501e-4c4f-826f-35cebbbdeb01</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4f-0-854f04c3e718</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e4f-0-854f04c3e718'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e4f-0-854f04c3e718). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e4f-0-854f04c3e718). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e4f-0-854f04c3e718</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="319" seconds="1204061486" serial="516"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24145 comm="gconfd-2" name="linc-5e51-0-5a08096c4e002" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="319" seconds="1204061486" serial="516"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf917190 a2=382e8c a3=b7ef26d8 items=0 ppid=1 pid=24145 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="319" seconds="1204061486" serial="516"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>0831610d-17fc-442b-8763-4c2470db1a41</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e51-0-5a08096c4e002</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e51-0-5a08096c4e002'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e51-0-5a08096c4e002). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e51-0-5a08096c4e002). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e51-0-5a08096c4e002</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="369" seconds="1204061486" serial="517"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24147 comm="gconfd-2" name="linc-5e53-0-72913a565a20f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="369" seconds="1204061486" serial="517"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb10390 a2=382e8c a3=b7eed6d8 items=0 ppid=24146 pid=24147 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="369" seconds="1204061486" serial="517"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>03608e58-b647-4b77-aa11-1fdf8bfa5c2d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e53-0-72913a565a20f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e53-0-72913a565a20f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e53-0-72913a565a20f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e53-0-72913a565a20f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e53-0-72913a565a20f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="435" seconds="1204061486" serial="518"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24149 comm="gconfd-2" name="linc-5e55-0-7c0d4ec26a61a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="435" seconds="1204061486" serial="518"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb5bbe0 a2=382e8c a3=b7f396d8 items=0 ppid=1 pid=24149 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="435" seconds="1204061486" serial="518"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>7086a789-d63c-471f-925b-5c8c03a8f1da</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e55-0-7c0d4ec26a61a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e55-0-7c0d4ec26a61a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e55-0-7c0d4ec26a61a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e55-0-7c0d4ec26a61a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e55-0-7c0d4ec26a61a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="474" seconds="1204061486" serial="519"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24151 comm="gconfd-2" name="linc-5e57-0-609070ed73eb0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="474" seconds="1204061486" serial="519"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb99410 a2=382e8c a3=b7f766d8 items=0 ppid=24150 pid=24151 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="474" seconds="1204061486" serial="519"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>e02b91c4-dda6-4d01-85c6-5347661f4dc3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e57-0-609070ed73eb0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e57-0-609070ed73eb0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e57-0-609070ed73eb0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e57-0-609070ed73eb0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e57-0-609070ed73eb0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="553" seconds="1204061486" serial="520"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24153 comm="gconfd-2" name="linc-5e59-0-3d2b40888738c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="553" seconds="1204061486" serial="520"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff91810 a2=382e8c a3=b806c6d8 items=0 ppid=1 pid=24153 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="553" seconds="1204061486" serial="520"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>bafc1520-38e0-45a0-af6e-ad47d098a56e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e59-0-3d2b40888738c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e59-0-3d2b40888738c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e59-0-3d2b40888738c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e59-0-3d2b40888738c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e59-0-3d2b40888738c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="608" seconds="1204061486" serial="521"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24155 comm="gconfd-2" name="linc-5e5b-0-762418fd94973" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="608" seconds="1204061486" serial="521"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeaaa90 a2=382e8c a3=b7f866d8 items=0 ppid=1 pid=24155 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="608" seconds="1204061486" serial="521"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>b82e8fad-690d-47f4-bd30-529b6ad7fbc5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5b-0-762418fd94973</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e5b-0-762418fd94973'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e5b-0-762418fd94973). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e5b-0-762418fd94973). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5b-0-762418fd94973</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="667" seconds="1204061486" serial="522"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24157 comm="gconfd-2" name="linc-5e5d-0-6c62a718a2f53" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="667" seconds="1204061486" serial="522"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc06480 a2=382e8c a3=b7fe36d8 items=0 ppid=1 pid=24157 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="667" seconds="1204061486" serial="522"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>3cb972a0-99d8-44d8-8667-a3d11f147259</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5d-0-6c62a718a2f53</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e5d-0-6c62a718a2f53'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e5d-0-6c62a718a2f53). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e5d-0-6c62a718a2f53). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5d-0-6c62a718a2f53</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="717" seconds="1204061486" serial="523"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24159 comm="gconfd-2" name="linc-5e5f-0-8c8daebaf24e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="717" seconds="1204061486" serial="523"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8460c0 a2=382e8c a3=b80236d8 items=0 ppid=24158 pid=24159 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="717" seconds="1204061486" serial="523"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>6aaa6f21-17d2-48b5-884b-f6001c820c63</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5f-0-8c8daebaf24e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e5f-0-8c8daebaf24e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e5f-0-8c8daebaf24e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e5f-0-8c8daebaf24e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e5f-0-8c8daebaf24e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="784" seconds="1204061486" serial="524"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24161 comm="gconfd-2" name="linc-5e61-0-346afa23bf9ff" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="784" seconds="1204061486" serial="524"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe3fec0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=24161 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="784" seconds="1204061486" serial="524"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>4a1289bd-5a93-479f-ad9f-1915638d8020</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e61-0-346afa23bf9ff</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e61-0-346afa23bf9ff'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e61-0-346afa23bf9ff). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e61-0-346afa23bf9ff). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e61-0-346afa23bf9ff</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="835" seconds="1204061486" serial="525"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24163 comm="gconfd-2" name="linc-5e63-0-5956e616cbe40" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="835" seconds="1204061486" serial="525"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff9d020 a2=382e8c a3=b807a6d8 items=0 ppid=1 pid=24163 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="835" seconds="1204061486" serial="525"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>ffd54e5e-a0c0-4499-b6e0-35cd141305e6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e63-0-5956e616cbe40</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e63-0-5956e616cbe40'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e63-0-5956e616cbe40). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e63-0-5956e616cbe40). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e63-0-5956e616cbe40</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="903" seconds="1204061486" serial="526"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24165 comm="gconfd-2" name="linc-5e65-0-6f4ef9f3dc9e2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="903" seconds="1204061486" serial="526"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8568d0 a2=382e8c a3=b7f346d8 items=0 ppid=1 pid=24165 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="903" seconds="1204061486" serial="526"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>9cfd91e6-8855-4cbc-8847-380e7995da2c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e65-0-6f4ef9f3dc9e2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e65-0-6f4ef9f3dc9e2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e65-0-6f4ef9f3dc9e2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e65-0-6f4ef9f3dc9e2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e65-0-6f4ef9f3dc9e2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="954" seconds="1204061486" serial="527"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24167 comm="gconfd-2" name="linc-5e67-0-6eb0b3c3e90f6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="954" seconds="1204061486" serial="527"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb71bf0 a2=382e8c a3=b7f4d6d8 items=0 ppid=1 pid=24167 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="954" seconds="1204061486" serial="527"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:26Z</last_seen_date> > <local_id>ad0fc9da-bd1a-489d-b0c5-4a15d9818a81</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e67-0-6eb0b3c3e90f6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e67-0-6eb0b3c3e90f6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e67-0-6eb0b3c3e90f6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e67-0-6eb0b3c3e90f6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e67-0-6eb0b3c3e90f6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="10" seconds="1204061487" serial="528"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24169 comm="gconfd-2" name="linc-5e69-0-4de0141b295b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="10" seconds="1204061487" serial="528"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaeab60 a2=382e8c a3=b7fc66d8 items=0 ppid=1 pid=24169 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="10" seconds="1204061487" serial="528"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>b41c568d-5394-40ad-a91d-052a6e63ac04</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e69-0-4de0141b295b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e69-0-4de0141b295b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e69-0-4de0141b295b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e69-0-4de0141b295b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e69-0-4de0141b295b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="63" seconds="1204061487" serial="529"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24171 comm="gconfd-2" name="linc-5e6b-0-54bf2adef62f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="63" seconds="1204061487" serial="529"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9249a0 a2=382e8c a3=b80026d8 items=0 ppid=1 pid=24171 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="63" seconds="1204061487" serial="529"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>1d8484b3-68db-4688-81b0-110b0fa27f28</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6b-0-54bf2adef62f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e6b-0-54bf2adef62f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e6b-0-54bf2adef62f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e6b-0-54bf2adef62f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6b-0-54bf2adef62f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="128" seconds="1204061487" serial="530"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24173 comm="gconfd-2" name="linc-5e6d-0-582f1c0b1f713" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="128" seconds="1204061487" serial="530"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb756c0 a2=382e8c a3=b7f526d8 items=0 ppid=1 pid=24173 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="128" seconds="1204061487" serial="530"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>a26bd3eb-1bf0-4ee9-a569-30835d7385c4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6d-0-582f1c0b1f713</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e6d-0-582f1c0b1f713'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e6d-0-582f1c0b1f713). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e6d-0-582f1c0b1f713). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6d-0-582f1c0b1f713</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="185" seconds="1204061487" serial="531"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24175 comm="gconfd-2" name="linc-5e6f-0-7567f3a82d3cf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="185" seconds="1204061487" serial="531"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa40ac0 a2=382e8c a3=b801c6d8 items=0 ppid=1 pid=24175 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="185" seconds="1204061487" serial="531"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>5a8f1ed4-c7b7-4978-8eeb-bcdea213ac15</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6f-0-7567f3a82d3cf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e6f-0-7567f3a82d3cf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e6f-0-7567f3a82d3cf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e6f-0-7567f3a82d3cf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e6f-0-7567f3a82d3cf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="246" seconds="1204061487" serial="532"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24177 comm="gconfd-2" name="linc-5e71-0-59e882953c1fe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="246" seconds="1204061487" serial="532"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc66ce0 a2=382e8c a3=b7f426d8 items=0 ppid=1 pid=24177 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="246" seconds="1204061487" serial="532"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>1171546c-e213-4f82-a5ba-c6225e07ca53</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e71-0-59e882953c1fe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e71-0-59e882953c1fe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e71-0-59e882953c1fe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e71-0-59e882953c1fe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e71-0-59e882953c1fe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="295" seconds="1204061487" serial="533"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24179 comm="gconfd-2" name="linc-5e73-0-522a6a204824c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="295" seconds="1204061487" serial="533"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdcde50 a2=382e8c a3=b7fab6d8 items=0 ppid=1 pid=24179 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="295" seconds="1204061487" serial="533"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>9f1d8f26-b552-402b-bc10-52d6dccfe4b2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e73-0-522a6a204824c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e73-0-522a6a204824c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e73-0-522a6a204824c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e73-0-522a6a204824c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e73-0-522a6a204824c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="367" seconds="1204061487" serial="534"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24181 comm="gconfd-2" name="linc-5e75-0-74d4d9e859a65" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="367" seconds="1204061487" serial="534"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf85d0d0 a2=382e8c a3=b80386d8 items=0 ppid=1 pid=24181 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="367" seconds="1204061487" serial="534"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>66b3dd78-f149-443f-a1fa-cb840439aade</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e75-0-74d4d9e859a65</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e75-0-74d4d9e859a65'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e75-0-74d4d9e859a65). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e75-0-74d4d9e859a65). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e75-0-74d4d9e859a65</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="420" seconds="1204061487" serial="535"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24183 comm="gconfd-2" name="linc-5e77-0-948fcbd66922" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="420" seconds="1204061487" serial="535"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf95b300 a2=382e8c a3=b80386d8 items=0 ppid=1 pid=24183 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="420" seconds="1204061487" serial="535"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>660b4341-502e-433b-bf0f-cfd437264670</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e77-0-948fcbd66922</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e77-0-948fcbd66922'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e77-0-948fcbd66922). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e77-0-948fcbd66922). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e77-0-948fcbd66922</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="499" seconds="1204061487" serial="536"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24185 comm="gconfd-2" name="linc-5e79-0-6bb7940d79cf1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="499" seconds="1204061487" serial="536"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe4d6c0 a2=382e8c a3=b7f286d8 items=0 ppid=1 pid=24185 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="499" seconds="1204061487" serial="536"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>bea7871f-a510-461a-ad49-fa46b31a87b7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e79-0-6bb7940d79cf1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e79-0-6bb7940d79cf1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e79-0-6bb7940d79cf1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e79-0-6bb7940d79cf1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e79-0-6bb7940d79cf1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="541" seconds="1204061487" serial="537"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24187 comm="gconfd-2" name="linc-5e7b-0-438d31b4842b7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="541" seconds="1204061487" serial="537"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc394b0 a2=382e8c a3=b80146d8 items=0 ppid=24186 pid=24187 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="541" seconds="1204061487" serial="537"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>43ed1ab4-cf3d-4108-9278-22d048302d74</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7b-0-438d31b4842b7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e7b-0-438d31b4842b7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e7b-0-438d31b4842b7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e7b-0-438d31b4842b7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7b-0-438d31b4842b7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="607" seconds="1204061487" serial="538"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24189 comm="gconfd-2" name="linc-5e7d-0-286a5494945b0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="607" seconds="1204061487" serial="538"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd1e5a0 a2=382e8c a3=b7ef96d8 items=0 ppid=1 pid=24189 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="607" seconds="1204061487" serial="538"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>04332978-8ccd-434d-8d0e-f6abb863ea0e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7d-0-286a5494945b0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e7d-0-286a5494945b0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e7d-0-286a5494945b0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e7d-0-286a5494945b0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7d-0-286a5494945b0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="657" seconds="1204061487" serial="539"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24191 comm="gconfd-2" name="linc-5e7f-0-25b2436da099b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="657" seconds="1204061487" serial="539"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb84c00 a2=382e8c a3=b7f606d8 items=0 ppid=24190 pid=24191 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="657" seconds="1204061487" serial="539"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>67343ec4-8e03-4a21-a874-408ce17ed7ce</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7f-0-25b2436da099b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e7f-0-25b2436da099b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e7f-0-25b2436da099b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e7f-0-25b2436da099b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e7f-0-25b2436da099b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="736" seconds="1204061487" serial="540"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24193 comm="gconfd-2" name="linc-5e81-0-414f5669b3b6a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="736" seconds="1204061487" serial="540"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf981200 a2=382e8c a3=b805c6d8 items=0 ppid=1 pid=24193 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="736" seconds="1204061487" serial="540"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>bd909b1a-b9d4-45e9-8daf-b93928a54fef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e81-0-414f5669b3b6a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e81-0-414f5669b3b6a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e81-0-414f5669b3b6a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e81-0-414f5669b3b6a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e81-0-414f5669b3b6a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="775" seconds="1204061487" serial="541"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24195 comm="gconfd-2" name="linc-5e83-0-4b9fb7c3bd6b7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="775" seconds="1204061487" serial="541"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff257a0 a2=382e8c a3=b80026d8 items=0 ppid=24194 pid=24195 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="775" seconds="1204061487" serial="541"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>90d5569c-c450-4a61-bdc8-1dc772724536</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e83-0-4b9fb7c3bd6b7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e83-0-4b9fb7c3bd6b7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e83-0-4b9fb7c3bd6b7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e83-0-4b9fb7c3bd6b7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e83-0-4b9fb7c3bd6b7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="835" seconds="1204061487" serial="542"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24197 comm="gconfd-2" name="linc-5e85-0-e01956acc093" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="835" seconds="1204061487" serial="542"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9c6a40 a2=382e8c a3=b7fa26d8 items=0 ppid=1 pid=24197 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="835" seconds="1204061487" serial="542"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>50bba072-395f-42a4-b10e-39a582c29b81</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e85-0-e01956acc093</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e85-0-e01956acc093'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e85-0-e01956acc093). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e85-0-e01956acc093). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e85-0-e01956acc093</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="886" seconds="1204061487" serial="543"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24199 comm="gconfd-2" name="linc-5e87-0-45f11898d8858" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="886" seconds="1204061487" serial="543"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd4e5d0 a2=382e8c a3=b7f2b6d8 items=0 ppid=24198 pid=24199 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="886" seconds="1204061487" serial="543"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>bb392475-2d1a-4c11-8392-ab3d94d69962</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e87-0-45f11898d8858</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e87-0-45f11898d8858'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e87-0-45f11898d8858). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e87-0-45f11898d8858). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e87-0-45f11898d8858</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="956" seconds="1204061487" serial="544"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24201 comm="gconfd-2" name="linc-5e89-0-4aa36ad7e96cf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="956" seconds="1204061487" serial="544"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd3edc0 a2=382e8c a3=b801a6d8 items=0 ppid=1 pid=24201 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="956" seconds="1204061487" serial="544"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:27Z</last_seen_date> > <local_id>c505fdd4-6afb-4523-afb2-cd4a7db381a6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e89-0-4aa36ad7e96cf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e89-0-4aa36ad7e96cf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e89-0-4aa36ad7e96cf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e89-0-4aa36ad7e96cf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e89-0-4aa36ad7e96cf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="10" seconds="1204061488" serial="545"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24203 comm="gconfd-2" name="linc-5e8b-0-56b6d0ff2825" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="10" seconds="1204061488" serial="545"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd80e00 a2=382e8c a3=b805e6d8 items=0 ppid=1 pid=24203 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="10" seconds="1204061488" serial="545"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>4f313769-45ef-4a66-8fd9-1e93953387fd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8b-0-56b6d0ff2825</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e8b-0-56b6d0ff2825'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e8b-0-56b6d0ff2825). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e8b-0-56b6d0ff2825). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8b-0-56b6d0ff2825</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="74" seconds="1204061488" serial="546"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24205 comm="gconfd-2" name="linc-5e8d-0-76f76cee121e4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="74" seconds="1204061488" serial="546"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd455c0 a2=382e8c a3=b7f206d8 items=0 ppid=1 pid=24205 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="74" seconds="1204061488" serial="546"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>73a3a753-1dfc-4da8-a3b6-bc870f0282b9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8d-0-76f76cee121e4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e8d-0-76f76cee121e4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e8d-0-76f76cee121e4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e8d-0-76f76cee121e4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8d-0-76f76cee121e4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="123" seconds="1204061488" serial="547"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24207 comm="gconfd-2" name="linc-5e8f-0-7d63dd731e029" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="123" seconds="1204061488" serial="547"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9acac0 a2=382e8c a3=b80886d8 items=0 ppid=24206 pid=24207 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="123" seconds="1204061488" serial="547"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>6f4ee372-2eb4-4a23-85e6-586e8adf45bf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8f-0-7d63dd731e029</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e8f-0-7d63dd731e029'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e8f-0-7d63dd731e029). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e8f-0-7d63dd731e029). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e8f-0-7d63dd731e029</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="193" seconds="1204061488" serial="548"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24209 comm="gconfd-2" name="linc-5e91-0-1c490b962f2b3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061488" serial="548"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe90710 a2=382e8c a3=b806d6d8 items=0 ppid=1 pid=24209 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="193" seconds="1204061488" serial="548"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>d4d01242-89c0-4820-84e0-0ef7b3707aef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e91-0-1c490b962f2b3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e91-0-1c490b962f2b3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e91-0-1c490b962f2b3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e91-0-1c490b962f2b3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e91-0-1c490b962f2b3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="237" seconds="1204061488" serial="549"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24211 comm="gconfd-2" name="linc-5e93-0-6a1eb64f39ea5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="237" seconds="1204061488" serial="549"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf821cf0 a2=382e8c a3=b7ffe6d8 items=0 ppid=24210 pid=24211 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="237" seconds="1204061488" serial="549"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>bec06702-dd1b-442f-b384-24b023a4023b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e93-0-6a1eb64f39ea5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e93-0-6a1eb64f39ea5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e93-0-6a1eb64f39ea5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e93-0-6a1eb64f39ea5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e93-0-6a1eb64f39ea5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="312" seconds="1204061488" serial="550"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24213 comm="gconfd-2" name="linc-5e95-0-289db3b4c3f9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="312" seconds="1204061488" serial="550"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe08e80 a2=382e8c a3=b7fe46d8 items=0 ppid=1 pid=24213 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="312" seconds="1204061488" serial="550"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>b0198066-7382-4f8d-8643-dc47d07d9765</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e95-0-289db3b4c3f9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e95-0-289db3b4c3f9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e95-0-289db3b4c3f9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e95-0-289db3b4c3f9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e95-0-289db3b4c3f9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="357" seconds="1204061488" serial="551"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24215 comm="gconfd-2" name="linc-5e97-0-26dea6eb573de" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="357" seconds="1204061488" serial="551"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff88800 a2=382e8c a3=b7f656d8 items=0 ppid=24214 pid=24215 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="357" seconds="1204061488" serial="551"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>4856e849-6b26-4ebb-b278-8b011621ab00</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e97-0-26dea6eb573de</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e97-0-26dea6eb573de'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e97-0-26dea6eb573de). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e97-0-26dea6eb573de). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e97-0-26dea6eb573de</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="426" seconds="1204061488" serial="552"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24217 comm="gconfd-2" name="linc-5e99-0-25e4be8268171" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="426" seconds="1204061488" serial="552"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbfd470 a2=382e8c a3=b80d86d8 items=0 ppid=1 pid=24217 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="426" seconds="1204061488" serial="552"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>6f4786dc-ef4f-4061-8913-528c79782056</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e99-0-25e4be8268171</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e99-0-25e4be8268171'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e99-0-25e4be8268171). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e99-0-25e4be8268171). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e99-0-25e4be8268171</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="470" seconds="1204061488" serial="553"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24219 comm="gconfd-2" name="linc-5e9b-0-5ea1d99f72d74" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="470" seconds="1204061488" serial="553"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd4f5d0 a2=382e8c a3=b7f2a6d8 items=0 ppid=24218 pid=24219 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="470" seconds="1204061488" serial="553"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>9298214f-bd20-4f1a-afe1-76854066ad7f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9b-0-5ea1d99f72d74</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e9b-0-5ea1d99f72d74'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e9b-0-5ea1d99f72d74). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e9b-0-5ea1d99f72d74). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9b-0-5ea1d99f72d74</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="542" seconds="1204061488" serial="554"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24221 comm="gconfd-2" name="linc-5e9d-0-58e4eb158458c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="542" seconds="1204061488" serial="554"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed6f50 a2=382e8c a3=b7fb26d8 items=0 ppid=1 pid=24221 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="542" seconds="1204061488" serial="554"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>f03901fc-19bb-4107-af20-dcd53fe8561a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9d-0-58e4eb158458c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e9d-0-58e4eb158458c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e9d-0-58e4eb158458c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e9d-0-58e4eb158458c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9d-0-58e4eb158458c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="591" seconds="1204061488" serial="555"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24223 comm="gconfd-2" name="linc-5e9f-0-2705408690514" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="591" seconds="1204061488" serial="555"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf88d110 a2=382e8c a3=b7f6a6d8 items=0 ppid=1 pid=24223 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="591" seconds="1204061488" serial="555"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>6fae2408-e1ce-4e0d-9862-acb0a53297c8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9f-0-2705408690514</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5e9f-0-2705408690514'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5e9f-0-2705408690514). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5e9f-0-2705408690514). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5e9f-0-2705408690514</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="663" seconds="1204061488" serial="556"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24225 comm="gconfd-2" name="linc-5ea1-0-7d45c75ea1eb6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="663" seconds="1204061488" serial="556"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfce4560 a2=382e8c a3=b7fbf6d8 items=0 ppid=1 pid=24225 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="663" seconds="1204061488" serial="556"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>f6845031-fa87-4f33-b7f7-65931bd43c80</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea1-0-7d45c75ea1eb6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ea1-0-7d45c75ea1eb6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ea1-0-7d45c75ea1eb6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ea1-0-7d45c75ea1eb6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea1-0-7d45c75ea1eb6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="711" seconds="1204061488" serial="557"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24227 comm="gconfd-2" name="linc-5ea3-0-42ae53fdad91e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="711" seconds="1204061488" serial="557"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbe1460 a2=382e8c a3=b7fbc6d8 items=0 ppid=1 pid=24227 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="711" seconds="1204061488" serial="557"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>36096599-7b6b-4936-ba5b-7b1d0660e1c9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea3-0-42ae53fdad91e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ea3-0-42ae53fdad91e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ea3-0-42ae53fdad91e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ea3-0-42ae53fdad91e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea3-0-42ae53fdad91e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="773" seconds="1204061488" serial="558"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24229 comm="gconfd-2" name="linc-5ea5-0-431ec1c6bcdc4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="773" seconds="1204061488" serial="558"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8298a0 a2=382e8c a3=b80076d8 items=0 ppid=1 pid=24229 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="773" seconds="1204061488" serial="558"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>b8d52eda-9f26-4e38-a445-e2f9afaeb9d0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea5-0-431ec1c6bcdc4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ea5-0-431ec1c6bcdc4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ea5-0-431ec1c6bcdc4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ea5-0-431ec1c6bcdc4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea5-0-431ec1c6bcdc4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="829" seconds="1204061488" serial="559"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24231 comm="gconfd-2" name="linc-5ea7-0-34401e17ca835" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="829" seconds="1204061488" serial="559"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc314b0 a2=382e8c a3=b7f0c6d8 items=0 ppid=1 pid=24231 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="829" seconds="1204061488" serial="559"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>aabfd835-9023-4548-a1e5-2c72d4335287</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea7-0-34401e17ca835</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ea7-0-34401e17ca835'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ea7-0-34401e17ca835). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ea7-0-34401e17ca835). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea7-0-34401e17ca835</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="893" seconds="1204061488" serial="560"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24233 comm="gconfd-2" name="linc-5ea9-0-6067e640da311" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="893" seconds="1204061488" serial="560"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9da250 a2=382e8c a3=b80b76d8 items=0 ppid=1 pid=24233 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="893" seconds="1204061488" serial="560"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>f4cacaae-988b-4578-a5bf-57f8126da4e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea9-0-6067e640da311</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ea9-0-6067e640da311'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ea9-0-6067e640da311). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ea9-0-6067e640da311). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ea9-0-6067e640da311</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="941" seconds="1204061488" serial="561"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24235 comm="gconfd-2" name="linc-5eab-0-3f7d77ebe5f49" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="941" seconds="1204061488" serial="561"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf884100 a2=382e8c a3=b80616d8 items=0 ppid=24234 pid=24235 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="941" seconds="1204061488" serial="561"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:28Z</last_seen_date> > <local_id>0708cd3f-11d7-4c7a-bf23-a99ed4788267</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eab-0-3f7d77ebe5f49</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eab-0-3f7d77ebe5f49'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eab-0-3f7d77ebe5f49). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eab-0-3f7d77ebe5f49). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eab-0-3f7d77ebe5f49</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="6" seconds="1204061489" serial="562"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24237 comm="gconfd-2" name="linc-5ead-0-d51dd351a9f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="6" seconds="1204061489" serial="562"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa472c0 a2=382e8c a3=b80226d8 items=0 ppid=1 pid=24237 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="6" seconds="1204061489" serial="562"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>04237b37-ea35-4754-a543-5f71dc2ad154</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ead-0-d51dd351a9f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ead-0-d51dd351a9f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ead-0-d51dd351a9f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ead-0-d51dd351a9f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ead-0-d51dd351a9f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="60" seconds="1204061489" serial="563"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24239 comm="gconfd-2" name="linc-5eaf-0-34ded34fed88" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="60" seconds="1204061489" serial="563"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89c640 a2=382e8c a3=b80786d8 items=0 ppid=24238 pid=24239 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="60" seconds="1204061489" serial="563"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>6382b4ba-b2e5-4831-8380-3b4615bc7e3c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eaf-0-34ded34fed88</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eaf-0-34ded34fed88'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eaf-0-34ded34fed88). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eaf-0-34ded34fed88). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eaf-0-34ded34fed88</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="123" seconds="1204061489" serial="564"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24241 comm="gconfd-2" name="linc-5eb1-0-18af239b1e396" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="123" seconds="1204061489" serial="564"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeef770 a2=382e8c a3=b80ca6d8 items=0 ppid=1 pid=24241 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="123" seconds="1204061489" serial="564"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>a264c2be-e242-4385-be41-7636e00e74b9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb1-0-18af239b1e396</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eb1-0-18af239b1e396'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eb1-0-18af239b1e396). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eb1-0-18af239b1e396). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb1-0-18af239b1e396</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="182" seconds="1204061489" serial="565"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24243 comm="gconfd-2" name="linc-5eb3-0-1af09e1c2ca54" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="182" seconds="1204061489" serial="565"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfba1c20 a2=382e8c a3=b807d6d8 items=0 ppid=1 pid=24243 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="182" seconds="1204061489" serial="565"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>7bd28a60-a572-408e-9d40-d13be6d6573e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb3-0-1af09e1c2ca54</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eb3-0-1af09e1c2ca54'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eb3-0-1af09e1c2ca54). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eb3-0-1af09e1c2ca54). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb3-0-1af09e1c2ca54</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="239" seconds="1204061489" serial="566"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24245 comm="gconfd-2" name="linc-5eb5-0-65bc5f2c3a6a6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="239" seconds="1204061489" serial="566"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbe1c60 a2=382e8c a3=b7fbf6d8 items=0 ppid=1 pid=24245 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="239" seconds="1204061489" serial="566"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>516555b7-f86c-4eed-8007-93c2f5fff781</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb5-0-65bc5f2c3a6a6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eb5-0-65bc5f2c3a6a6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eb5-0-65bc5f2c3a6a6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eb5-0-65bc5f2c3a6a6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb5-0-65bc5f2c3a6a6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="287" seconds="1204061489" serial="567"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24247 comm="gconfd-2" name="linc-5eb7-0-522ad8264635f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="287" seconds="1204061489" serial="567"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9a3220 a2=382e8c a3=b7f806d8 items=0 ppid=1 pid=24247 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="287" seconds="1204061489" serial="567"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>eb3b3edb-966c-4354-b71d-1b2dbde19aae</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb7-0-522ad8264635f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eb7-0-522ad8264635f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eb7-0-522ad8264635f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eb7-0-522ad8264635f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb7-0-522ad8264635f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="362" seconds="1204061489" serial="568"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24249 comm="gconfd-2" name="linc-5eb9-0-71bd9b8a5883f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="362" seconds="1204061489" serial="568"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf878e90 a2=382e8c a3=b80566d8 items=0 ppid=1 pid=24249 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="362" seconds="1204061489" serial="568"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>8022d165-bdf7-4b71-bbb9-f0c41e429ba2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb9-0-71bd9b8a5883f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eb9-0-71bd9b8a5883f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eb9-0-71bd9b8a5883f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eb9-0-71bd9b8a5883f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eb9-0-71bd9b8a5883f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="410" seconds="1204061489" serial="569"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24251 comm="gconfd-2" name="linc-5ebb-0-6ea7162764440" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="410" seconds="1204061489" serial="569"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8690e0 a2=382e8c a3=b7f466d8 items=0 ppid=24250 pid=24251 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="410" seconds="1204061489" serial="569"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>a283353e-ed52-4d18-894b-3dc84168dcc6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebb-0-6ea7162764440</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ebb-0-6ea7162764440'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ebb-0-6ea7162764440). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ebb-0-6ea7162764440). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebb-0-6ea7162764440</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="480" seconds="1204061489" serial="570"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24253 comm="gconfd-2" name="linc-5ebd-0-4205d53c7568a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="480" seconds="1204061489" serial="570"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa82b00 a2=382e8c a3=b7f606d8 items=0 ppid=1 pid=24253 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="480" seconds="1204061489" serial="570"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>0a0bc3b9-7ab4-45d1-b9a8-272db645407e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebd-0-4205d53c7568a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ebd-0-4205d53c7568a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ebd-0-4205d53c7568a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ebd-0-4205d53c7568a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebd-0-4205d53c7568a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="533" seconds="1204061489" serial="571"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24255 comm="gconfd-2" name="linc-5ebf-0-7ac3b28982242" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="533" seconds="1204061489" serial="571"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff01f80 a2=382e8c a3=b7fdf6d8 items=0 ppid=24254 pid=24255 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="533" seconds="1204061489" serial="571"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>98e04b92-ec47-40d6-9e70-f9d28a557d40</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebf-0-7ac3b28982242</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ebf-0-7ac3b28982242'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ebf-0-7ac3b28982242). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ebf-0-7ac3b28982242). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ebf-0-7ac3b28982242</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="599" seconds="1204061489" serial="572"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24257 comm="gconfd-2" name="linc-5ec1-0-5941663923c9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061489" serial="572"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdcbe50 a2=382e8c a3=b7fa96d8 items=0 ppid=1 pid=24257 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="599" seconds="1204061489" serial="572"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>b8456977-e2bc-447d-9dba-1ce37f3946f3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec1-0-5941663923c9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ec1-0-5941663923c9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ec1-0-5941663923c9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ec1-0-5941663923c9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec1-0-5941663923c9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="650" seconds="1204061489" serial="573"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24259 comm="gconfd-2" name="linc-5ec3-0-5feb3b1f9eba9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="650" seconds="1204061489" serial="573"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfacb340 a2=382e8c a3=b80a66d8 items=0 ppid=24258 pid=24259 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="650" seconds="1204061489" serial="573"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>bbc6bc6e-0d80-4bbb-bafb-a23220b4950d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec3-0-5feb3b1f9eba9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ec3-0-5feb3b1f9eba9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ec3-0-5feb3b1f9eba9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ec3-0-5feb3b1f9eba9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec3-0-5feb3b1f9eba9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="718" seconds="1204061489" serial="574"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24261 comm="gconfd-2" name="linc-5ec5-0-73eec890af78b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="718" seconds="1204061489" serial="574"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9369b0 a2=382e8c a3=b7f146d8 items=0 ppid=1 pid=24261 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="718" seconds="1204061489" serial="574"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>60d8fd16-a129-4fe0-aa99-7d50a36d1420</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec5-0-73eec890af78b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ec5-0-73eec890af78b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ec5-0-73eec890af78b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ec5-0-73eec890af78b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec5-0-73eec890af78b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="769" seconds="1204061489" serial="575"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24263 comm="gconfd-2" name="linc-5ec7-0-630bb861bbd0d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="769" seconds="1204061489" serial="575"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffff080 a2=382e8c a3=b7fda6d8 items=0 ppid=24262 pid=24263 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="769" seconds="1204061489" serial="575"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>acbfcf84-4d27-47d5-ab36-9d54ed535144</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec7-0-630bb861bbd0d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ec7-0-630bb861bbd0d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ec7-0-630bb861bbd0d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ec7-0-630bb861bbd0d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec7-0-630bb861bbd0d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="838" seconds="1204061489" serial="576"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24265 comm="gconfd-2" name="linc-5ec9-0-a99f6abccc15" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="838" seconds="1204061489" serial="576"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfae1b60 a2=382e8c a3=b80bd6d8 items=0 ppid=1 pid=24265 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="838" seconds="1204061489" serial="576"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>1bd3eb61-756e-4b92-85df-b3c92bfdf69d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec9-0-a99f6abccc15</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ec9-0-a99f6abccc15'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ec9-0-a99f6abccc15). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ec9-0-a99f6abccc15). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ec9-0-a99f6abccc15</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="887" seconds="1204061489" serial="577"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24267 comm="gconfd-2" name="linc-5ecb-0-7894c302d8b29" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="887" seconds="1204061489" serial="577"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb98410 a2=382e8c a3=b80736d8 items=0 ppid=24266 pid=24267 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="887" seconds="1204061489" serial="577"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>a008e637-a06f-48ee-a8f2-8928a05c0e48</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecb-0-7894c302d8b29</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ecb-0-7894c302d8b29'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ecb-0-7894c302d8b29). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ecb-0-7894c302d8b29). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecb-0-7894c302d8b29</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="952" seconds="1204061489" serial="578"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24269 comm="gconfd-2" name="linc-5ecd-0-4dbf3559e86f5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="952" seconds="1204061489" serial="578"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc63ce0 a2=382e8c a3=b803f6d8 items=0 ppid=1 pid=24269 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="952" seconds="1204061489" serial="578"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:29Z</last_seen_date> > <local_id>8db8c622-b587-4060-8c18-c04a292a8671</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecd-0-4dbf3559e86f5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ecd-0-4dbf3559e86f5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ecd-0-4dbf3559e86f5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ecd-0-4dbf3559e86f5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecd-0-4dbf3559e86f5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="4" seconds="1204061490" serial="579"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24271 comm="gconfd-2" name="linc-5ecf-0-507bacca12a0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="4" seconds="1204061490" serial="579"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe03680 a2=382e8c a3=b7fe06d8 items=0 ppid=24270 pid=24271 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="4" seconds="1204061490" serial="579"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>5d3b263c-9560-4ce0-8c54-dd85e0754fe8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecf-0-507bacca12a0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ecf-0-507bacca12a0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ecf-0-507bacca12a0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ecf-0-507bacca12a0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ecf-0-507bacca12a0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="71" seconds="1204061490" serial="580"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24273 comm="gconfd-2" name="linc-5ed1-0-49e6b1f1150e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="71" seconds="1204061490" serial="580"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc98510 a2=382e8c a3=b80756d8 items=0 ppid=1 pid=24273 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="71" seconds="1204061490" serial="580"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>510d42c7-da14-40ff-ac44-c15e15b580f7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed1-0-49e6b1f1150e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ed1-0-49e6b1f1150e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ed1-0-49e6b1f1150e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ed1-0-49e6b1f1150e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed1-0-49e6b1f1150e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="113" seconds="1204061490" serial="581"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24275 comm="gconfd-2" name="linc-5ed3-0-1d7101251b9c1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="113" seconds="1204061490" serial="581"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa9d7b0 a2=382e8c a3=b7f786d8 items=0 ppid=24274 pid=24275 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="113" seconds="1204061490" serial="581"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>1f84b5d4-6591-444d-ab85-00f396f50ec5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed3-0-1d7101251b9c1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ed3-0-1d7101251b9c1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ed3-0-1d7101251b9c1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ed3-0-1d7101251b9c1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed3-0-1d7101251b9c1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="189" seconds="1204061490" serial="582"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24277 comm="gconfd-2" name="linc-5ed5-0-56e4f4082e529" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="189" seconds="1204061490" serial="582"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe24ea0 a2=382e8c a3=b7f026d8 items=0 ppid=1 pid=24277 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="189" seconds="1204061490" serial="582"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>79dbf8d3-f9a7-481d-947b-97c479528ec4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed5-0-56e4f4082e529</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ed5-0-56e4f4082e529'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ed5-0-56e4f4082e529). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ed5-0-56e4f4082e529). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed5-0-56e4f4082e529</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="235" seconds="1204061490" serial="583"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24279 comm="gconfd-2" name="linc-5ed7-0-c1d47b039938" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="235" seconds="1204061490" serial="583"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96c9e0 a2=382e8c a3=b80486d8 items=0 ppid=24278 pid=24279 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="235" seconds="1204061490" serial="583"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>cda8c5aa-a867-4dab-998a-0f2258417659</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed7-0-c1d47b039938</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ed7-0-c1d47b039938'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ed7-0-c1d47b039938). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ed7-0-c1d47b039938). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed7-0-c1d47b039938</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="308" seconds="1204061490" serial="584"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24281 comm="gconfd-2" name="linc-5ed9-0-6594b9da4b30c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="308" seconds="1204061490" serial="584"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc9ed20 a2=382e8c a3=b807a6d8 items=0 ppid=1 pid=24281 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="308" seconds="1204061490" serial="584"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>fa627ec0-8c08-44a0-ba1a-abb5a2ae3f22</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed9-0-6594b9da4b30c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ed9-0-6594b9da4b30c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ed9-0-6594b9da4b30c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ed9-0-6594b9da4b30c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ed9-0-6594b9da4b30c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="360" seconds="1204061490" serial="585"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24283 comm="gconfd-2" name="linc-5edb-0-45003bcd5802c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="360" seconds="1204061490" serial="585"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea1cd0 a2=382e8c a3=b7f7e6d8 items=0 ppid=1 pid=24283 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="360" seconds="1204061490" serial="585"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>cbf07ab3-41f7-42cf-9886-d56b728dcea7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edb-0-45003bcd5802c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5edb-0-45003bcd5802c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5edb-0-45003bcd5802c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5edb-0-45003bcd5802c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edb-0-45003bcd5802c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="420" seconds="1204061490" serial="586"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24285 comm="gconfd-2" name="linc-5edd-0-762ad08b66902" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="420" seconds="1204061490" serial="586"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcfd570 a2=382e8c a3=b80d86d8 items=0 ppid=1 pid=24285 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="420" seconds="1204061490" serial="586"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>771953a8-ad4b-46ce-97c4-43d14cb29db9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edd-0-762ad08b66902</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5edd-0-762ad08b66902'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5edd-0-762ad08b66902). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5edd-0-762ad08b66902). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edd-0-762ad08b66902</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="473" seconds="1204061490" serial="587"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24287 comm="gconfd-2" name="linc-5edf-0-b55608738d0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="473" seconds="1204061490" serial="587"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc5b4d0 a2=382e8c a3=b80366d8 items=0 ppid=1 pid=24287 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="473" seconds="1204061490" serial="587"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>32b1258f-af66-4cf6-a1bc-7a4d3b65d28f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edf-0-b55608738d0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5edf-0-b55608738d0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5edf-0-b55608738d0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5edf-0-b55608738d0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5edf-0-b55608738d0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="536" seconds="1204061490" serial="588"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24289 comm="gconfd-2" name="linc-5ee1-0-3f3a4963830d7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="536" seconds="1204061490" serial="588"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb09380 a2=382e8c a3=b7fe46d8 items=0 ppid=1 pid=24289 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="536" seconds="1204061490" serial="588"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>8f582f63-a7e6-490a-b307-6a0fb8c23fe2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee1-0-3f3a4963830d7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ee1-0-3f3a4963830d7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ee1-0-3f3a4963830d7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ee1-0-3f3a4963830d7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee1-0-3f3a4963830d7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="594" seconds="1204061490" serial="589"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24291 comm="gconfd-2" name="linc-5ee3-0-3f613883913c3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="594" seconds="1204061490" serial="589"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff1bfa0 a2=382e8c a3=b7ff96d8 items=0 ppid=1 pid=24291 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="594" seconds="1204061490" serial="589"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>8a9f5726-1dd3-4976-9ab4-9c0f43db65d4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee3-0-3f613883913c3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ee3-0-3f613883913c3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ee3-0-3f613883913c3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ee3-0-3f613883913c3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee3-0-3f613883913c3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="645" seconds="1204061490" serial="590"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24293 comm="gconfd-2" name="linc-5ee5-0-3b46a2d49da98" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="645" seconds="1204061490" serial="590"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdc6640 a2=382e8c a3=b7fa16d8 items=0 ppid=1 pid=24293 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="645" seconds="1204061490" serial="590"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>780674cb-2006-4e19-8cab-ea88dfd95e71</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee5-0-3b46a2d49da98</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ee5-0-3b46a2d49da98'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ee5-0-3b46a2d49da98). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ee5-0-3b46a2d49da98). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee5-0-3b46a2d49da98</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="709" seconds="1204061490" serial="591"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24295 comm="gconfd-2" name="linc-5ee7-0-60bbd89dad1b3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="709" seconds="1204061490" serial="591"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcde560 a2=382e8c a3=b80b96d8 items=0 ppid=1 pid=24295 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="709" seconds="1204061490" serial="591"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>d7b0a2f6-6e55-407d-bac4-b45878491dd0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee7-0-60bbd89dad1b3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ee7-0-60bbd89dad1b3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ee7-0-60bbd89dad1b3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ee7-0-60bbd89dad1b3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee7-0-60bbd89dad1b3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="765" seconds="1204061490" serial="592"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24297 comm="gconfd-2" name="linc-5ee9-0-778a680fbae6e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="765" seconds="1204061490" serial="592"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfceed70 a2=382e8c a3=b80ca6d8 items=0 ppid=1 pid=24297 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="765" seconds="1204061490" serial="592"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>a82136b1-6656-4ce0-864b-fbff2ab075ad</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee9-0-778a680fbae6e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ee9-0-778a680fbae6e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ee9-0-778a680fbae6e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ee9-0-778a680fbae6e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ee9-0-778a680fbae6e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="819" seconds="1204061490" serial="593"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24299 comm="gconfd-2" name="linc-5eeb-0-7b93dd77c7f09" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="819" seconds="1204061490" serial="593"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe636e0 a2=382e8c a3=b7f3e6d8 items=0 ppid=1 pid=24299 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="819" seconds="1204061490" serial="593"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>6208aa2e-0c93-4e87-b2cb-65badd3e3846</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eeb-0-7b93dd77c7f09</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eeb-0-7b93dd77c7f09'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eeb-0-7b93dd77c7f09). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eeb-0-7b93dd77c7f09). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eeb-0-7b93dd77c7f09</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="882" seconds="1204061490" serial="594"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24301 comm="gconfd-2" name="linc-5eed-0-6c68cfc1d773d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="882" seconds="1204061490" serial="594"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9329b0 a2=382e8c a3=b80106d8 items=0 ppid=1 pid=24301 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="882" seconds="1204061490" serial="594"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>e201078b-4f69-4171-bd86-8efdd8b14ff2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eed-0-6c68cfc1d773d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eed-0-6c68cfc1d773d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eed-0-6c68cfc1d773d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eed-0-6c68cfc1d773d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eed-0-6c68cfc1d773d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="938" seconds="1204061490" serial="595"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24303 comm="gconfd-2" name="linc-5eef-0-42c2109de52c4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="938" seconds="1204061490" serial="595"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc0b480 a2=382e8c a3=b7fe86d8 items=0 ppid=1 pid=24303 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="938" seconds="1204061490" serial="595"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:30Z</last_seen_date> > <local_id>7bca2163-0c39-424a-a7c2-553b2ff22b55</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eef-0-42c2109de52c4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eef-0-42c2109de52c4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eef-0-42c2109de52c4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eef-0-42c2109de52c4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eef-0-42c2109de52c4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="2" seconds="1204061491" serial="596"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24305 comm="gconfd-2" name="linc-5ef1-0-5e0a0a7eadc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="2" seconds="1204061491" serial="596"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8320b0 a2=382e8c a3=b800d6d8 items=0 ppid=1 pid=24305 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="2" seconds="1204061491" serial="596"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>158f111f-c9d7-43be-b956-f375c6265a28</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef1-0-5e0a0a7eadc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ef1-0-5e0a0a7eadc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ef1-0-5e0a0a7eadc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ef1-0-5e0a0a7eadc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef1-0-5e0a0a7eadc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="50" seconds="1204061491" serial="597"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24307 comm="gconfd-2" name="linc-5ef3-0-5080287ac4fc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="50" seconds="1204061491" serial="597"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff9e820 a2=382e8c a3=b807b6d8 items=0 ppid=1 pid=24307 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="50" seconds="1204061491" serial="597"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>adaf737f-6607-4434-a42d-e6716e5fe648</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef3-0-5080287ac4fc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ef3-0-5080287ac4fc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ef3-0-5080287ac4fc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ef3-0-5080287ac4fc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef3-0-5080287ac4fc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="112" seconds="1204061491" serial="598"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24309 comm="gconfd-2" name="linc-5ef5-0-6407a7621b743" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="112" seconds="1204061491" serial="598"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf986200 a2=382e8c a3=b80636d8 items=0 ppid=1 pid=24309 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="112" seconds="1204061491" serial="598"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>06382e8e-ce15-43d3-8e1b-ff605bd9ed84</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef5-0-6407a7621b743</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ef5-0-6407a7621b743'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ef5-0-6407a7621b743). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ef5-0-6407a7621b743). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef5-0-6407a7621b743</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="165" seconds="1204061491" serial="599"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24311 comm="gconfd-2" name="linc-5ef7-0-376579d285f1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="165" seconds="1204061491" serial="599"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdf1e70 a2=382e8c a3=b80cf6d8 items=0 ppid=1 pid=24311 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="165" seconds="1204061491" serial="599"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>9eac5374-26da-40d4-969b-3afddfc65a6a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef7-0-376579d285f1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ef7-0-376579d285f1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ef7-0-376579d285f1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ef7-0-376579d285f1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef7-0-376579d285f1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="228" seconds="1204061491" serial="600"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24313 comm="gconfd-2" name="linc-5ef9-0-1b08f80237d70" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="228" seconds="1204061491" serial="600"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfce4560 a2=382e8c a3=b7fc16d8 items=0 ppid=1 pid=24313 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="228" seconds="1204061491" serial="600"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>d1d5bd96-b1d8-4c81-b5fb-e93101e2ec40</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef9-0-1b08f80237d70</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5ef9-0-1b08f80237d70'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5ef9-0-1b08f80237d70). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5ef9-0-1b08f80237d70). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5ef9-0-1b08f80237d70</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="286" seconds="1204061491" serial="601"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24315 comm="gconfd-2" name="linc-5efb-0-5027cbe94600f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="286" seconds="1204061491" serial="601"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf897110 a2=382e8c a3=b7f746d8 items=0 ppid=1 pid=24315 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="286" seconds="1204061491" serial="601"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>7e4c944c-fc30-4da3-a9d5-056b85a6a177</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5efb-0-5027cbe94600f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5efb-0-5027cbe94600f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5efb-0-5027cbe94600f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5efb-0-5027cbe94600f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5efb-0-5027cbe94600f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="341" seconds="1204061491" serial="602"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24317 comm="gconfd-2" name="linc-5efd-0-113ddce853440" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="341" seconds="1204061491" serial="602"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdc3640 a2=382e8c a3=b80a06d8 items=0 ppid=1 pid=24317 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="341" seconds="1204061491" serial="602"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>c48aac4b-2283-4a12-bfd8-87307c02dbaa</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5efd-0-113ddce853440</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5efd-0-113ddce853440'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5efd-0-113ddce853440). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5efd-0-113ddce853440). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5efd-0-113ddce853440</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="398" seconds="1204061491" serial="603"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24319 comm="gconfd-2" name="linc-5eff-0-433478de61550" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="398" seconds="1204061491" serial="603"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd0ad80 a2=382e8c a3=b7ee86d8 items=0 ppid=1 pid=24319 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="398" seconds="1204061491" serial="603"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>300f313e-39d5-4130-9375-077c11d8d9bb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eff-0-433478de61550</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5eff-0-433478de61550'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5eff-0-433478de61550). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5eff-0-433478de61550). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5eff-0-433478de61550</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="469" seconds="1204061491" serial="604"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24321 comm="gconfd-2" name="linc-5f01-0-24f7ab7272af5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="469" seconds="1204061491" serial="604"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf918190 a2=382e8c a3=b7ef36d8 items=0 ppid=1 pid=24321 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="469" seconds="1204061491" serial="604"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>9f766ebd-e2ae-4c46-8f1c-91b34bbe45e8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f01-0-24f7ab7272af5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f01-0-24f7ab7272af5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f01-0-24f7ab7272af5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f01-0-24f7ab7272af5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f01-0-24f7ab7272af5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="517" seconds="1204061491" serial="605"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24323 comm="gconfd-2" name="linc-5f03-0-3309b13a7e6c0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="517" seconds="1204061491" serial="605"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdff680 a2=382e8c a3=b7edc6d8 items=0 ppid=1 pid=24323 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="517" seconds="1204061491" serial="605"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>a22f80ca-95ab-4d5e-8bb3-e922f90302b9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f03-0-3309b13a7e6c0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f03-0-3309b13a7e6c0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f03-0-3309b13a7e6c0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f03-0-3309b13a7e6c0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f03-0-3309b13a7e6c0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="586" seconds="1204061491" serial="606"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24325 comm="gconfd-2" name="linc-5f05-0-3f929aef8f1c1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="586" seconds="1204061491" serial="606"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfafdb80 a2=382e8c a3=b7fdb6d8 items=0 ppid=1 pid=24325 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="586" seconds="1204061491" serial="606"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>10e869b2-8db2-4591-8d8a-2537abedc523</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f05-0-3f929aef8f1c1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f05-0-3f929aef8f1c1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f05-0-3f929aef8f1c1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f05-0-3f929aef8f1c1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f05-0-3f929aef8f1c1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="633" seconds="1204061491" serial="607"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24327 comm="gconfd-2" name="linc-5f07-0-68a612a9aa48" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="633" seconds="1204061491" serial="607"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd475c0 a2=382e8c a3=b80246d8 items=0 ppid=24326 pid=24327 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="633" seconds="1204061491" serial="607"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>515a60e5-bec8-4d4e-8c64-5a8af97e4c89</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f07-0-68a612a9aa48</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f07-0-68a612a9aa48'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f07-0-68a612a9aa48). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f07-0-68a612a9aa48). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f07-0-68a612a9aa48</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="698" seconds="1204061491" serial="608"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24329 comm="gconfd-2" name="linc-5f09-0-2ed2dbbfaa76e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="698" seconds="1204061491" serial="608"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8730f0 a2=382e8c a3=b80506d8 items=0 ppid=1 pid=24329 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="698" seconds="1204061491" serial="608"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>bfceebcc-3f8b-4c5a-9499-a3f7a9586455</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f09-0-2ed2dbbfaa76e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f09-0-2ed2dbbfaa76e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f09-0-2ed2dbbfaa76e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f09-0-2ed2dbbfaa76e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f09-0-2ed2dbbfaa76e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="748" seconds="1204061491" serial="609"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24331 comm="gconfd-2" name="linc-5f0b-0-73a4747cb6a49" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="748" seconds="1204061491" serial="609"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff0c780 a2=382e8c a3=b7ee76d8 items=0 ppid=1 pid=24331 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="748" seconds="1204061491" serial="609"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>46265616-2304-4154-9363-fce302fe6eed</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0b-0-73a4747cb6a49</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f0b-0-73a4747cb6a49'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f0b-0-73a4747cb6a49). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f0b-0-73a4747cb6a49). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0b-0-73a4747cb6a49</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="814" seconds="1204061491" serial="610"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24333 comm="gconfd-2" name="linc-5f0d-0-2746263dc6be5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="814" seconds="1204061491" serial="610"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd6f5f0 a2=382e8c a3=b804a6d8 items=0 ppid=1 pid=24333 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="814" seconds="1204061491" serial="610"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>ce40d525-0f41-4298-b47d-34003c64356a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0d-0-2746263dc6be5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f0d-0-2746263dc6be5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f0d-0-2746263dc6be5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f0d-0-2746263dc6be5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0d-0-2746263dc6be5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="870" seconds="1204061491" serial="611"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24335 comm="gconfd-2" name="linc-5f0f-0-13c05ff6d490a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="870" seconds="1204061491" serial="611"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc3840 a2=382e8c a3=b7fa06d8 items=0 ppid=1 pid=24335 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="870" seconds="1204061491" serial="611"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>86087eb2-40e9-413e-8efe-f8ac62f80fc2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0f-0-13c05ff6d490a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f0f-0-13c05ff6d490a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f0f-0-13c05ff6d490a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f0f-0-13c05ff6d490a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f0f-0-13c05ff6d490a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="928" seconds="1204061491" serial="612"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24337 comm="gconfd-2" name="linc-5f11-0-31c74c18e29e1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="928" seconds="1204061491" serial="612"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf98aa00 a2=382e8c a3=b7f666d8 items=0 ppid=1 pid=24337 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="928" seconds="1204061491" serial="612"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>1078faca-146d-4446-8d6c-78ccc29c91d8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f11-0-31c74c18e29e1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f11-0-31c74c18e29e1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f11-0-31c74c18e29e1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f11-0-31c74c18e29e1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f11-0-31c74c18e29e1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="981" seconds="1204061491" serial="613"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24339 comm="gconfd-2" name="linc-5f13-0-71a9c70def8ff" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="981" seconds="1204061491" serial="613"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb9f30 a2=382e8c a3=b7f956d8 items=0 ppid=1 pid=24339 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="981" seconds="1204061491" serial="613"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:31Z</last_seen_date> > <local_id>e98afda5-80b7-4f00-9ca5-2256792c82ec</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f13-0-71a9c70def8ff</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f13-0-71a9c70def8ff'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f13-0-71a9c70def8ff). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f13-0-71a9c70def8ff). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f13-0-71a9c70def8ff</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="48" seconds="1204061492" serial="614"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24341 comm="gconfd-2" name="linc-5f15-0-41dac65bbd29" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="48" seconds="1204061492" serial="614"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc96d10 a2=382e8c a3=b80746d8 items=0 ppid=1 pid=24341 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="48" seconds="1204061492" serial="614"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>fc5b9acb-8181-465c-825a-3de3fd033c8b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f15-0-41dac65bbd29</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f15-0-41dac65bbd29'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f15-0-41dac65bbd29). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f15-0-41dac65bbd29). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f15-0-41dac65bbd29</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="99" seconds="1204061492" serial="615"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24343 comm="gconfd-2" name="linc-5f17-0-1811ada3183ac" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="99" seconds="1204061492" serial="615"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfecdf50 a2=382e8c a3=b80a96d8 items=0 ppid=1 pid=24343 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="99" seconds="1204061492" serial="615"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>3fd40dbd-4efd-469c-97c0-67ee07e6cc4e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f17-0-1811ada3183ac</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f17-0-1811ada3183ac'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f17-0-1811ada3183ac). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f17-0-1811ada3183ac). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f17-0-1811ada3183ac</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="166" seconds="1204061492" serial="616"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24345 comm="gconfd-2" name="linc-5f19-0-568fedaf28a20" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="166" seconds="1204061492" serial="616"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfae4360 a2=382e8c a3=b80c16d8 items=0 ppid=1 pid=24345 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="166" seconds="1204061492" serial="616"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>239dab11-e31d-42d4-b1bf-eb24d2efde75</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f19-0-568fedaf28a20</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f19-0-568fedaf28a20'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f19-0-568fedaf28a20). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f19-0-568fedaf28a20). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f19-0-568fedaf28a20</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="218" seconds="1204061492" serial="617"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24347 comm="gconfd-2" name="linc-5f1b-0-4446f19535694" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="218" seconds="1204061492" serial="617"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc30cb0 a2=382e8c a3=b800e6d8 items=0 ppid=1 pid=24347 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="218" seconds="1204061492" serial="617"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>ed766985-d359-4ba0-9f73-921dbb0c4ce5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1b-0-4446f19535694</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f1b-0-4446f19535694'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f1b-0-4446f19535694). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f1b-0-4446f19535694). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1b-0-4446f19535694</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="287" seconds="1204061492" serial="618"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24349 comm="gconfd-2" name="linc-5f1d-0-2b534265461f0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="287" seconds="1204061492" serial="618"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe706f0 a2=382e8c a3=b7f4d6d8 items=0 ppid=1 pid=24349 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="287" seconds="1204061492" serial="618"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>e399de06-fda8-4dcc-8363-87202cd20173</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1d-0-2b534265461f0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f1d-0-2b534265461f0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f1d-0-2b534265461f0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f1d-0-2b534265461f0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1d-0-2b534265461f0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="336" seconds="1204061492" serial="619"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24351 comm="gconfd-2" name="linc-5f1f-0-51c52c65229e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="336" seconds="1204061492" serial="619"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc87500 a2=382e8c a3=b7f626d8 items=0 ppid=1 pid=24351 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="336" seconds="1204061492" serial="619"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>5d6d02cc-5ced-45ca-9547-9425e4638302</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1f-0-51c52c65229e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f1f-0-51c52c65229e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f1f-0-51c52c65229e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f1f-0-51c52c65229e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f1f-0-51c52c65229e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="405" seconds="1204061492" serial="620"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24353 comm="gconfd-2" name="linc-5f21-0-1f55d62162e57" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="405" seconds="1204061492" serial="620"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf84d0c0 a2=382e8c a3=b80286d8 items=0 ppid=1 pid=24353 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="405" seconds="1204061492" serial="620"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>6dad54c5-958b-429f-9307-c2e559a8c057</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f21-0-1f55d62162e57</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f21-0-1f55d62162e57'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f21-0-1f55d62162e57). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f21-0-1f55d62162e57). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f21-0-1f55d62162e57</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="452" seconds="1204061492" serial="621"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24355 comm="gconfd-2" name="linc-5f23-0-58be6b8e6e569" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="452" seconds="1204061492" serial="621"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdf9e70 a2=382e8c a3=b7fd76d8 items=0 ppid=24354 pid=24355 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="452" seconds="1204061492" serial="621"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>4b1dbc23-86c0-42bc-a16c-bfbf4dab16bc</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f23-0-58be6b8e6e569</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f23-0-58be6b8e6e569'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f23-0-58be6b8e6e569). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f23-0-58be6b8e6e569). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f23-0-58be6b8e6e569</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="518" seconds="1204061492" serial="622"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24357 comm="gconfd-2" name="linc-5f25-0-411b7227e8f8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="518" seconds="1204061492" serial="622"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff61fe0 a2=382e8c a3=b803d6d8 items=0 ppid=1 pid=24357 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="518" seconds="1204061492" serial="622"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>4c5ebfdc-1b45-4d80-903e-22326f4c9ec9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f25-0-411b7227e8f8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f25-0-411b7227e8f8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f25-0-411b7227e8f8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f25-0-411b7227e8f8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f25-0-411b7227e8f8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="564" seconds="1204061492" serial="623"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24359 comm="gconfd-2" name="linc-5f27-0-e5fa63489ca1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="564" seconds="1204061492" serial="623"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbca440 a2=382e8c a3=b7fa76d8 items=0 ppid=24358 pid=24359 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="564" seconds="1204061492" serial="623"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>35b8e590-9a5a-43ae-9874-ea6210ac93cb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f27-0-e5fa63489ca1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f27-0-e5fa63489ca1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f27-0-e5fa63489ca1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f27-0-e5fa63489ca1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f27-0-e5fa63489ca1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="634" seconds="1204061492" serial="624"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24361 comm="gconfd-2" name="linc-5f29-0-33dfaaed9ace8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="634" seconds="1204061492" serial="624"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd34db0 a2=382e8c a3=b7f126d8 items=0 ppid=1 pid=24361 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="634" seconds="1204061492" serial="624"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>50d0d44d-7652-4910-9e1d-a01d663def39</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f29-0-33dfaaed9ace8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f29-0-33dfaaed9ace8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f29-0-33dfaaed9ace8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f29-0-33dfaaed9ace8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f29-0-33dfaaed9ace8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="680" seconds="1204061492" serial="625"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24363 comm="gconfd-2" name="linc-5f2b-0-3e2e2c57a6184" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="680" seconds="1204061492" serial="625"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb02380 a2=382e8c a3=b7edd6d8 items=0 ppid=24362 pid=24363 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="680" seconds="1204061492" serial="625"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>5ede90f4-026f-40ba-8514-fc0fd1d10fad</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2b-0-3e2e2c57a6184</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f2b-0-3e2e2c57a6184'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f2b-0-3e2e2c57a6184). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f2b-0-3e2e2c57a6184). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2b-0-3e2e2c57a6184</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="753" seconds="1204061492" serial="626"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24365 comm="gconfd-2" name="linc-5f2d-0-7858bebb7d7e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="753" seconds="1204061492" serial="626"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbaf430 a2=382e8c a3=b808c6d8 items=0 ppid=1 pid=24365 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="753" seconds="1204061492" serial="626"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>22159dfe-be25-4a9c-96f9-eb14abfc7f61</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2d-0-7858bebb7d7e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f2d-0-7858bebb7d7e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f2d-0-7858bebb7d7e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f2d-0-7858bebb7d7e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2d-0-7858bebb7d7e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="794" seconds="1204061492" serial="627"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24367 comm="gconfd-2" name="linc-5f2f-0-5c48f43ec1e6a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="794" seconds="1204061492" serial="627"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9cba50 a2=382e8c a3=b7fa96d8 items=0 ppid=24366 pid=24367 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="794" seconds="1204061492" serial="627"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>3622ff8d-d6f1-4e77-8923-546af8d914a2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2f-0-5c48f43ec1e6a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f2f-0-5c48f43ec1e6a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f2f-0-5c48f43ec1e6a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f2f-0-5c48f43ec1e6a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f2f-0-5c48f43ec1e6a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="866" seconds="1204061492" serial="628"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=24369 comm="gconfd-2" name="linc-5f31-0-33a46dffd387a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="866" seconds="1204061492" serial="628"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd9a610 a2=382e8c a3=b80776d8 items=0 ppid=1 pid=24369 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="866" seconds="1204061492" serial="628"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-26T21:31:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-26T21:31:32Z</last_seen_date> > <local_id>807d0b54-cf36-4613-acd9-094d3588b7cf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f31-0-33a46dffd387a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-5f31-0-33a46dffd387a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-5f31-0-33a46dffd387a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-5f31-0-33a46dffd387a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-5f31-0-33a46dffd387a</tpath> > </siginfo> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="93" seconds="1204155454" serial="1603"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=1 comm="init" path="inotify" dev=inotifyfs ino=1 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="93" seconds="1204155454" serial="1603"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-27T23:37:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-27T23:37:34Z</last_seen_date> > <local_id>6f323367-88fe-49b0-a22b-7bb367aae019</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="init_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="init_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="inotifyfs_t" user="system_u"/> > <tpath>inotify</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for inotify, > <p> > restorecon -v 'inotify' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by init. It is not > expected that this access is required by init and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing init (init_t) "read" to inotify (inotifyfs_t). > ]]></summary> > </solution> > <source>init</source> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="inotifyfs_t" user="system_u"/> > <tpath>inotify</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="53" seconds="1204160724" serial="1620"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5492 comm="gconfd-2" name="linc-1574-0-42e89d14d015" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="53" seconds="1204160724" serial="1620"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa40ac0 a2=382e8c a3=b801e6d8 items=0 ppid=1 pid=5492 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="53" seconds="1204160724" serial="1620"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:24Z</last_seen_date> > <local_id>0075e185-f2df-41bf-b5bd-042fb860c69e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1574-0-42e89d14d015</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1574-0-42e89d14d015'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1574-0-42e89d14d015). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1574-0-42e89d14d015). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1574-0-42e89d14d015</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="317" seconds="1204160724" serial="1621"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5509 comm="gconfd-2" name="linc-1585-0-363180f44d6f7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="317" seconds="1204160724" serial="1621"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff39fb0 a2=382e8c a3=b7f176d8 items=0 ppid=1 pid=5509 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="317" seconds="1204160724" serial="1621"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:24Z</last_seen_date> > <local_id>81bb88dd-74ff-443a-afb8-9d87438179bf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1585-0-363180f44d6f7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1585-0-363180f44d6f7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1585-0-363180f44d6f7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1585-0-363180f44d6f7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1585-0-363180f44d6f7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="438" seconds="1204160724" serial="1622"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5512 comm="gconfd-2" name="linc-1588-0-3d20e88b6af4e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="438" seconds="1204160724" serial="1622"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8dc150 a2=382e8c a3=b7fb76d8 items=0 ppid=1 pid=5512 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="438" seconds="1204160724" serial="1622"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:24Z</last_seen_date> > <local_id>8eff8ae4-67da-4ff3-96b0-5f17dbe21757</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1588-0-3d20e88b6af4e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1588-0-3d20e88b6af4e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1588-0-3d20e88b6af4e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1588-0-3d20e88b6af4e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1588-0-3d20e88b6af4e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="500" seconds="1204160724" serial="1623"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5517 comm="gconfd-2" name="linc-158d-0-6abe8857a3fc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="500" seconds="1204160724" serial="1623"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc8ca10 a2=382e8c a3=b80686d8 items=0 ppid=1 pid=5517 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="500" seconds="1204160724" serial="1623"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:24Z</last_seen_date> > <local_id>9ee91864-0276-48ac-a8c0-7da555f131a1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-158d-0-6abe8857a3fc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-158d-0-6abe8857a3fc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-158d-0-6abe8857a3fc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-158d-0-6abe8857a3fc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-158d-0-6abe8857a3fc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="612" seconds="1204160724" serial="1624"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5520 comm="gconfd-2" name="linc-1590-0-6c0ffc8e9201d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="612" seconds="1204160724" serial="1624"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf806880 a2=382e8c a3=b7fe56d8 items=0 ppid=1 pid=5520 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="612" seconds="1204160724" serial="1624"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:24Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:24Z</last_seen_date> > <local_id>93b8dac6-b937-4a8b-a5b1-26cb1c6bd526</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1590-0-6c0ffc8e9201d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1590-0-6c0ffc8e9201d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1590-0-6c0ffc8e9201d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1590-0-6c0ffc8e9201d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1590-0-6c0ffc8e9201d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="455" seconds="1204160725" serial="1625"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5553 comm="gconfd-2" name="linc-15b1-0-8dbc2416f48f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="455" seconds="1204160725" serial="1625"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa68ae0 a2=382e8c a3=b7f446d8 items=0 ppid=1 pid=5553 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="455" seconds="1204160725" serial="1625"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>960ca1b8-418c-4d82-806c-db42c5dafafe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b1-0-8dbc2416f48f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15b1-0-8dbc2416f48f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15b1-0-8dbc2416f48f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15b1-0-8dbc2416f48f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b1-0-8dbc2416f48f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="477" seconds="1204160725" serial="1626"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5555 comm="gconfd-2" name="linc-15b3-0-5b73d03b747d8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="477" seconds="1204160725" serial="1626"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffb3030 a2=382e8c a3=b7f906d8 items=0 ppid=1 pid=5555 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="477" seconds="1204160725" serial="1626"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>987a0153-2ca6-4367-8dc0-acd2f0cbd88d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b3-0-5b73d03b747d8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15b3-0-5b73d03b747d8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15b3-0-5b73d03b747d8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15b3-0-5b73d03b747d8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b3-0-5b73d03b747d8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="640" seconds="1204160725" serial="1627"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5558 comm="gconfd-2" name="linc-15b6-0-6920ce289c4af" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160725" serial="1627"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa50ad0 a2=382e8c a3=b802e6d8 items=0 ppid=1 pid=5558 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160725" serial="1627"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>600c84a0-ff53-4481-ac2f-9fd19c7b1e34</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b6-0-6920ce289c4af</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15b6-0-6920ce289c4af'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15b6-0-6920ce289c4af). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15b6-0-6920ce289c4af). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b6-0-6920ce289c4af</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="658" seconds="1204160725" serial="1628"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5560 comm="gconfd-2" name="linc-15b8-0-28e455c8a0cc5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="658" seconds="1204160725" serial="1628"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf888100 a2=382e8c a3=b80636d8 items=0 ppid=1 pid=5560 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="658" seconds="1204160725" serial="1628"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>ef2cf1d4-7113-4ca1-a2cb-5a54b5dd5d65</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b8-0-28e455c8a0cc5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15b8-0-28e455c8a0cc5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15b8-0-28e455c8a0cc5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15b8-0-28e455c8a0cc5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15b8-0-28e455c8a0cc5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="679" seconds="1204160725" serial="1629"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5562 comm="gconfd-2" name="linc-15ba-0-917a981a5ecf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160725" serial="1629"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff89800 a2=382e8c a3=b80646d8 items=0 ppid=1 pid=5562 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160725" serial="1629"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>eb6cae60-a7a1-4169-a238-c4c9a08a6f65</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ba-0-917a981a5ecf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15ba-0-917a981a5ecf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15ba-0-917a981a5ecf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15ba-0-917a981a5ecf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ba-0-917a981a5ecf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="749" seconds="1204160725" serial="1630"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5566 comm="gconfd-2" name="linc-15be-0-521feb11b714c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="749" seconds="1204160725" serial="1630"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfae1b60 a2=382e8c a3=b80bf6d8 items=0 ppid=1 pid=5566 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="749" seconds="1204160725" serial="1630"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>6846c254-2676-4627-baa3-b9b126cbd705</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15be-0-521feb11b714c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15be-0-521feb11b714c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15be-0-521feb11b714c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15be-0-521feb11b714c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15be-0-521feb11b714c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="793" seconds="1204160725" serial="1631"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5568 comm="gconfd-2" name="linc-15c0-0-e16b1d5c1bff" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="793" seconds="1204160725" serial="1631"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb57550 a2=382e8c a3=b80336d8 items=0 ppid=1 pid=5568 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="793" seconds="1204160725" serial="1631"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>4e7d7aa3-b40c-4937-bfc1-74608d328fd6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c0-0-e16b1d5c1bff</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15c0-0-e16b1d5c1bff'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15c0-0-e16b1d5c1bff). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15c0-0-e16b1d5c1bff). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c0-0-e16b1d5c1bff</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="934" seconds="1204160725" serial="1632"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5572 comm="gconfd-2" name="linc-15c4-0-7dedb94be40f4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="934" seconds="1204160725" serial="1632"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf87b8f0 a2=382e8c a3=b80576d8 items=0 ppid=1 pid=5572 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="934" seconds="1204160725" serial="1632"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>6579cb8c-e591-4a64-b531-545fe983d1e4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c4-0-7dedb94be40f4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15c4-0-7dedb94be40f4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15c4-0-7dedb94be40f4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15c4-0-7dedb94be40f4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c4-0-7dedb94be40f4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="972" seconds="1204160725" serial="1633"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5575 comm="gconfd-2" name="linc-15c7-0-23f47ac3ed4d0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="972" seconds="1204160725" serial="1633"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8bf180 a2=382e8c a3=b7f9b6d8 items=0 ppid=1 pid=5575 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="972" seconds="1204160725" serial="1633"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>37b8e700-af5d-4c34-b2ab-0fc0a59bc894</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c7-0-23f47ac3ed4d0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15c7-0-23f47ac3ed4d0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15c7-0-23f47ac3ed4d0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15c7-0-23f47ac3ed4d0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15c7-0-23f47ac3ed4d0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="985" seconds="1204160725" serial="1634"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5579 comm="gconfd-2" name="linc-15cb-0-7424bf83f09ed" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="985" seconds="1204160725" serial="1634"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfef8f70 a2=382e8c a3=b80d66d8 items=0 ppid=1 pid=5579 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="985" seconds="1204160725" serial="1634"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:25Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:25Z</last_seen_date> > <local_id>52a8a61c-9b83-4c2b-a61a-e5b673d60e14</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15cb-0-7424bf83f09ed</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15cb-0-7424bf83f09ed'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15cb-0-7424bf83f09ed). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15cb-0-7424bf83f09ed). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15cb-0-7424bf83f09ed</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="79" seconds="1204160726" serial="1635"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5581 comm="gconfd-2" name="linc-15cd-0-204222891347d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="79" seconds="1204160726" serial="1635"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89cff0 a2=382e8c a3=b807a6d8 items=0 ppid=1 pid=5581 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="79" seconds="1204160726" serial="1635"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>6b629c60-1c07-4e33-bae6-fb95e0311926</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15cd-0-204222891347d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15cd-0-204222891347d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15cd-0-204222891347d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15cd-0-204222891347d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15cd-0-204222891347d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="198" seconds="1204160726" serial="1636"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5584 comm="gconfd-2" name="linc-15d0-0-3825e30f30540" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="198" seconds="1204160726" serial="1636"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff647e0 a2=382e8c a3=b80416d8 items=0 ppid=1 pid=5584 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="198" seconds="1204160726" serial="1636"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>f9ff96bf-63a0-4fb9-aefe-4f3f19dd2646</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d0-0-3825e30f30540</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15d0-0-3825e30f30540'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15d0-0-3825e30f30540). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15d0-0-3825e30f30540). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d0-0-3825e30f30540</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="237" seconds="1204160726" serial="1638"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5588 comm="gconfd-2" name="linc-15d4-0-20e81c3d3a023" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="237" seconds="1204160726" serial="1638"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa3f2c0 a2=382e8c a3=b801c6d8 items=0 ppid=1 pid=5588 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="237" seconds="1204160726" serial="1638"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>379f00d9-4a3b-4bfe-baa4-8f799d6fe249</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d4-0-20e81c3d3a023</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15d4-0-20e81c3d3a023'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15d4-0-20e81c3d3a023). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15d4-0-20e81c3d3a023). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d4-0-20e81c3d3a023</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="250" seconds="1204160726" serial="1637"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5591 comm="gconfd-2" name="linc-15d7-0-1713a6053d1e5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="250" seconds="1204160726" serial="1637"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff227a0 a2=382e8c a3=b7ffd6d8 items=0 ppid=5590 pid=5591 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="250" seconds="1204160726" serial="1637"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>a97e0f4b-b964-4874-be79-e13dc02f7113</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d7-0-1713a6053d1e5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15d7-0-1713a6053d1e5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15d7-0-1713a6053d1e5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15d7-0-1713a6053d1e5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d7-0-1713a6053d1e5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="383" seconds="1204160726" serial="1639"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5593 comm="gconfd-2" name="linc-15d9-0-41a275ec5db15" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="383" seconds="1204160726" serial="1639"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbc6440 a2=382e8c a3=b80a36d8 items=0 ppid=1 pid=5593 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="383" seconds="1204160726" serial="1639"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>18cab2a5-2183-43d1-a08b-3ef987f6e093</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d9-0-41a275ec5db15</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15d9-0-41a275ec5db15'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15d9-0-41a275ec5db15). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15d9-0-41a275ec5db15). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15d9-0-41a275ec5db15</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="428" seconds="1204160726" serial="1640"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5596 comm="gconfd-2" name="linc-15dc-0-3ccbf07a688fc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="428" seconds="1204160726" serial="1640"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd655e0 a2=382e8c a3=b80406d8 items=0 ppid=1 pid=5596 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="428" seconds="1204160726" serial="1640"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>118f262d-797d-4d32-8206-e1585364101f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15dc-0-3ccbf07a688fc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15dc-0-3ccbf07a688fc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15dc-0-3ccbf07a688fc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15dc-0-3ccbf07a688fc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15dc-0-3ccbf07a688fc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="542" seconds="1204160726" serial="1641"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5600 comm="gconfd-2" name="linc-15e0-0-710d169684599" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="542" seconds="1204160726" serial="1641"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfce5560 a2=382e8c a3=b7fc26d8 items=0 ppid=1 pid=5600 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="542" seconds="1204160726" serial="1641"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>9be89a59-caee-4cde-9332-ff80d79573b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e0-0-710d169684599</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15e0-0-710d169684599'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15e0-0-710d169684599). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15e0-0-710d169684599). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e0-0-710d169684599</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="637" seconds="1204160726" serial="1642"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5607 comm="gconfd-2" name="linc-15e7-0-d59e81a9ba46" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="637" seconds="1204160726" serial="1642"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcd6220 a2=382e8c a3=b80b36d8 items=0 ppid=5606 pid=5607 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="637" seconds="1204160726" serial="1642"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>a9e7038a-5ff8-4bb3-a5e2-51c56ab4198b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e7-0-d59e81a9ba46</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15e7-0-d59e81a9ba46'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15e7-0-d59e81a9ba46). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15e7-0-d59e81a9ba46). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e7-0-d59e81a9ba46</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="640" seconds="1204160726" serial="1643"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5609 comm="gconfd-2" name="linc-15e9-0-40648d269c47f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160726" serial="1643"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfba44e0 a2=382e8c a3=b80806d8 items=0 ppid=5608 pid=5609 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160726" serial="1643"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>3d8b5c84-11c3-4a1b-a014-d19b3272bed8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e9-0-40648d269c47f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15e9-0-40648d269c47f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15e9-0-40648d269c47f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15e9-0-40648d269c47f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15e9-0-40648d269c47f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="802" seconds="1204160726" serial="1644"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5612 comm="gconfd-2" name="linc-15ec-0-5c371841c3ed0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="802" seconds="1204160726" serial="1644"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf6370 a2=382e8c a3=b80d36d8 items=0 ppid=1 pid=5612 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="802" seconds="1204160726" serial="1644"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>f12078b3-07de-481b-82e1-70db636ccecb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ec-0-5c371841c3ed0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15ec-0-5c371841c3ed0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15ec-0-5c371841c3ed0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15ec-0-5c371841c3ed0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ec-0-5c371841c3ed0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="805" seconds="1204160726" serial="1645"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5614 comm="gconfd-2" name="linc-15ee-0-3f20743ac4aed" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="805" seconds="1204160726" serial="1645"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbbfc40 a2=382e8c a3=b809b6d8 items=0 ppid=1 pid=5614 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="805" seconds="1204160726" serial="1645"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>64e217c4-5a79-442d-afd9-ebe9b905c388</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ee-0-3f20743ac4aed</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15ee-0-3f20743ac4aed'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15ee-0-3f20743ac4aed). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15ee-0-3f20743ac4aed). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ee-0-3f20743ac4aed</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="855" seconds="1204160726" serial="1646"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5618 comm="gconfd-2" name="linc-15f2-0-6dd83d6ed0d21" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="855" seconds="1204160726" serial="1646"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd7e600 a2=382e8c a3=b805b6d8 items=0 ppid=5617 pid=5618 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="855" seconds="1204160726" serial="1646"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>8ceaf1bc-916b-4b8d-87d4-2aca7b90ed87</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f2-0-6dd83d6ed0d21</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15f2-0-6dd83d6ed0d21'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15f2-0-6dd83d6ed0d21). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15f2-0-6dd83d6ed0d21). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f2-0-6dd83d6ed0d21</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="919" seconds="1204160726" serial="1647"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5620 comm="gconfd-2" name="linc-15f4-0-553566de0821" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="919" seconds="1204160726" serial="1647"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf962440 a2=382e8c a3=b7f3d6d8 items=0 ppid=1 pid=5620 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="919" seconds="1204160726" serial="1647"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:26Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:26Z</last_seen_date> > <local_id>7a67123b-794b-45ee-af0a-9c76e3e07ba7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f4-0-553566de0821</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15f4-0-553566de0821'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15f4-0-553566de0821). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15f4-0-553566de0821). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f4-0-553566de0821</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="7" seconds="1204160727" serial="1648"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5623 comm="gconfd-2" name="linc-15f7-0-435b0e71d9c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="7" seconds="1204160727" serial="1648"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9312b0 a2=382e8c a3=b800d6d8 items=0 ppid=1 pid=5623 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="7" seconds="1204160727" serial="1648"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>64cca9b1-214c-4fb5-b6c5-12a18b07f2be</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f7-0-435b0e71d9c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15f7-0-435b0e71d9c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15f7-0-435b0e71d9c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15f7-0-435b0e71d9c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15f7-0-435b0e71d9c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="90" seconds="1204160727" serial="1649"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5629 comm="gconfd-2" name="linc-15fd-0-1402dd3715f85" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="90" seconds="1204160727" serial="1649"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb5f3e0 a2=382e8c a3=b803a6d8 items=0 ppid=5628 pid=5629 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="90" seconds="1204160727" serial="1649"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>faa5101f-4ff1-497a-8e53-bd53e16f7d05</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15fd-0-1402dd3715f85</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15fd-0-1402dd3715f85'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15fd-0-1402dd3715f85). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15fd-0-1402dd3715f85). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15fd-0-1402dd3715f85</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="93" seconds="1204160727" serial="1650"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5631 comm="gconfd-2" name="linc-15ff-0-3848d22316e4e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="93" seconds="1204160727" serial="1650"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf892110 a2=382e8c a3=b7f6f6d8 items=0 ppid=5630 pid=5631 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="93" seconds="1204160727" serial="1650"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>59cdb3a9-1b10-4443-8672-2e27fc6c64ef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ff-0-3848d22316e4e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-15ff-0-3848d22316e4e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-15ff-0-3848d22316e4e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-15ff-0-3848d22316e4e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-15ff-0-3848d22316e4e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="240" seconds="1204160727" serial="1651"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5634 comm="gconfd-2" name="linc-1602-0-6df431073abc3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="240" seconds="1204160727" serial="1651"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc8ed10 a2=382e8c a3=b806a6d8 items=0 ppid=1 pid=5634 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="240" seconds="1204160727" serial="1651"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>9514e79b-f6f5-4ef1-a0c8-26575daba108</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1602-0-6df431073abc3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1602-0-6df431073abc3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1602-0-6df431073abc3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1602-0-6df431073abc3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1602-0-6df431073abc3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="244" seconds="1204160727" serial="1652"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5636 comm="gconfd-2" name="linc-1604-0-4a4c198a3ba3e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="244" seconds="1204160727" serial="1652"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8c3140 a2=382e8c a3=b80a06d8 items=0 ppid=1 pid=5636 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="244" seconds="1204160727" serial="1652"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>85a52e9d-4b47-40ef-80be-80033a3e59a5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1604-0-4a4c198a3ba3e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1604-0-4a4c198a3ba3e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1604-0-4a4c198a3ba3e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1604-0-4a4c198a3ba3e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1604-0-4a4c198a3ba3e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="339" seconds="1204160727" serial="1653"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5642 comm="gconfd-2" name="linc-160a-0-26c18c6252c95" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="339" seconds="1204160727" serial="1653"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd335b0 a2=382e8c a3=b7f106d8 items=0 ppid=5641 pid=5642 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="339" seconds="1204160727" serial="1653"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>a9a2f988-2f13-4be6-b699-1ef5db43fd6f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-160a-0-26c18c6252c95</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-160a-0-26c18c6252c95'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-160a-0-26c18c6252c95). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-160a-0-26c18c6252c95). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-160a-0-26c18c6252c95</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="470" seconds="1204160727" serial="1654"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5650 comm="gconfd-2" name="linc-1612-0-2615d72c72ec1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="470" seconds="1204160727" serial="1654"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8508d0 a2=382e8c a3=b802c6d8 items=0 ppid=5649 pid=5650 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="470" seconds="1204160727" serial="1654"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>442c64db-7b40-46d7-9594-ce375d730145</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1612-0-2615d72c72ec1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1612-0-2615d72c72ec1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1612-0-2615d72c72ec1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1612-0-2615d72c72ec1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1612-0-2615d72c72ec1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="479" seconds="1204160727" serial="1655"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5645 comm="gconfd-2" name="linc-160d-0-4b1abc6375137" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="479" seconds="1204160727" serial="1655"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa792f0 a2=382e8c a3=b7f546d8 items=0 ppid=1 pid=5645 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="479" seconds="1204160727" serial="1655"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>7752d073-df37-4efe-8489-31e92338f1cb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-160d-0-4b1abc6375137</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-160d-0-4b1abc6375137'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-160d-0-4b1abc6375137). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-160d-0-4b1abc6375137). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-160d-0-4b1abc6375137</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="554" seconds="1204160727" serial="1656"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5654 comm="gconfd-2" name="linc-1616-0-22f09d32873f5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160727" serial="1656"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa792f0 a2=382e8c a3=b80566d8 items=0 ppid=1 pid=5654 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160727" serial="1656"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>1202aeed-6d3d-4b2c-97b9-650b076d1ba4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1616-0-22f09d32873f5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1616-0-22f09d32873f5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1616-0-22f09d32873f5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1616-0-22f09d32873f5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1616-0-22f09d32873f5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="680" seconds="1204160727" serial="1657"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5655 comm="gconfd-2" name="linc-1617-0-7ab75c77a6225" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="680" seconds="1204160727" serial="1657"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe1c690 a2=382e8c a3=b7ff76d8 items=0 ppid=1 pid=5655 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="680" seconds="1204160727" serial="1657"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>50908bb4-76b8-4f04-a83a-cdbc2fb0ec59</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1617-0-7ab75c77a6225</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1617-0-7ab75c77a6225'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1617-0-7ab75c77a6225). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1617-0-7ab75c77a6225). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1617-0-7ab75c77a6225</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="706" seconds="1204160727" serial="1658"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5660 comm="gconfd-2" name="linc-161c-0-7a0dcbc4a9b45" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="706" seconds="1204160727" serial="1658"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbea460 a2=382e8c a3=b80c56d8 items=0 ppid=1 pid=5660 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="706" seconds="1204160727" serial="1658"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>b885bc0c-342e-47b9-acbc-e4703334184a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-161c-0-7a0dcbc4a9b45</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-161c-0-7a0dcbc4a9b45'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-161c-0-7a0dcbc4a9b45). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-161c-0-7a0dcbc4a9b45). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-161c-0-7a0dcbc4a9b45</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="764" seconds="1204160727" serial="1659"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5665 comm="gconfd-2" name="linc-1621-0-327c019bbaa19" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="764" seconds="1204160727" serial="1659"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd585d0 a2=382e8c a3=b80336d8 items=0 ppid=5664 pid=5665 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="764" seconds="1204160727" serial="1659"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>cb31f617-1fd5-46fe-a902-4f5c1e556fa2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1621-0-327c019bbaa19</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1621-0-327c019bbaa19'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1621-0-327c019bbaa19). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1621-0-327c019bbaa19). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1621-0-327c019bbaa19</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="871" seconds="1204160727" serial="1660"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5663 comm="gconfd-2" name="linc-161f-0-6ba30305d4bab" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="871" seconds="1204160727" serial="1660"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdcbe40 a2=382e8c a3=b80a76d8 items=0 ppid=1 pid=5663 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="871" seconds="1204160727" serial="1660"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>00bb060a-7d81-464e-b7d2-75b46b6c411a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-161f-0-6ba30305d4bab</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-161f-0-6ba30305d4bab'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-161f-0-6ba30305d4bab). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-161f-0-6ba30305d4bab). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-161f-0-6ba30305d4bab</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="939" seconds="1204160727" serial="1661"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5671 comm="gconfd-2" name="linc-1627-0-21b5f92ae56b9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="939" seconds="1204160727" serial="1661"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfba6c20 a2=382e8c a3=b7f846d8 items=0 ppid=1 pid=5671 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="939" seconds="1204160727" serial="1661"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>9bc404b3-0653-4fe4-acba-c71f609d5ad5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1627-0-21b5f92ae56b9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1627-0-21b5f92ae56b9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1627-0-21b5f92ae56b9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1627-0-21b5f92ae56b9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1627-0-21b5f92ae56b9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="975" seconds="1204160727" serial="1662"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5668 comm="gconfd-2" name="linc-1624-0-39ab9831ee18d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="975" seconds="1204160727" serial="1662"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc384b0 a2=382e8c a3=b80136d8 items=0 ppid=1 pid=5668 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="975" seconds="1204160727" serial="1662"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:27Z</last_seen_date> > <local_id>0364bda1-d0a2-4959-b697-c1e19fa0dbef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1624-0-39ab9831ee18d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1624-0-39ab9831ee18d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1624-0-39ab9831ee18d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1624-0-39ab9831ee18d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1624-0-39ab9831ee18d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="72" seconds="1204160728" serial="1663"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5679 comm="gconfd-2" name="linc-162f-0-2c2a09411b7c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="72" seconds="1204160728" serial="1663"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdfd670 a2=382e8c a3=b7fd86d8 items=0 ppid=5678 pid=5679 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="72" seconds="1204160728" serial="1663"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>b30cade1-c366-4667-ae5e-7b04dd3f4989</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-162f-0-2c2a09411b7c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-162f-0-2c2a09411b7c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-162f-0-2c2a09411b7c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-162f-0-2c2a09411b7c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-162f-0-2c2a09411b7c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="88" seconds="1204160728" serial="1664"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5675 comm="gconfd-2" name="linc-162b-0-49b872a1582d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="88" seconds="1204160728" serial="1664"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc8ad00 a2=382e8c a3=b80666d8 items=0 ppid=1 pid=5675 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="88" seconds="1204160728" serial="1664"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>5f5e1e7b-7bad-434f-a4ea-b07b2472a07f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-162b-0-49b872a1582d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-162b-0-49b872a1582d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-162b-0-49b872a1582d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-162b-0-49b872a1582d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-162b-0-49b872a1582d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="164" seconds="1204160728" serial="1665"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5682 comm="gconfd-2" name="linc-1632-0-5fda4f5d2807c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="164" seconds="1204160728" serial="1665"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf98aa00 a2=382e8c a3=b7f686d8 items=0 ppid=5681 pid=5682 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="164" seconds="1204160728" serial="1665"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>2b24ab3a-7d1e-46af-ac3c-f977b962b308</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1632-0-5fda4f5d2807c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1632-0-5fda4f5d2807c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1632-0-5fda4f5d2807c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1632-0-5fda4f5d2807c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1632-0-5fda4f5d2807c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="255" seconds="1204160728" serial="1666"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5684 comm="gconfd-2" name="linc-1634-0-534f2b1d3e3f3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="255" seconds="1204160728" serial="1666"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc06c80 a2=382e8c a3=b7ee46d8 items=0 ppid=1 pid=5684 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="255" seconds="1204160728" serial="1666"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>60ac3900-b8c9-470e-a3fe-c3dba01298f2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1634-0-534f2b1d3e3f3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1634-0-534f2b1d3e3f3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1634-0-534f2b1d3e3f3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1634-0-534f2b1d3e3f3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1634-0-534f2b1d3e3f3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="298" seconds="1204160728" serial="1667"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5688 comm="gconfd-2" name="linc-1638-0-1925a29e4631b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="298" seconds="1204160728" serial="1667"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf991be0 a2=382e8c a3=b7f6d6d8 items=0 ppid=1 pid=5688 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="298" seconds="1204160728" serial="1667"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>61286cb5-8216-4bc1-83d2-91d9e03676be</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1638-0-1925a29e4631b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1638-0-1925a29e4631b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1638-0-1925a29e4631b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1638-0-1925a29e4631b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1638-0-1925a29e4631b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="342" seconds="1204160728" serial="1668"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5692 comm="gconfd-2" name="linc-163c-0-5c8e16d538c5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="342" seconds="1204160728" serial="1668"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb53bd0 a2=382e8c a3=b7f2f6d8 items=0 ppid=1 pid=5692 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="342" seconds="1204160728" serial="1668"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>eb5ac1f9-d9be-4d22-976c-06139ccd8df6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-163c-0-5c8e16d538c5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-163c-0-5c8e16d538c5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-163c-0-5c8e16d538c5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-163c-0-5c8e16d538c5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-163c-0-5c8e16d538c5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="407" seconds="1204160728" serial="1669"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5695 comm="gconfd-2" name="linc-163f-0-617aa30c637e8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="407" seconds="1204160728" serial="1669"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa5fae0 a2=382e8c a3=b7f3b6d8 items=0 ppid=5694 pid=5695 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="407" seconds="1204160728" serial="1669"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>ab532123-9625-41d7-845f-1bc5c4a53095</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-163f-0-617aa30c637e8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-163f-0-617aa30c637e8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-163f-0-617aa30c637e8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-163f-0-617aa30c637e8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-163f-0-617aa30c637e8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="580" seconds="1204160728" serial="1670"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5698 comm="gconfd-2" name="linc-1642-0-7252cc2d8dbfb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="580" seconds="1204160728" serial="1670"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9816c0 a2=382e8c a3=b805d6d8 items=0 ppid=1 pid=5698 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="580" seconds="1204160728" serial="1670"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>ad6c97ac-9cc7-4118-93bf-946b4d8e3670</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1642-0-7252cc2d8dbfb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1642-0-7252cc2d8dbfb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1642-0-7252cc2d8dbfb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1642-0-7252cc2d8dbfb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1642-0-7252cc2d8dbfb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="623" seconds="1204160728" serial="1671"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5700 comm="gconfd-2" name="linc-1644-0-5276560098425" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="623" seconds="1204160728" serial="1671"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9a5220 a2=382e8c a3=b80826d8 items=0 ppid=1 pid=5700 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="623" seconds="1204160728" serial="1671"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>0f71b9a5-3a29-4ad8-ac08-2ddfade90bf9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1644-0-5276560098425</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1644-0-5276560098425'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1644-0-5276560098425). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1644-0-5276560098425). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1644-0-5276560098425</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="679" seconds="1204160728" serial="1672"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5706 comm="gconfd-2" name="linc-164a-0-48327a65a5f9d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160728" serial="1672"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcd4d50 a2=382e8c a3=b7fb06d8 items=0 ppid=5705 pid=5706 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160728" serial="1672"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>b09cd503-f9c1-4188-bf53-7eccb795c2d8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164a-0-48327a65a5f9d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-164a-0-48327a65a5f9d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-164a-0-48327a65a5f9d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-164a-0-48327a65a5f9d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164a-0-48327a65a5f9d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="773" seconds="1204160728" serial="1673"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5711 comm="gconfd-2" name="linc-164f-0-6cc3224bbce31" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="773" seconds="1204160728" serial="1673"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff55fd0 a2=382e8c a3=b80316d8 items=0 ppid=5710 pid=5711 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="773" seconds="1204160728" serial="1673"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>76be48cf-0b61-4e68-90bf-3110b01a0d5c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164f-0-6cc3224bbce31</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-164f-0-6cc3224bbce31'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-164f-0-6cc3224bbce31). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-164f-0-6cc3224bbce31). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164f-0-6cc3224bbce31</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="886" seconds="1204160728" serial="1674"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5709 comm="gconfd-2" name="linc-164d-0-1e1982ed879b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="886" seconds="1204160728" serial="1674"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa9020 a2=382e8c a3=b80846d8 items=0 ppid=1 pid=5709 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="886" seconds="1204160728" serial="1674"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>ca3a6e2b-367a-4f8a-845b-548c82e44576</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164d-0-1e1982ed879b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-164d-0-1e1982ed879b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-164d-0-1e1982ed879b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-164d-0-1e1982ed879b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-164d-0-1e1982ed879b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="927" seconds="1204160728" serial="1675"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5717 comm="gconfd-2" name="linc-1655-0-35e9723ce2714" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="927" seconds="1204160728" serial="1675"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf8370 a2=382e8c a3=b7fd56d8 items=0 ppid=5716 pid=5717 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="927" seconds="1204160728" serial="1675"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>51a798f0-3b6e-4d5d-b8fb-dd8406b1d9c0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1655-0-35e9723ce2714</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1655-0-35e9723ce2714'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1655-0-35e9723ce2714). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1655-0-35e9723ce2714). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1655-0-35e9723ce2714</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="999" seconds="1204160728" serial="1676"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5714 comm="gconfd-2" name="linc-1652-0-58ab581af3fd9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="999" seconds="1204160728" serial="1676"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfde4660 a2=382e8c a3=b7fbf6d8 items=0 ppid=1 pid=5714 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="999" seconds="1204160728" serial="1676"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:28Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:28Z</last_seen_date> > <local_id>1f82ff5d-1c43-4989-b01f-fc13a8106c08</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1652-0-58ab581af3fd9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1652-0-58ab581af3fd9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1652-0-58ab581af3fd9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1652-0-58ab581af3fd9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1652-0-58ab581af3fd9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="108" seconds="1204160729" serial="1677"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5725 comm="gconfd-2" name="linc-165d-0-3b95f661a82c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="108" seconds="1204160729" serial="1677"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe7cef0 a2=382e8c a3=b80586d8 items=0 ppid=5724 pid=5725 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="108" seconds="1204160729" serial="1677"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>d35e4840-7fdc-47e4-9cb3-0497bb05a9b3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-165d-0-3b95f661a82c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-165d-0-3b95f661a82c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-165d-0-3b95f661a82c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-165d-0-3b95f661a82c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-165d-0-3b95f661a82c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="111" seconds="1204160729" serial="1678"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5721 comm="gconfd-2" name="linc-1659-0-1c8b97d81b315" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="111" seconds="1204160729" serial="1678"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf7fd3c0 a2=382e8c a3=b7edb6d8 items=0 ppid=1 pid=5721 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="111" seconds="1204160729" serial="1678"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>147b1bfa-dc2e-4da0-a70f-b626503dbf32</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1659-0-1c8b97d81b315</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1659-0-1c8b97d81b315'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1659-0-1c8b97d81b315). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1659-0-1c8b97d81b315). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1659-0-1c8b97d81b315</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="184" seconds="1204160729" serial="1679"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5727 comm="gconfd-2" name="linc-165f-0-3e32b6482d1ac" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="184" seconds="1204160729" serial="1679"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc09480 a2=382e8c a3=b7fe66d8 items=0 ppid=1 pid=5727 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="184" seconds="1204160729" serial="1679"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>93d6d070-e030-40a0-85e8-ba3ee49f839a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-165f-0-3e32b6482d1ac</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-165f-0-3e32b6482d1ac'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-165f-0-3e32b6482d1ac). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-165f-0-3e32b6482d1ac). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-165f-0-3e32b6482d1ac</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="276" seconds="1204160729" serial="1680"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5729 comm="gconfd-2" name="linc-1661-0-33c5349943865" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="276" seconds="1204160729" serial="1680"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9401c0 a2=382e8c a3=b801b6d8 items=0 ppid=1 pid=5729 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="276" seconds="1204160729" serial="1680"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>ba9f1029-681b-47ad-b378-829b56ccba21</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1661-0-33c5349943865</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1661-0-33c5349943865'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1661-0-33c5349943865). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1661-0-33c5349943865). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1661-0-33c5349943865</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="345" seconds="1204160729" serial="1681"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5732 comm="gconfd-2" name="linc-1664-0-7038e56554395" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="345" seconds="1204160729" serial="1681"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc314b0 a2=382e8c a3=b7f0c6d8 items=0 ppid=1 pid=5732 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="345" seconds="1204160729" serial="1681"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>4bae1059-6327-4e5c-b327-9b33a8c40795</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1664-0-7038e56554395</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1664-0-7038e56554395'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1664-0-7038e56554395). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1664-0-7038e56554395). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1664-0-7038e56554395</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="350" seconds="1204160729" serial="1682"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5737 comm="gconfd-2" name="linc-1669-0-2473d4b155a48" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="350" seconds="1204160729" serial="1682"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8af930 a2=382e8c a3=b7f8b6d8 items=0 ppid=5736 pid=5737 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="350" seconds="1204160729" serial="1682"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>30a034b4-9ff8-4ad3-acc0-1f5a839003a3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1669-0-2473d4b155a48</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1669-0-2473d4b155a48'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1669-0-2473d4b155a48). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1669-0-2473d4b155a48). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1669-0-2473d4b155a48</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="570" seconds="1204160729" serial="1683"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5746 comm="gconfd-2" name="linc-1672-0-7198d78a8b2f9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="570" seconds="1204160729" serial="1683"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa082e0 a2=382e8c a3=b7ee46d8 items=0 ppid=5744 pid=5746 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="570" seconds="1204160729" serial="1683"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>e93a3a1d-2f70-4dc7-855b-c16585cec362</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1672-0-7198d78a8b2f9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1672-0-7198d78a8b2f9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1672-0-7198d78a8b2f9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1672-0-7198d78a8b2f9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1672-0-7198d78a8b2f9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="582" seconds="1204160729" serial="1684"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5747 comm="gconfd-2" name="linc-1673-0-2246fe358e279" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="582" seconds="1204160729" serial="1684"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa38ab0 a2=382e8c a3=b7f146d8 items=0 ppid=5745 pid=5747 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="582" seconds="1204160729" serial="1684"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>dd4235fb-c4ef-4a00-b78d-95cae4d3986a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1673-0-2246fe358e279</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1673-0-2246fe358e279'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1673-0-2246fe358e279). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1673-0-2246fe358e279). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1673-0-2246fe358e279</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="762" seconds="1204160729" serial="1685"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5755 comm="gconfd-2" name="linc-167b-0-605c249ba286" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="762" seconds="1204160729" serial="1685"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff0cd30 a2=382e8c a3=b7ee86d8 items=0 ppid=5754 pid=5755 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="762" seconds="1204160729" serial="1685"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>53017752-bdb7-420b-bfe0-bdfcb8676563</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-167b-0-605c249ba286</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-167b-0-605c249ba286'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-167b-0-605c249ba286). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-167b-0-605c249ba286). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-167b-0-605c249ba286</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="765" seconds="1204160729" serial="1686"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5757 comm="gconfd-2" name="linc-167d-0-182d5d49bacf7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="765" seconds="1204160729" serial="1686"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9b1230 a2=382e8c a3=b808c6d8 items=0 ppid=5756 pid=5757 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="765" seconds="1204160729" serial="1686"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>e682702c-24d1-4afd-8669-4d4166847a5b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-167d-0-182d5d49bacf7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-167d-0-182d5d49bacf7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-167d-0-182d5d49bacf7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-167d-0-182d5d49bacf7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-167d-0-182d5d49bacf7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="904" seconds="1204160729" serial="1687"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5760 comm="gconfd-2" name="linc-1680-0-6961944bdcb9e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="904" seconds="1204160729" serial="1687"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd655e0 a2=382e8c a3=b80406d8 items=0 ppid=1 pid=5760 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="904" seconds="1204160729" serial="1687"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>4a4b651f-7a81-4408-b89f-3f9b33936acd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1680-0-6961944bdcb9e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1680-0-6961944bdcb9e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1680-0-6961944bdcb9e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1680-0-6961944bdcb9e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1680-0-6961944bdcb9e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="906" seconds="1204160729" serial="1688"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5762 comm="gconfd-2" name="linc-1682-0-1b9dc06ddd375" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="906" seconds="1204160729" serial="1688"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc13c90 a2=382e8c a3=b7ef16d8 items=0 ppid=1 pid=5762 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="906" seconds="1204160729" serial="1688"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>a3c9148a-911c-4028-8fb9-01479c37560a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1682-0-1b9dc06ddd375</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1682-0-1b9dc06ddd375'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1682-0-1b9dc06ddd375). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1682-0-1b9dc06ddd375). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1682-0-1b9dc06ddd375</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="969" seconds="1204160729" serial="1689"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5766 comm="gconfd-2" name="linc-1686-0-7ff4143becb61" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="969" seconds="1204160729" serial="1689"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffdd060 a2=382e8c a3=b80ba6d8 items=0 ppid=5765 pid=5766 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="969" seconds="1204160729" serial="1689"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:29Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:29Z</last_seen_date> > <local_id>80dc5c52-9f5a-4a08-a454-6a154ab6ba1f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1686-0-7ff4143becb61</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1686-0-7ff4143becb61'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1686-0-7ff4143becb61). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1686-0-7ff4143becb61). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1686-0-7ff4143becb61</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="4" seconds="1204160730" serial="1690"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5768 comm="gconfd-2" name="linc-1688-0-71ba624f74" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="4" seconds="1204160730" serial="1690"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf894910 a2=382e8c a3=b80726d8 items=0 ppid=5767 pid=5768 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="4" seconds="1204160730" serial="1690"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>435b0c7f-c2b5-4bb3-b8b2-67d97de16148</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1688-0-71ba624f74</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1688-0-71ba624f74'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1688-0-71ba624f74). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1688-0-71ba624f74). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1688-0-71ba624f74</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="125" seconds="1204160730" serial="1691"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5771 comm="gconfd-2" name="linc-168b-0-345cf52c1eb73" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="125" seconds="1204160730" serial="1691"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe98710 a2=382e8c a3=b80756d8 items=0 ppid=1 pid=5771 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="125" seconds="1204160730" serial="1691"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>bff39dae-6cf1-4a0e-9fdb-5f9105a775ef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-168b-0-345cf52c1eb73</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-168b-0-345cf52c1eb73'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-168b-0-345cf52c1eb73). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-168b-0-345cf52c1eb73). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-168b-0-345cf52c1eb73</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="178" seconds="1204160730" serial="1692"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5774 comm="gconfd-2" name="linc-168e-0-7f871be62b9de" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="178" seconds="1204160730" serial="1692"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9419c0 a2=382e8c a3=b801d6d8 items=0 ppid=1 pid=5774 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="178" seconds="1204160730" serial="1692"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>0246d6a8-9748-49b4-93d4-787a614d8baf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-168e-0-7f871be62b9de</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-168e-0-7f871be62b9de'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-168e-0-7f871be62b9de). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-168e-0-7f871be62b9de). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-168e-0-7f871be62b9de</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="209" seconds="1204160730" serial="1693"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5778 comm="gconfd-2" name="linc-1692-0-7864c3ed3337e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="209" seconds="1204160730" serial="1693"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb0730 a2=382e8c a3=b7f8b6d8 items=0 ppid=1 pid=5778 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="209" seconds="1204160730" serial="1693"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>61198281-11ca-4e26-9fac-40ac6e849dd3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1692-0-7864c3ed3337e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1692-0-7864c3ed3337e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1692-0-7864c3ed3337e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1692-0-7864c3ed3337e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1692-0-7864c3ed3337e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="354" seconds="1204160730" serial="1694"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5782 comm="gconfd-2" name="linc-1696-0-782f54735671c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="354" seconds="1204160730" serial="1694"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa1020 a2=382e8c a3=b7f7e6d8 items=0 ppid=1 pid=5782 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="354" seconds="1204160730" serial="1694"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>15122ebb-2029-4cf0-a969-ebdbaab7cdf8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1696-0-782f54735671c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1696-0-782f54735671c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1696-0-782f54735671c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1696-0-782f54735671c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1696-0-782f54735671c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="394" seconds="1204160730" serial="1695"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5787 comm="gconfd-2" name="linc-169b-0-75354ebe605b9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="394" seconds="1204160730" serial="1695"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbfe8d0 a2=382e8c a3=b7fdb6d8 items=0 ppid=1 pid=5787 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="394" seconds="1204160730" serial="1695"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>a11b5151-93d2-4f33-97d1-5179bed50746</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-169b-0-75354ebe605b9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-169b-0-75354ebe605b9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-169b-0-75354ebe605b9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-169b-0-75354ebe605b9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-169b-0-75354ebe605b9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="519" seconds="1204160730" serial="1696"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5790 comm="gconfd-2" name="linc-169e-0-35ef11977eb98" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="519" seconds="1204160730" serial="1696"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfde8e60 a2=382e8c a3=b7fc66d8 items=0 ppid=1 pid=5790 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="519" seconds="1204160730" serial="1696"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>fd67384d-38bd-4a6a-94aa-f3c527c72527</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-169e-0-35ef11977eb98</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-169e-0-35ef11977eb98'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-169e-0-35ef11977eb98). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-169e-0-35ef11977eb98). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-169e-0-35ef11977eb98</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="556" seconds="1204160730" serial="1697"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5795 comm="gconfd-2" name="linc-16a3-0-3fcf1df487e7f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="556" seconds="1204160730" serial="1697"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa3020 a2=382e8c a3=b7f806d8 items=0 ppid=5794 pid=5795 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="556" seconds="1204160730" serial="1697"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>ad658a5f-9353-4f9b-a97a-47dad672c1cd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16a3-0-3fcf1df487e7f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16a3-0-3fcf1df487e7f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16a3-0-3fcf1df487e7f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16a3-0-3fcf1df487e7f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16a3-0-3fcf1df487e7f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="709" seconds="1204160730" serial="1698"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5798 comm="gconfd-2" name="linc-16a6-0-5009afb2ad17d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="709" seconds="1204160730" serial="1698"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe98710 a2=382e8c a3=b80756d8 items=0 ppid=1 pid=5798 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="709" seconds="1204160730" serial="1698"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>5166ac7e-1ff1-4da6-a4ba-17ae874a6ae6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16a6-0-5009afb2ad17d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16a6-0-5009afb2ad17d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16a6-0-5009afb2ad17d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16a6-0-5009afb2ad17d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16a6-0-5009afb2ad17d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="760" seconds="1204160730" serial="1699"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5803 comm="gconfd-2" name="linc-16ab-0-148974b7b9ac5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="760" seconds="1204160730" serial="1699"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeaff30 a2=382e8c a3=b7f8d6d8 items=0 ppid=1 pid=5803 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="760" seconds="1204160730" serial="1699"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>f44bbf52-c94b-4fe8-86d1-02e3879251ba</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ab-0-148974b7b9ac5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16ab-0-148974b7b9ac5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16ab-0-148974b7b9ac5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16ab-0-148974b7b9ac5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ab-0-148974b7b9ac5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="878" seconds="1204160730" serial="1700"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5806 comm="gconfd-2" name="linc-16ae-0-4c4679aed6760" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="878" seconds="1204160730" serial="1700"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb7ef40 a2=382e8c a3=b7f5c6d8 items=0 ppid=1 pid=5806 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="878" seconds="1204160730" serial="1700"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>04b91d4c-6399-4d52-993d-2bbb5bb46dbe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ae-0-4c4679aed6760</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16ae-0-4c4679aed6760'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16ae-0-4c4679aed6760). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16ae-0-4c4679aed6760). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ae-0-4c4679aed6760</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="996" seconds="1204160730" serial="1701"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5812 comm="gconfd-2" name="linc-16b4-0-5db6fc4bf359e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="996" seconds="1204160730" serial="1701"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd00d80 a2=382e8c a3=b7fde6d8 items=0 ppid=1 pid=5812 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="996" seconds="1204160730" serial="1701"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:30Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:30Z</last_seen_date> > <local_id>48b21526-c08f-41a2-9c20-b2397b4d1f24</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16b4-0-5db6fc4bf359e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16b4-0-5db6fc4bf359e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16b4-0-5db6fc4bf359e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16b4-0-5db6fc4bf359e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16b4-0-5db6fc4bf359e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="54" seconds="1204160731" serial="1702"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5816 comm="gconfd-2" name="linc-16b8-0-1d8b4d6cd62b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="54" seconds="1204160731" serial="1702"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa372b0 a2=382e8c a3=b80126d8 items=0 ppid=1 pid=5816 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="54" seconds="1204160731" serial="1702"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>502d7e0c-652d-49f3-b637-a66fdf86e802</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16b8-0-1d8b4d6cd62b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16b8-0-1d8b4d6cd62b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16b8-0-1d8b4d6cd62b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16b8-0-1d8b4d6cd62b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16b8-0-1d8b4d6cd62b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="160" seconds="1204160731" serial="1703"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5819 comm="gconfd-2" name="linc-16bb-0-7e6e8bb5273c9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="160" seconds="1204160731" serial="1703"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcee570 a2=382e8c a3=b7fcb6d8 items=0 ppid=1 pid=5819 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="160" seconds="1204160731" serial="1703"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>c23e9806-43ca-41fa-a202-b16d0f5db7ec</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16bb-0-7e6e8bb5273c9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16bb-0-7e6e8bb5273c9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16bb-0-7e6e8bb5273c9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16bb-0-7e6e8bb5273c9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16bb-0-7e6e8bb5273c9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="262" seconds="1204160731" serial="1704"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5824 comm="gconfd-2" name="linc-16c0-0-622da67540030" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="262" seconds="1204160731" serial="1704"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffd2050 a2=382e8c a3=b7fad6d8 items=0 ppid=1 pid=5824 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="262" seconds="1204160731" serial="1704"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>53a350d0-232e-416a-a822-1752089f8deb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c0-0-622da67540030</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16c0-0-622da67540030'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16c0-0-622da67540030). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16c0-0-622da67540030). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c0-0-622da67540030</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="338" seconds="1204160731" serial="1705"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5828 comm="gconfd-2" name="linc-16c4-0-6b3464a252b5a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="338" seconds="1204160731" serial="1705"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa5ae0 a2=382e8c a3=b7f836d8 items=0 ppid=1 pid=5828 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="338" seconds="1204160731" serial="1705"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>8bbca570-5b38-43fe-a3d6-bcb8a89c01f2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c4-0-6b3464a252b5a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16c4-0-6b3464a252b5a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16c4-0-6b3464a252b5a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16c4-0-6b3464a252b5a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c4-0-6b3464a252b5a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="426" seconds="1204160731" serial="1706"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5832 comm="gconfd-2" name="linc-16c8-0-e465dda680e5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="426" seconds="1204160731" serial="1706"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcc6540 a2=382e8c a3=b7fa16d8 items=0 ppid=1 pid=5832 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="426" seconds="1204160731" serial="1706"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>2fadf0d5-7c49-49b7-bcef-115be7036c9e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c8-0-e465dda680e5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16c8-0-e465dda680e5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16c8-0-e465dda680e5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16c8-0-e465dda680e5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16c8-0-e465dda680e5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="489" seconds="1204160731" serial="1707"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5836 comm="gconfd-2" name="linc-16cc-0-d0495f1778ef" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="489" seconds="1204160731" serial="1707"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe77b90 a2=382e8c a3=b80556d8 items=0 ppid=1 pid=5836 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="489" seconds="1204160731" serial="1707"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>cbc12266-f96f-4c51-b3e1-572d06af90f2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16cc-0-d0495f1778ef</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16cc-0-d0495f1778ef'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16cc-0-d0495f1778ef). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16cc-0-d0495f1778ef). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16cc-0-d0495f1778ef</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="633" seconds="1204160731" serial="1708"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5839 comm="gconfd-2" name="linc-16cf-0-19a46a049abda" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="633" seconds="1204160731" serial="1708"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfedf760 a2=382e8c a3=b7fbc6d8 items=0 ppid=1 pid=5839 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="633" seconds="1204160731" serial="1708"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>5598d145-8b1e-411a-848a-c692b5cc900f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16cf-0-19a46a049abda</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16cf-0-19a46a049abda'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16cf-0-19a46a049abda). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16cf-0-19a46a049abda). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16cf-0-19a46a049abda</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="670" seconds="1204160731" serial="1709"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5844 comm="gconfd-2" name="linc-16d4-0-28d9fb16a3ac8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="670" seconds="1204160731" serial="1709"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd32db0 a2=382e8c a3=b80106d8 items=0 ppid=1 pid=5844 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="670" seconds="1204160731" serial="1709"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>5c6ab65b-0eb3-48bb-b1cf-09ac18ef07fa</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16d4-0-28d9fb16a3ac8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16d4-0-28d9fb16a3ac8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16d4-0-28d9fb16a3ac8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16d4-0-28d9fb16a3ac8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16d4-0-28d9fb16a3ac8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="803" seconds="1204160731" serial="1710"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5849 comm="gconfd-2" name="linc-16d9-0-de61de8c42a0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="803" seconds="1204160731" serial="1710"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfac4b40 a2=382e8c a3=b80a06d8 items=0 ppid=5848 pid=5849 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="803" seconds="1204160731" serial="1710"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>556d72bb-2766-470b-9429-360e63f36006</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16d9-0-de61de8c42a0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16d9-0-de61de8c42a0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16d9-0-de61de8c42a0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16d9-0-de61de8c42a0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16d9-0-de61de8c42a0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="915" seconds="1204160731" serial="1711"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5852 comm="gconfd-2" name="linc-16dc-0-3550ba5adf986" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="915" seconds="1204160731" serial="1711"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd1b590 a2=382e8c a3=b7ff86d8 items=0 ppid=1 pid=5852 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="915" seconds="1204160731" serial="1711"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>c9d47b20-25ec-458f-9b4e-6e779219a82a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16dc-0-3550ba5adf986</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16dc-0-3550ba5adf986'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16dc-0-3550ba5adf986). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16dc-0-3550ba5adf986). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16dc-0-3550ba5adf986</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="978" seconds="1204160731" serial="1712"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5857 comm="gconfd-2" name="linc-16e1-0-2d9830e6eed96" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="978" seconds="1204160731" serial="1712"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd795f0 a2=382e8c a3=b7f566d8 items=0 ppid=5856 pid=5857 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="978" seconds="1204160731" serial="1712"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:31Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:31Z</last_seen_date> > <local_id>b8d74c15-ac4b-4654-bdc7-2a678e9a52e7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e1-0-2d9830e6eed96</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16e1-0-2d9830e6eed96'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16e1-0-2d9830e6eed96). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16e1-0-2d9830e6eed96). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e1-0-2d9830e6eed96</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="84" seconds="1204160732" serial="1713"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5860 comm="gconfd-2" name="linc-16e4-0-4db76a0d14a2e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="84" seconds="1204160732" serial="1713"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfadeb60 a2=382e8c a3=b80bc6d8 items=0 ppid=1 pid=5860 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="84" seconds="1204160732" serial="1713"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>c496530e-699a-4179-a438-6ab6eef25bec</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e4-0-4db76a0d14a2e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16e4-0-4db76a0d14a2e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16e4-0-4db76a0d14a2e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16e4-0-4db76a0d14a2e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e4-0-4db76a0d14a2e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="229" seconds="1204160732" serial="1714"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5865 comm="gconfd-2" name="linc-16e9-0-7480c03d37f84" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="229" seconds="1204160732" serial="1714"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff447c0 a2=382e8c a3=b7f216d8 items=0 ppid=1 pid=5865 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="229" seconds="1204160732" serial="1714"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>3321e9fc-2671-4e80-8323-ee11b60cda67</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e9-0-7480c03d37f84</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16e9-0-7480c03d37f84'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16e9-0-7480c03d37f84). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16e9-0-7480c03d37f84). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16e9-0-7480c03d37f84</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="259" seconds="1204160732" serial="1715"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5870 comm="gconfd-2" name="linc-16ee-0-2a7b4bc83f61f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="259" seconds="1204160732" serial="1715"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb78bf0 a2=382e8c a3=b7f546d8 items=0 ppid=1 pid=5870 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="259" seconds="1204160732" serial="1715"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>9e1fef8b-8741-4dd3-ad97-2c396b7ddb5a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ee-0-2a7b4bc83f61f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16ee-0-2a7b4bc83f61f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16ee-0-2a7b4bc83f61f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16ee-0-2a7b4bc83f61f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16ee-0-2a7b4bc83f61f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="394" seconds="1204160732" serial="1716"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5873 comm="gconfd-2" name="linc-16f1-0-3b3df6be604d1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="394" seconds="1204160732" serial="1716"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8630e0 a2=382e8c a3=b7f3e6d8 items=0 ppid=1 pid=5873 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="394" seconds="1204160732" serial="1716"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>d6d702fb-fe33-4efc-8371-f1606b60ac13</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f1-0-3b3df6be604d1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16f1-0-3b3df6be604d1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16f1-0-3b3df6be604d1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16f1-0-3b3df6be604d1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f1-0-3b3df6be604d1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="469" seconds="1204160732" serial="1717"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5879 comm="gconfd-2" name="linc-16f7-0-66c5bba172a5d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="469" seconds="1204160732" serial="1717"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9fda70 a2=382e8c a3=b80d96d8 items=0 ppid=1 pid=5879 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="469" seconds="1204160732" serial="1717"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>edf753d1-d6fc-4b88-9323-cbfa32e40db9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f7-0-66c5bba172a5d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16f7-0-66c5bba172a5d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16f7-0-66c5bba172a5d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16f7-0-66c5bba172a5d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f7-0-66c5bba172a5d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="589" seconds="1204160732" serial="1718"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5881 comm="gconfd-2" name="linc-16f9-0-58c3a1e38a38d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="589" seconds="1204160732" serial="1718"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff4f7d0 a2=382e8c a3=b7f2c6d8 items=0 ppid=1 pid=5881 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="589" seconds="1204160732" serial="1718"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>2aa20b6f-7c75-46ef-9f75-5be70e4f878a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f9-0-58c3a1e38a38d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-16f9-0-58c3a1e38a38d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-16f9-0-58c3a1e38a38d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-16f9-0-58c3a1e38a38d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-16f9-0-58c3a1e38a38d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="660" seconds="1204160732" serial="1719"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5888 comm="gconfd-2" name="linc-1700-0-4244ab8ea15a4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="660" seconds="1204160732" serial="1719"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd82e00 a2=382e8c a3=b805e6d8 items=0 ppid=5887 pid=5888 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="660" seconds="1204160732" serial="1719"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>14356e35-830e-44b1-a2ae-3f888ac79430</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1700-0-4244ab8ea15a4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1700-0-4244ab8ea15a4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1700-0-4244ab8ea15a4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1700-0-4244ab8ea15a4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1700-0-4244ab8ea15a4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="799" seconds="1204160732" serial="1720"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5891 comm="gconfd-2" name="linc-1703-0-4b8000c5c317b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160732" serial="1720"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9639e0 a2=382e8c a3=b7f416d8 items=0 ppid=1 pid=5891 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160732" serial="1720"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>a5b6b415-e4b4-4ea5-b537-96f47984a136</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1703-0-4b8000c5c317b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1703-0-4b8000c5c317b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1703-0-4b8000c5c317b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1703-0-4b8000c5c317b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1703-0-4b8000c5c317b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="846" seconds="1204160732" serial="1721"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5895 comm="gconfd-2" name="linc-1707-0-7c9e901eceb4d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="846" seconds="1204160732" serial="1721"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd9ee20 a2=382e8c a3=b807a6d8 items=0 ppid=1 pid=5895 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="846" seconds="1204160732" serial="1721"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>6148678e-e220-4e0b-a41a-151b730d3e34</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1707-0-7c9e901eceb4d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1707-0-7c9e901eceb4d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1707-0-7c9e901eceb4d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1707-0-7c9e901eceb4d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1707-0-7c9e901eceb4d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="981" seconds="1204160732" serial="1722"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5898 comm="gconfd-2" name="linc-170a-0-604c3e20ef89d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="981" seconds="1204160732" serial="1722"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff7bff0 a2=382e8c a3=b7f576d8 items=0 ppid=1 pid=5898 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="981" seconds="1204160732" serial="1722"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:32Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:32Z</last_seen_date> > <local_id>7a3f2473-67a8-4c74-8f46-f2b8b554e289</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-170a-0-604c3e20ef89d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-170a-0-604c3e20ef89d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-170a-0-604c3e20ef89d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-170a-0-604c3e20ef89d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-170a-0-604c3e20ef89d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="59" seconds="1204160733" serial="1723"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5903 comm="gconfd-2" name="linc-170f-0-1cb74600e801" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="59" seconds="1204160733" serial="1723"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9601e0 a2=382e8c a3=b803b6d8 items=0 ppid=1 pid=5903 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="59" seconds="1204160733" serial="1723"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>1594408d-ab4a-455d-9084-7d8a5af3771b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-170f-0-1cb74600e801</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-170f-0-1cb74600e801'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-170f-0-1cb74600e801). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-170f-0-1cb74600e801). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-170f-0-1cb74600e801</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="167" seconds="1204160733" serial="1724"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5906 comm="gconfd-2" name="linc-1712-0-f72bb7028e48" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="167" seconds="1204160733" serial="1724"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc5ece0 a2=382e8c a3=b7f3c6d8 items=0 ppid=1 pid=5906 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="167" seconds="1204160733" serial="1724"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>fa9b3e9b-9c34-4599-b7c8-113284c4e88a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1712-0-f72bb7028e48</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1712-0-f72bb7028e48'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1712-0-f72bb7028e48). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1712-0-f72bb7028e48). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1712-0-f72bb7028e48</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="282" seconds="1204160733" serial="1725"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5913 comm="gconfd-2" name="linc-1719-0-169ec83944f8e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="282" seconds="1204160733" serial="1725"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc48cc0 a2=382e8c a3=b7f246d8 items=0 ppid=5912 pid=5913 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="282" seconds="1204160733" serial="1725"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>569f9edc-6f43-4e51-9f97-5cbfbe127cb0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1719-0-169ec83944f8e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1719-0-169ec83944f8e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1719-0-169ec83944f8e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1719-0-169ec83944f8e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1719-0-169ec83944f8e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="391" seconds="1204160733" serial="1726"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5917 comm="gconfd-2" name="linc-171d-0-79f8340a5f906" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="391" seconds="1204160733" serial="1726"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa242a0 a2=382e8c a3=b80016d8 items=0 ppid=1 pid=5917 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="391" seconds="1204160733" serial="1726"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>f665cd63-da09-4d39-9b21-d6d1779ea5e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-171d-0-79f8340a5f906</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-171d-0-79f8340a5f906'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-171d-0-79f8340a5f906). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-171d-0-79f8340a5f906). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-171d-0-79f8340a5f906</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="486" seconds="1204160733" serial="1727"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5922 comm="gconfd-2" name="linc-1722-0-4867349376cf5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="486" seconds="1204160733" serial="1727"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89f120 a2=382e8c a3=b807a6d8 items=0 ppid=1 pid=5922 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="486" seconds="1204160733" serial="1727"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>8fe66449-3d12-4296-a027-e2449266c523</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1722-0-4867349376cf5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1722-0-4867349376cf5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1722-0-4867349376cf5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1722-0-4867349376cf5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1722-0-4867349376cf5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="613" seconds="1204160733" serial="1728"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5925 comm="gconfd-2" name="linc-1725-0-3b4eeb1695aa0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="613" seconds="1204160733" serial="1728"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff92810 a2=382e8c a3=b7f6f6d8 items=0 ppid=1 pid=5925 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="613" seconds="1204160733" serial="1728"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>c44d5b6e-de6e-4927-b13c-82858bdf8271</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1725-0-3b4eeb1695aa0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1725-0-3b4eeb1695aa0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1725-0-3b4eeb1695aa0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1725-0-3b4eeb1695aa0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1725-0-3b4eeb1695aa0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="659" seconds="1204160733" serial="1729"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5930 comm="gconfd-2" name="linc-172a-0-74ef9a44a0e12" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="659" seconds="1204160733" serial="1729"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9bb230 a2=382e8c a3=b7f966d8 items=0 ppid=1 pid=5930 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="659" seconds="1204160733" serial="1729"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>5ec0a0a1-da8a-4e28-9bc1-d9d2edb6e0f0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172a-0-74ef9a44a0e12</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-172a-0-74ef9a44a0e12'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-172a-0-74ef9a44a0e12). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-172a-0-74ef9a44a0e12). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172a-0-74ef9a44a0e12</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="758" seconds="1204160733" serial="1730"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5932 comm="gconfd-2" name="linc-172c-0-1cfe2305b90b9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="758" seconds="1204160733" serial="1730"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd668c0 a2=382e8c a3=b7f426d8 items=0 ppid=1 pid=5932 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="758" seconds="1204160733" serial="1730"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>5a200d69-d5b8-4d86-b110-3527e3073518</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172c-0-1cfe2305b90b9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-172c-0-1cfe2305b90b9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-172c-0-1cfe2305b90b9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-172c-0-1cfe2305b90b9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172c-0-1cfe2305b90b9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="801" seconds="1204160733" serial="1731"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5934 comm="gconfd-2" name="linc-172e-0-d1a45b6c3a64" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="801" seconds="1204160733" serial="1731"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb353b0 a2=382e8c a3=b7f126d8 items=0 ppid=1 pid=5934 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="801" seconds="1204160733" serial="1731"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>b4c9b267-6a87-43e7-8d75-df343909681f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172e-0-d1a45b6c3a64</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-172e-0-d1a45b6c3a64'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-172e-0-d1a45b6c3a64). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-172e-0-d1a45b6c3a64). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-172e-0-d1a45b6c3a64</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="888" seconds="1204160733" serial="1732"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5936 comm="gconfd-2" name="linc-1730-0-69b97980d9035" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="888" seconds="1204160733" serial="1732"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8338b0 a2=382e8c a3=b7f0f6d8 items=0 ppid=1 pid=5936 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="888" seconds="1204160733" serial="1732"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>1a1bfb19-c1d5-48d8-8cf8-f4c13a00db18</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1730-0-69b97980d9035</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1730-0-69b97980d9035'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1730-0-69b97980d9035). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1730-0-69b97980d9035). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1730-0-69b97980d9035</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="976" seconds="1204160733" serial="1733"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5938 comm="gconfd-2" name="linc-1732-0-58e20f87ee537" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="976" seconds="1204160733" serial="1733"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8cc1b0 a2=382e8c a3=b7fa96d8 items=0 ppid=5937 pid=5938 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="976" seconds="1204160733" serial="1733"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:33Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:33Z</last_seen_date> > <local_id>f9cc7c44-a537-4293-9af8-8dc231a80efd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1732-0-58e20f87ee537</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1732-0-58e20f87ee537'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1732-0-58e20f87ee537). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1732-0-58e20f87ee537). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1732-0-58e20f87ee537</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="86" seconds="1204160734" serial="1734"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5940 comm="gconfd-2" name="linc-1734-0-7a7f1f9a151cb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="86" seconds="1204160734" serial="1734"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb5ebe0 a2=382e8c a3=b803c6d8 items=0 ppid=1 pid=5940 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="86" seconds="1204160734" serial="1734"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>986080e2-40d1-4512-8720-0e46017bb6c9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1734-0-7a7f1f9a151cb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1734-0-7a7f1f9a151cb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1734-0-7a7f1f9a151cb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1734-0-7a7f1f9a151cb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1734-0-7a7f1f9a151cb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="154" seconds="1204160734" serial="1735"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5942 comm="gconfd-2" name="linc-1736-0-4e387125c18" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="154" seconds="1204160734" serial="1735"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfff5070 a2=382e8c a3=b80d26d8 items=0 ppid=1 pid=5942 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="154" seconds="1204160734" serial="1735"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>61e2b32e-b0c2-4dd2-a32d-519be6d98bb3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1736-0-4e387125c18</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1736-0-4e387125c18'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1736-0-4e387125c18). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1736-0-4e387125c18). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1736-0-4e387125c18</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="244" seconds="1204160734" serial="1736"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5944 comm="gconfd-2" name="linc-1738-0-49398773b9ad" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="244" seconds="1204160734" serial="1736"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe05e80 a2=382e8c a3=b7ee16d8 items=0 ppid=1 pid=5944 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="244" seconds="1204160734" serial="1736"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>31b3915a-968c-489d-9d2a-0db10600d5b7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1738-0-49398773b9ad</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1738-0-49398773b9ad'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1738-0-49398773b9ad). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1738-0-49398773b9ad). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1738-0-49398773b9ad</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="295" seconds="1204160734" serial="1737"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5946 comm="gconfd-2" name="linc-173a-0-23752622482ce" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="295" seconds="1204160734" serial="1737"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd5b5d0 a2=382e8c a3=b7f366d8 items=0 ppid=5945 pid=5946 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="295" seconds="1204160734" serial="1737"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>b89e399c-5ed6-4a7f-a790-8736190b451a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173a-0-23752622482ce</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-173a-0-23752622482ce'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-173a-0-23752622482ce). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-173a-0-23752622482ce). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173a-0-23752622482ce</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="380" seconds="1204160734" serial="1738"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5948 comm="gconfd-2" name="linc-173c-0-4d647dd35cd1a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="380" seconds="1204160734" serial="1738"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb9c410 a2=382e8c a3=b80776d8 items=0 ppid=1 pid=5948 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="380" seconds="1204160734" serial="1738"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>73354dcc-7271-4147-80c9-2ec952bd4adc</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173c-0-4d647dd35cd1a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-173c-0-4d647dd35cd1a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-173c-0-4d647dd35cd1a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-173c-0-4d647dd35cd1a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173c-0-4d647dd35cd1a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="439" seconds="1204160734" serial="1739"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5950 comm="gconfd-2" name="linc-173e-0-5d5511246b5e4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="439" seconds="1204160734" serial="1739"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcfdd80 a2=382e8c a3=b7fdb6d8 items=0 ppid=5949 pid=5950 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="439" seconds="1204160734" serial="1739"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>30253d64-ebc1-4ea3-a6a8-182df2b1a09e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173e-0-5d5511246b5e4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-173e-0-5d5511246b5e4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-173e-0-5d5511246b5e4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-173e-0-5d5511246b5e4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-173e-0-5d5511246b5e4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="533" seconds="1204160734" serial="1740"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5952 comm="gconfd-2" name="linc-1740-0-434023c382459" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="533" seconds="1204160734" serial="1740"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf2370 a2=382e8c a3=b7fcf6d8 items=0 ppid=1 pid=5952 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="533" seconds="1204160734" serial="1740"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>0ce10694-8f0a-4073-8403-b7d799b99c62</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1740-0-434023c382459</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1740-0-434023c382459'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1740-0-434023c382459). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1740-0-434023c382459). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1740-0-434023c382459</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="593" seconds="1204160734" serial="1741"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5954 comm="gconfd-2" name="linc-1742-0-58c543ef90f67" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="593" seconds="1204160734" serial="1741"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7c4f0 a2=382e8c a3=b80596d8 items=0 ppid=5953 pid=5954 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="593" seconds="1204160734" serial="1741"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>c6d959cb-e0ab-4181-a75c-3bd8aa23ad6a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1742-0-58c543ef90f67</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1742-0-58c543ef90f67'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1742-0-58c543ef90f67). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1742-0-58c543ef90f67). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1742-0-58c543ef90f67</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="691" seconds="1204160734" serial="1742"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5956 comm="gconfd-2" name="linc-1744-0-60e69ff1a8cb5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="691" seconds="1204160734" serial="1742"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa7820 a2=382e8c a3=b80846d8 items=0 ppid=1 pid=5956 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="691" seconds="1204160734" serial="1742"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>e1e7f103-8f1e-4a22-b072-031778112241</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1744-0-60e69ff1a8cb5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1744-0-60e69ff1a8cb5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1744-0-60e69ff1a8cb5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1744-0-60e69ff1a8cb5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1744-0-60e69ff1a8cb5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="723" seconds="1204160734" serial="1743"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5958 comm="gconfd-2" name="linc-1746-0-5dd853afb08b8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="723" seconds="1204160734" serial="1743"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe19e90 a2=382e8c a3=b7ef76d8 items=0 ppid=5957 pid=5958 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="723" seconds="1204160734" serial="1743"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>2feb6f57-1f9c-4b4c-b5a8-f91e2447bd0d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1746-0-5dd853afb08b8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1746-0-5dd853afb08b8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1746-0-5dd853afb08b8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1746-0-5dd853afb08b8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1746-0-5dd853afb08b8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="800" seconds="1204160734" serial="1744"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5960 comm="gconfd-2" name="linc-1748-0-72fe2991c36a8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160734" serial="1744"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa01750 a2=382e8c a3=b7fdc6d8 items=0 ppid=1 pid=5960 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160734" serial="1744"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>dd6056e0-5488-42e3-8bf1-22933b82bc7f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1748-0-72fe2991c36a8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1748-0-72fe2991c36a8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1748-0-72fe2991c36a8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1748-0-72fe2991c36a8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1748-0-72fe2991c36a8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="862" seconds="1204160734" serial="1745"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5962 comm="gconfd-2" name="linc-174a-0-1a58f1a4d2756" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="862" seconds="1204160734" serial="1745"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9e8a60 a2=382e8c a3=b7fc46d8 items=0 ppid=5961 pid=5962 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="862" seconds="1204160734" serial="1745"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>cd0d1177-6b25-4de8-8777-5d2d11f9b7f2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174a-0-1a58f1a4d2756</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-174a-0-1a58f1a4d2756'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-174a-0-1a58f1a4d2756). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-174a-0-1a58f1a4d2756). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174a-0-1a58f1a4d2756</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="967" seconds="1204160734" serial="1746"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5964 comm="gconfd-2" name="linc-174c-0-7aead6c3ec3ad" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="967" seconds="1204160734" serial="1746"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbb6c30 a2=382e8c a3=b80926d8 items=0 ppid=1 pid=5964 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="967" seconds="1204160734" serial="1746"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:34Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:34Z</last_seen_date> > <local_id>e56d9b88-38d2-413f-a7b4-6235b155a28b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174c-0-7aead6c3ec3ad</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-174c-0-7aead6c3ec3ad'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-174c-0-7aead6c3ec3ad). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-174c-0-7aead6c3ec3ad). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174c-0-7aead6c3ec3ad</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="26" seconds="1204160735" serial="1747"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5966 comm="gconfd-2" name="linc-174e-0-6feec0216558" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="26" seconds="1204160735" serial="1747"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfabfb40 a2=382e8c a3=b809d6d8 items=0 ppid=5965 pid=5966 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="26" seconds="1204160735" serial="1747"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>1be0e8c7-adf6-45ce-a611-86a6cd093f10</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174e-0-6feec0216558</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-174e-0-6feec0216558'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-174e-0-6feec0216558). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-174e-0-6feec0216558). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-174e-0-6feec0216558</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="135" seconds="1204160735" serial="1748"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5968 comm="gconfd-2" name="linc-1750-0-3586268a20ffc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="135" seconds="1204160735" serial="1748"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdd6e50 a2=382e8c a3=b7fb26d8 items=0 ppid=1 pid=5968 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="135" seconds="1204160735" serial="1748"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>d9bcc9f1-d391-40b4-997c-f355954478fe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1750-0-3586268a20ffc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1750-0-3586268a20ffc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1750-0-3586268a20ffc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1750-0-3586268a20ffc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1750-0-3586268a20ffc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="174" seconds="1204160735" serial="1749"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5970 comm="gconfd-2" name="linc-1752-0-6cb14d1b2a93c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="174" seconds="1204160735" serial="1749"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc38cb0 a2=382e8c a3=b7f146d8 items=0 ppid=5969 pid=5970 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="174" seconds="1204160735" serial="1749"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>42be2c61-e0bc-4d9f-a379-8e75db34a961</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1752-0-6cb14d1b2a93c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1752-0-6cb14d1b2a93c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1752-0-6cb14d1b2a93c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1752-0-6cb14d1b2a93c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1752-0-6cb14d1b2a93c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="287" seconds="1204160735" serial="1750"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5972 comm="gconfd-2" name="linc-1754-0-22ab65f346191" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="287" seconds="1204160735" serial="1750"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf88c100 a2=382e8c a3=b80676d8 items=0 ppid=1 pid=5972 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="287" seconds="1204160735" serial="1750"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>958f4b2e-b4f9-4459-aebf-ebfe0b98eae7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1754-0-22ab65f346191</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1754-0-22ab65f346191'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1754-0-22ab65f346191). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1754-0-22ab65f346191). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1754-0-22ab65f346191</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="338" seconds="1204160735" serial="1751"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5974 comm="gconfd-2" name="linc-1756-0-406016855288d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="338" seconds="1204160735" serial="1751"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe416c0 a2=382e8c a3=b801c6d8 items=0 ppid=5973 pid=5974 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="338" seconds="1204160735" serial="1751"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>f779566b-5aa1-4e37-8ad6-8d952abb0ff1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1756-0-406016855288d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1756-0-406016855288d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1756-0-406016855288d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1756-0-406016855288d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1756-0-406016855288d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="440" seconds="1204160735" serial="1752"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5976 comm="gconfd-2" name="linc-1758-0-7cb805ff6b811" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="440" seconds="1204160735" serial="1752"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc424c0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=5976 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="440" seconds="1204160735" serial="1752"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>04458731-2be4-4e6f-98d2-f51ac1debf8f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1758-0-7cb805ff6b811</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1758-0-7cb805ff6b811'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1758-0-7cb805ff6b811). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1758-0-7cb805ff6b811). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1758-0-7cb805ff6b811</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="521" seconds="1204160735" serial="1753"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5978 comm="gconfd-2" name="linc-175a-0-74b951517f5ce" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="521" seconds="1204160735" serial="1753"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd28da0 a2=382e8c a3=b7f066d8 items=0 ppid=1 pid=5978 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="521" seconds="1204160735" serial="1753"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>750ea5aa-911b-42f3-8389-e6857bd5e79f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175a-0-74b951517f5ce</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-175a-0-74b951517f5ce'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-175a-0-74b951517f5ce). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-175a-0-74b951517f5ce). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175a-0-74b951517f5ce</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="596" seconds="1204160735" serial="1754"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5980 comm="gconfd-2" name="linc-175c-0-7c614a0691ab5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="596" seconds="1204160735" serial="1754"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa542d0 a2=382e8c a3=b802f6d8 items=0 ppid=1 pid=5980 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="596" seconds="1204160735" serial="1754"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>d59baa49-0e0e-4a96-9eda-1e88bbe59b63</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175c-0-7c614a0691ab5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-175c-0-7c614a0691ab5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-175c-0-7c614a0691ab5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-175c-0-7c614a0691ab5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175c-0-7c614a0691ab5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="674" seconds="1204160735" serial="1755"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5982 comm="gconfd-2" name="linc-175e-0-6fcfdd2fa48a2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="674" seconds="1204160735" serial="1755"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe9b710 a2=382e8c a3=b7f786d8 items=0 ppid=1 pid=5982 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="674" seconds="1204160735" serial="1755"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>382c69b0-269a-4e2b-baa9-577fbfb0e963</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175e-0-6fcfdd2fa48a2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-175e-0-6fcfdd2fa48a2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-175e-0-6fcfdd2fa48a2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-175e-0-6fcfdd2fa48a2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-175e-0-6fcfdd2fa48a2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="756" seconds="1204160735" serial="1756"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5984 comm="gconfd-2" name="linc-1760-0-74445c04b8953" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="756" seconds="1204160735" serial="1756"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa43810 a2=382e8c a3=b7f1f6d8 items=0 ppid=1 pid=5984 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="756" seconds="1204160735" serial="1756"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>419343f4-54c1-4a7b-9113-5a2bca8e6146</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1760-0-74445c04b8953</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1760-0-74445c04b8953'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1760-0-74445c04b8953). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1760-0-74445c04b8953). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1760-0-74445c04b8953</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="847" seconds="1204160735" serial="1757"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5986 comm="gconfd-2" name="linc-1762-0-5232c386cec81" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="847" seconds="1204160735" serial="1757"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9491c0 a2=382e8c a3=b7f266d8 items=0 ppid=1 pid=5986 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="847" seconds="1204160735" serial="1757"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>cca3e95e-102c-41ad-9255-c41caf77491e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1762-0-5232c386cec81</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1762-0-5232c386cec81'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1762-0-5232c386cec81). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1762-0-5232c386cec81). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1762-0-5232c386cec81</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="926" seconds="1204160735" serial="1758"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5988 comm="gconfd-2" name="linc-1764-0-79487704e2187" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="926" seconds="1204160735" serial="1758"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff27c80 a2=382e8c a3=b7f046d8 items=0 ppid=1 pid=5988 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="926" seconds="1204160735" serial="1758"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>5c7868ba-e25c-4711-83dc-5c574ce2c9e8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1764-0-79487704e2187</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1764-0-79487704e2187'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1764-0-79487704e2187). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1764-0-79487704e2187). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1764-0-79487704e2187</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="964" seconds="1204160735" serial="1759"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5990 comm="gconfd-2" name="linc-1766-0-21f9fed7eb68f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="964" seconds="1204160735" serial="1759"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc2aca0 a2=382e8c a3=b7f066d8 items=0 ppid=1 pid=5990 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="964" seconds="1204160735" serial="1759"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:35Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:35Z</last_seen_date> > <local_id>4d114f2b-78cb-43a5-81c9-b343ef08841e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1766-0-21f9fed7eb68f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1766-0-21f9fed7eb68f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1766-0-21f9fed7eb68f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1766-0-21f9fed7eb68f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1766-0-21f9fed7eb68f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="79" seconds="1204160736" serial="1760"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5992 comm="gconfd-2" name="linc-1768-0-9a0c10e13609" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="79" seconds="1204160736" serial="1760"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc097e0 a2=382e8c a3=b7fe56d8 items=0 ppid=1 pid=5992 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="79" seconds="1204160736" serial="1760"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>b07b25be-030f-46d9-a013-ac00eaf99da9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1768-0-9a0c10e13609</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1768-0-9a0c10e13609'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1768-0-9a0c10e13609). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1768-0-9a0c10e13609). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1768-0-9a0c10e13609</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="140" seconds="1204160736" serial="1761"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5994 comm="gconfd-2" name="linc-176a-0-8324c8a22487" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="140" seconds="1204160736" serial="1761"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe2c6a0 a2=382e8c a3=b80076d8 items=0 ppid=1 pid=5994 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="140" seconds="1204160736" serial="1761"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>1f830f97-14e9-470b-a655-302b57f11afe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176a-0-8324c8a22487</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-176a-0-8324c8a22487'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-176a-0-8324c8a22487). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-176a-0-8324c8a22487). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176a-0-8324c8a22487</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="235" seconds="1204160736" serial="1762"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5996 comm="gconfd-2" name="linc-176c-0-48397120396bf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="235" seconds="1204160736" serial="1762"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8fd970 a2=382e8c a3=b80d96d8 items=0 ppid=1 pid=5996 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="235" seconds="1204160736" serial="1762"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>7662b3e3-9762-4e57-ab03-23c4fd96ff29</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176c-0-48397120396bf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-176c-0-48397120396bf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-176c-0-48397120396bf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-176c-0-48397120396bf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176c-0-48397120396bf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="285" seconds="1204160736" serial="1763"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=5998 comm="gconfd-2" name="linc-176e-0-1445ebc145a51" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="285" seconds="1204160736" serial="1763"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9401c0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=5998 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="285" seconds="1204160736" serial="1763"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>17eb4911-ac94-40a4-8e79-e3e0b6b05daf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176e-0-1445ebc145a51</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-176e-0-1445ebc145a51'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-176e-0-1445ebc145a51). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-176e-0-1445ebc145a51). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-176e-0-1445ebc145a51</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="373" seconds="1204160736" serial="1764"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6000 comm="gconfd-2" name="linc-1770-0-52dcd8455b3d0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="373" seconds="1204160736" serial="1764"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf88dc50 a2=382e8c a3=b7f696d8 items=0 ppid=1 pid=6000 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="373" seconds="1204160736" serial="1764"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>f8a77763-ae3d-486f-9fdd-213505548e33</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1770-0-52dcd8455b3d0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1770-0-52dcd8455b3d0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1770-0-52dcd8455b3d0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1770-0-52dcd8455b3d0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1770-0-52dcd8455b3d0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="478" seconds="1204160736" serial="1765"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6002 comm="gconfd-2" name="linc-1772-0-1956383d74ca3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="478" seconds="1204160736" serial="1765"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb15390 a2=382e8c a3=b7ff06d8 items=0 ppid=6001 pid=6002 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="478" seconds="1204160736" serial="1765"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>12204a12-4376-48c6-babb-a8eea27e89ef</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1772-0-1956383d74ca3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1772-0-1956383d74ca3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1772-0-1956383d74ca3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1772-0-1956383d74ca3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1772-0-1956383d74ca3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="578" seconds="1204160736" serial="1766"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6004 comm="gconfd-2" name="linc-1774-0-4b654cc88d352" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="578" seconds="1204160736" serial="1766"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf901180 a2=382e8c a3=b7edc6d8 items=0 ppid=1 pid=6004 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="578" seconds="1204160736" serial="1766"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>c368459d-1732-4b62-9b1b-1e98e2b9edd6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1774-0-4b654cc88d352</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1774-0-4b654cc88d352'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1774-0-4b654cc88d352). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1774-0-4b654cc88d352). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1774-0-4b654cc88d352</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="635" seconds="1204160736" serial="1767"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6006 comm="gconfd-2" name="linc-1776-0-243d9ee89b3e4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="635" seconds="1204160736" serial="1767"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa426f0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=6006 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="635" seconds="1204160736" serial="1767"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>458ebafa-df56-466f-96ef-4a27220fd4a4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1776-0-243d9ee89b3e4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1776-0-243d9ee89b3e4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1776-0-243d9ee89b3e4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1776-0-243d9ee89b3e4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1776-0-243d9ee89b3e4</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="789" seconds="1204160736" serial="1768"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6008 comm="gconfd-2" name="linc-1778-0-1851f652c0b7e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160736" serial="1768"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd565d0 a2=382e8c a3=b80316d8 items=0 ppid=1 pid=6008 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160736" serial="1768"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>b93941b3-6cce-4ee6-a8d9-9b949c77fc34</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1778-0-1851f652c0b7e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1778-0-1851f652c0b7e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1778-0-1851f652c0b7e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1778-0-1851f652c0b7e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1778-0-1851f652c0b7e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="864" seconds="1204160736" serial="1769"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6010 comm="gconfd-2" name="linc-177a-0-5f4cb440d2f56" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="864" seconds="1204160736" serial="1769"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcddd50 a2=382e8c a3=b80b96d8 items=0 ppid=6009 pid=6010 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="864" seconds="1204160736" serial="1769"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>89d18928-aca4-4e5b-99ce-4dcd83071a3d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177a-0-5f4cb440d2f56</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-177a-0-5f4cb440d2f56'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-177a-0-5f4cb440d2f56). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-177a-0-5f4cb440d2f56). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177a-0-5f4cb440d2f56</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="951" seconds="1204160736" serial="1770"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6012 comm="gconfd-2" name="linc-177c-0-2ccded7e856c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="951" seconds="1204160736" serial="1770"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9439c0 a2=382e8c a3=b801f6d8 items=0 ppid=1 pid=6012 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="951" seconds="1204160736" serial="1770"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>ddeb1250-124e-48f6-8f37-7329178abc44</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177c-0-2ccded7e856c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-177c-0-2ccded7e856c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-177c-0-2ccded7e856c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-177c-0-2ccded7e856c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177c-0-2ccded7e856c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="986" seconds="1204160736" serial="1771"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6014 comm="gconfd-2" name="linc-177e-0-48ae8a55f0e15" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="986" seconds="1204160736" serial="1771"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa45ac0 a2=382e8c a3=b7f216d8 items=0 ppid=6013 pid=6014 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="986" seconds="1204160736" serial="1771"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:36Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:36Z</last_seen_date> > <local_id>d3a8f17e-ec54-468b-b69d-e6d38d70a608</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177e-0-48ae8a55f0e15</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-177e-0-48ae8a55f0e15'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-177e-0-48ae8a55f0e15). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-177e-0-48ae8a55f0e15). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-177e-0-48ae8a55f0e15</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="127" seconds="1204160737" serial="1772"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6016 comm="gconfd-2" name="linc-1780-0-45aa25311f06c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="127" seconds="1204160737" serial="1772"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfff2870 a2=382e8c a3=b80cd6d8 items=0 ppid=1 pid=6016 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="127" seconds="1204160737" serial="1772"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>30a16d47-fe02-4fb5-aae4-29a8ed21298d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1780-0-45aa25311f06c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1780-0-45aa25311f06c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1780-0-45aa25311f06c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1780-0-45aa25311f06c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1780-0-45aa25311f06c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="189" seconds="1204160737" serial="1773"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6018 comm="gconfd-2" name="linc-1782-0-5ce808502e5cd" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="189" seconds="1204160737" serial="1773"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf99ca10 a2=382e8c a3=b7f786d8 items=0 ppid=1 pid=6018 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="189" seconds="1204160737" serial="1773"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>e793b12d-5fa9-4eb7-bb1f-8190c5af2675</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1782-0-5ce808502e5cd</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1782-0-5ce808502e5cd'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1782-0-5ce808502e5cd). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1782-0-5ce808502e5cd). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1782-0-5ce808502e5cd</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="286" seconds="1204160737" serial="1774"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6020 comm="gconfd-2" name="linc-1784-0-4d2f992545f2a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="286" seconds="1204160737" serial="1774"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf90d990 a2=382e8c a3=b7eeb6d8 items=0 ppid=1 pid=6020 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="286" seconds="1204160737" serial="1774"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>d3703334-3a8a-489e-8b18-7c765126a43d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1784-0-4d2f992545f2a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1784-0-4d2f992545f2a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1784-0-4d2f992545f2a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1784-0-4d2f992545f2a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1784-0-4d2f992545f2a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="360" seconds="1204160737" serial="1775"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6022 comm="gconfd-2" name="linc-1786-0-7c68d3fe57fcf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="360" seconds="1204160737" serial="1775"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff8d000 a2=382e8c a3=b7f686d8 items=0 ppid=6021 pid=6022 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="360" seconds="1204160737" serial="1775"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>1ef460d4-6377-4cfa-891c-b302a12c89c5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1786-0-7c68d3fe57fcf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1786-0-7c68d3fe57fcf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1786-0-7c68d3fe57fcf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1786-0-7c68d3fe57fcf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1786-0-7c68d3fe57fcf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="470" seconds="1204160737" serial="1776"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6024 comm="gconfd-2" name="linc-1788-0-77fc385f72f05" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="470" seconds="1204160737" serial="1776"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff86de0 a2=382e8c a3=b80636d8 items=0 ppid=1 pid=6024 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="470" seconds="1204160737" serial="1776"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>87ffa548-8553-437e-a23b-f0b056303b55</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1788-0-77fc385f72f05</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1788-0-77fc385f72f05'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1788-0-77fc385f72f05). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1788-0-77fc385f72f05). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1788-0-77fc385f72f05</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="527" seconds="1204160737" serial="1777"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6028 comm="gconfd-2" name="linc-178c-0-1ead4cc18009f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="527" seconds="1204160737" serial="1777"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf820b00 a2=382e8c a3=b7ffd6d8 items=0 ppid=1 pid=6028 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="527" seconds="1204160737" serial="1777"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>fb10336b-17d3-4975-84d3-47afb029d5b8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178c-0-1ead4cc18009f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-178c-0-1ead4cc18009f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-178c-0-1ead4cc18009f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-178c-0-1ead4cc18009f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178c-0-1ead4cc18009f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="558" seconds="1204160737" serial="1778"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6026 comm="gconfd-2" name="linc-178a-0-f0876d78872e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="558" seconds="1204160737" serial="1778"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf83d0c0 a2=382e8c a3=b801a6d8 items=0 ppid=1 pid=6026 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="558" seconds="1204160737" serial="1778"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>d37d3bbb-9e0c-483a-bbcc-aebf259a8b34</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178a-0-f0876d78872e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-178a-0-f0876d78872e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-178a-0-f0876d78872e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-178a-0-f0876d78872e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178a-0-f0876d78872e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="650" seconds="1204160737" serial="1779"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6032 comm="gconfd-2" name="linc-1790-0-76d133a79ee27" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="650" seconds="1204160737" serial="1779"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf80b080 a2=382e8c a3=b7ee86d8 items=0 ppid=1 pid=6032 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="650" seconds="1204160737" serial="1779"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>6d6e37c6-085c-49e8-91c4-8bb5e7a839c1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1790-0-76d133a79ee27</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1790-0-76d133a79ee27'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1790-0-76d133a79ee27). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1790-0-76d133a79ee27). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1790-0-76d133a79ee27</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="657" seconds="1204160737" serial="1780"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6030 comm="gconfd-2" name="linc-178e-0-7a5b01a07d8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="657" seconds="1204160737" serial="1780"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8558d0 a2=382e8c a3=b7f316d8 items=0 ppid=1 pid=6030 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="657" seconds="1204160737" serial="1780"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>9f091d6b-dd01-4ec9-a8eb-f49748a990d7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178e-0-7a5b01a07d8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-178e-0-7a5b01a07d8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-178e-0-7a5b01a07d8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-178e-0-7a5b01a07d8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-178e-0-7a5b01a07d8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="760" seconds="1204160737" serial="1781"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6034 comm="gconfd-2" name="linc-1792-0-682ea835b9bc5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="760" seconds="1204160737" serial="1781"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfad2500 a2=382e8c a3=b80af6d8 items=0 ppid=6033 pid=6034 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="760" seconds="1204160737" serial="1781"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>cfaf309f-e4e0-499a-9814-214b1898a58a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1792-0-682ea835b9bc5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1792-0-682ea835b9bc5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1792-0-682ea835b9bc5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1792-0-682ea835b9bc5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1792-0-682ea835b9bc5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="867" seconds="1204160737" serial="1782"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6036 comm="gconfd-2" name="linc-1794-0-626ca174d3bee" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="867" seconds="1204160737" serial="1782"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9301b0 a2=382e8c a3=b800b6d8 items=0 ppid=1 pid=6036 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="867" seconds="1204160737" serial="1782"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>27e58f4d-6dc0-4edc-aeb2-ab7283a1aa27</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1794-0-626ca174d3bee</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1794-0-626ca174d3bee'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1794-0-626ca174d3bee). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1794-0-626ca174d3bee). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1794-0-626ca174d3bee</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="916" seconds="1204160737" serial="1783"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6038 comm="gconfd-2" name="linc-1796-0-23d3536dfa04" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="916" seconds="1204160737" serial="1783"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf882900 a2=382e8c a3=b7f606d8 items=0 ppid=6037 pid=6038 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="916" seconds="1204160737" serial="1783"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:37Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:37Z</last_seen_date> > <local_id>05adb9dd-7dad-49a8-9ba7-47c9e23b5785</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1796-0-23d3536dfa04</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1796-0-23d3536dfa04'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1796-0-23d3536dfa04). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1796-0-23d3536dfa04). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1796-0-23d3536dfa04</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="15" seconds="1204160738" serial="1784"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6040 comm="gconfd-2" name="linc-1798-0-7943335c3e0e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="15" seconds="1204160738" serial="1784"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbd7c50 a2=382e8c a3=b80b36d8 items=0 ppid=1 pid=6040 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="15" seconds="1204160738" serial="1784"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>5d33d873-3e42-4c16-9298-5f02c23eb40e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1798-0-7943335c3e0e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1798-0-7943335c3e0e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1798-0-7943335c3e0e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1798-0-7943335c3e0e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1798-0-7943335c3e0e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="57" seconds="1204160738" serial="1785"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6042 comm="gconfd-2" name="linc-179a-0-2b4630e6dfdc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="57" seconds="1204160738" serial="1785"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd39db0 a2=382e8c a3=b80176d8 items=0 ppid=1 pid=6042 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="57" seconds="1204160738" serial="1785"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>bb8f6bf2-67a0-4f4c-bcef-0160dbb44bcb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179a-0-2b4630e6dfdc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-179a-0-2b4630e6dfdc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-179a-0-2b4630e6dfdc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-179a-0-2b4630e6dfdc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179a-0-2b4630e6dfdc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="158" seconds="1204160738" serial="1786"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6044 comm="gconfd-2" name="linc-179c-0-13363bbc26c55" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="158" seconds="1204160738" serial="1786"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbecc60 a2=382e8c a3=b7fc86d8 items=0 ppid=1 pid=6044 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="158" seconds="1204160738" serial="1786"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>af31f01e-ab13-4fd4-9b7b-e1e324e1138a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179c-0-13363bbc26c55</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-179c-0-13363bbc26c55'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-179c-0-13363bbc26c55). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-179c-0-13363bbc26c55). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179c-0-13363bbc26c55</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="201" seconds="1204160738" serial="1787"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6046 comm="gconfd-2" name="linc-179e-0-22dd46043143e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160738" serial="1787"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdce650 a2=382e8c a3=b7fab6d8 items=0 ppid=6045 pid=6046 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160738" serial="1787"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>300932da-5956-41e6-b614-83ab3775286b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179e-0-22dd46043143e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-179e-0-22dd46043143e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-179e-0-22dd46043143e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-179e-0-22dd46043143e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-179e-0-22dd46043143e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="316" seconds="1204160738" serial="1788"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6048 comm="gconfd-2" name="linc-17a0-0-50b6339c4d5e3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="316" seconds="1204160738" serial="1788"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb90410 a2=382e8c a3=b806b6d8 items=0 ppid=1 pid=6048 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="316" seconds="1204160738" serial="1788"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>565c7241-7342-4282-a700-8ecb63bedd86</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a0-0-50b6339c4d5e3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17a0-0-50b6339c4d5e3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17a0-0-50b6339c4d5e3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17a0-0-50b6339c4d5e3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a0-0-50b6339c4d5e3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="382" seconds="1204160738" serial="1789"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6052 comm="gconfd-2" name="linc-17a4-0-13fb7d835d47e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="382" seconds="1204160738" serial="1789"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff617e0 a2=382e8c a3=b7f3e6d8 items=0 ppid=6051 pid=6052 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="382" seconds="1204160738" serial="1789"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>4167a7de-3abf-4bd0-977d-07e96da9f69e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a4-0-13fb7d835d47e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17a4-0-13fb7d835d47e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17a4-0-13fb7d835d47e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17a4-0-13fb7d835d47e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a4-0-13fb7d835d47e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="490" seconds="1204160738" serial="1790"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6054 comm="gconfd-2" name="linc-17a6-0-7429723077b05" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="490" seconds="1204160738" serial="1790"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb6dbe0 a2=382e8c a3=b80496d8 items=0 ppid=1 pid=6054 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="490" seconds="1204160738" serial="1790"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>a65a99b7-9470-4a9d-9eeb-ebb9e121bde6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a6-0-7429723077b05</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17a6-0-7429723077b05'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17a6-0-7429723077b05). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17a6-0-7429723077b05). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a6-0-7429723077b05</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="744" seconds="1204160738" serial="1792"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6056 comm="gconfd-2" name="linc-17a8-0-67706202b5d20" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="744" seconds="1204160738" serial="1792"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe606e0 a2=382e8c a3=b7f3d6d8 items=0 ppid=1 pid=6056 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="744" seconds="1204160738" serial="1792"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>108f5590-77cd-4a66-956b-eb61a675a971</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a8-0-67706202b5d20</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17a8-0-67706202b5d20'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17a8-0-67706202b5d20). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17a8-0-67706202b5d20). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17a8-0-67706202b5d20</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="848" seconds="1204160738" serial="1793"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6059 comm="gconfd-2" name="linc-17ab-0-2c42f56cf37d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="848" seconds="1204160738" serial="1793"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb07380 a2=382e8c a3=b7ee46d8 items=0 ppid=1 pid=6059 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="848" seconds="1204160738" serial="1793"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>d82e0d72-5b60-4d63-bc9e-e82ab70025f9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ab-0-2c42f56cf37d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17ab-0-2c42f56cf37d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17ab-0-2c42f56cf37d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17ab-0-2c42f56cf37d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ab-0-2c42f56cf37d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="906" seconds="1204160738" serial="1794"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6063 comm="gconfd-2" name="linc-17af-0-5a379bb4dd4be" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="906" seconds="1204160738" serial="1794"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa4aac0 a2=382e8c a3=b80286d8 items=0 ppid=6062 pid=6063 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="906" seconds="1204160738" serial="1794"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:38Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:38Z</last_seen_date> > <local_id>573c155d-d582-454f-8a82-571960d71746</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17af-0-5a379bb4dd4be</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17af-0-5a379bb4dd4be'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17af-0-5a379bb4dd4be). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17af-0-5a379bb4dd4be). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17af-0-5a379bb4dd4be</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="4" seconds="1204160739" serial="1795"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6066 comm="gconfd-2" name="linc-17b2-0-73dbb8a01305" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="4" seconds="1204160739" serial="1795"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd94610 a2=382e8c a3=b7f6f6d8 items=0 ppid=1 pid=6066 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="4" seconds="1204160739" serial="1795"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>245568f8-1294-463b-928d-54a6ae1eaa4c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17b2-0-73dbb8a01305</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17b2-0-73dbb8a01305'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17b2-0-73dbb8a01305). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17b2-0-73dbb8a01305). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17b2-0-73dbb8a01305</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="61" seconds="1204160739" serial="1796"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6071 comm="gconfd-2" name="linc-17b7-0-6e135309f1c1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="61" seconds="1204160739" serial="1796"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe526d0 a2=382e8c a3=b7f2f6d8 items=0 ppid=6070 pid=6071 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="61" seconds="1204160739" serial="1796"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>a75f1814-bc39-426d-9ba3-ecf7c3cc786a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17b7-0-6e135309f1c1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17b7-0-6e135309f1c1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17b7-0-6e135309f1c1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17b7-0-6e135309f1c1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17b7-0-6e135309f1c1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="172" seconds="1204160739" serial="1797"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6074 comm="gconfd-2" name="linc-17ba-0-683afacc2a2f9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="172" seconds="1204160739" serial="1797"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf80b830 a2=382e8c a3=b7ee76d8 items=0 ppid=1 pid=6074 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="172" seconds="1204160739" serial="1797"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>f32b0c33-d219-4079-aa09-5b67ca4fd5fd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ba-0-683afacc2a2f9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17ba-0-683afacc2a2f9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17ba-0-683afacc2a2f9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17ba-0-683afacc2a2f9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ba-0-683afacc2a2f9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="325" seconds="1204160739" serial="1798"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6079 comm="gconfd-2" name="linc-17bf-0-118248174f65a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="325" seconds="1204160739" serial="1798"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfef5770 a2=382e8c a3=b80d26d8 items=0 ppid=1 pid=6079 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="325" seconds="1204160739" serial="1798"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>a19879c9-794e-492b-b38b-f6544167cce2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17bf-0-118248174f65a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17bf-0-118248174f65a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17bf-0-118248174f65a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17bf-0-118248174f65a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17bf-0-118248174f65a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="580" seconds="1204160739" serial="1799"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6088 comm="gconfd-2" name="linc-17c8-0-1d05abe78d9fa" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="580" seconds="1204160739" serial="1799"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9331b0 a2=382e8c a3=b800e6d8 items=0 ppid=1 pid=6088 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="580" seconds="1204160739" serial="1799"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>afe90ad6-3ad8-4d0d-8e83-946b61b99eb9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17c8-0-1d05abe78d9fa</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17c8-0-1d05abe78d9fa'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17c8-0-1d05abe78d9fa). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17c8-0-1d05abe78d9fa). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17c8-0-1d05abe78d9fa</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="621" seconds="1204160739" serial="1800"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6094 comm="gconfd-2" name="linc-17ce-0-853c2a697b32" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="621" seconds="1204160739" serial="1800"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffb3030 a2=382e8c a3=b7f906d8 items=0 ppid=6093 pid=6094 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="621" seconds="1204160739" serial="1800"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>31eb4daa-6c50-46c9-b402-0743f842e507</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ce-0-853c2a697b32</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17ce-0-853c2a697b32'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17ce-0-853c2a697b32). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17ce-0-853c2a697b32). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ce-0-853c2a697b32</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="898" seconds="1204160739" serial="1801"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6097 comm="gconfd-2" name="linc-17d1-0-39c57877db70a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="898" seconds="1204160739" serial="1801"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfabc330 a2=382e8c a3=b7f976d8 items=0 ppid=1 pid=6097 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="898" seconds="1204160739" serial="1801"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>dab7313e-4ad6-4ebb-b776-d1521accc7d0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17d1-0-39c57877db70a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17d1-0-39c57877db70a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17d1-0-39c57877db70a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17d1-0-39c57877db70a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17d1-0-39c57877db70a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="947" seconds="1204160739" serial="1802"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6106 comm="gconfd-2" name="linc-17da-0-1766ab9de76a3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="947" seconds="1204160739" serial="1802"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff020d0 a2=382e8c a3=b7edd6d8 items=0 ppid=1 pid=6106 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="947" seconds="1204160739" serial="1802"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:39Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:39Z</last_seen_date> > <local_id>2d7a0cd5-fdec-4fc1-9305-c7c6828fd29e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17da-0-1766ab9de76a3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17da-0-1766ab9de76a3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17da-0-1766ab9de76a3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17da-0-1766ab9de76a3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17da-0-1766ab9de76a3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="84" seconds="1204160740" serial="1803"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6109 comm="gconfd-2" name="linc-17dd-0-2cf86aae14b2d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="84" seconds="1204160740" serial="1803"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd4fdd0 a2=382e8c a3=b7f2b6d8 items=0 ppid=1 pid=6109 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="84" seconds="1204160740" serial="1803"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>e4c2c05e-1def-44bd-a9b1-3445bfea0c4c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17dd-0-2cf86aae14b2d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17dd-0-2cf86aae14b2d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17dd-0-2cf86aae14b2d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17dd-0-2cf86aae14b2d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17dd-0-2cf86aae14b2d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="126" seconds="1204160740" serial="1804"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6114 comm="gconfd-2" name="linc-17e2-0-764e3d601ee8a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="126" seconds="1204160740" serial="1804"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa50ad0 a2=382e8c a3=b7f2e6d8 items=0 ppid=1 pid=6114 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="126" seconds="1204160740" serial="1804"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>b86a2978-7665-4609-9d63-fe2f0e67c677</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17e2-0-764e3d601ee8a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17e2-0-764e3d601ee8a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17e2-0-764e3d601ee8a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17e2-0-764e3d601ee8a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17e2-0-764e3d601ee8a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="269" seconds="1204160740" serial="1805"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6118 comm="gconfd-2" name="linc-17e6-0-1477d36341abe" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="269" seconds="1204160740" serial="1805"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89c110 a2=382e8c a3=b7f776d8 items=0 ppid=1 pid=6118 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="269" seconds="1204160740" serial="1805"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>da667a7a-8e80-47ec-bafd-292399b28b73</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17e6-0-1477d36341abe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17e6-0-1477d36341abe'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17e6-0-1477d36341abe). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17e6-0-1477d36341abe). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17e6-0-1477d36341abe</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="319" seconds="1204160740" serial="1806"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6122 comm="gconfd-2" name="linc-17ea-0-19a9b56e4df4e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="319" seconds="1204160740" serial="1806"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc99d10 a2=382e8c a3=b7f776d8 items=0 ppid=6121 pid=6122 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="319" seconds="1204160740" serial="1806"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>4297b00b-52bf-4d9c-ae99-c5100d35658d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ea-0-19a9b56e4df4e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17ea-0-19a9b56e4df4e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17ea-0-19a9b56e4df4e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17ea-0-19a9b56e4df4e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ea-0-19a9b56e4df4e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="462" seconds="1204160740" serial="1807"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6125 comm="gconfd-2" name="linc-17ed-0-711d9acd70d5f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="462" seconds="1204160740" serial="1807"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff2efb0 a2=382e8c a3=b800c6d8 items=0 ppid=1 pid=6125 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="462" seconds="1204160740" serial="1807"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>ce677d83-7ad7-481b-87b2-399a0562d48e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ed-0-711d9acd70d5f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17ed-0-711d9acd70d5f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17ed-0-711d9acd70d5f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17ed-0-711d9acd70d5f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17ed-0-711d9acd70d5f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="527" seconds="1204160740" serial="1808"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6130 comm="gconfd-2" name="linc-17f2-0-1196a39880dbf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="527" seconds="1204160740" serial="1808"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe776f0 a2=382e8c a3=b7f526d8 items=0 ppid=1 pid=6130 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="527" seconds="1204160740" serial="1808"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>600b4ab7-f66b-40a8-a591-f247bbd82918</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17f2-0-1196a39880dbf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17f2-0-1196a39880dbf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17f2-0-1196a39880dbf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17f2-0-1196a39880dbf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17f2-0-1196a39880dbf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="634" seconds="1204160740" serial="1809"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6133 comm="gconfd-2" name="linc-17f5-0-67791f399af81" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="634" seconds="1204160740" serial="1809"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcead60 a2=382e8c a3=b80c86d8 items=0 ppid=1 pid=6133 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="634" seconds="1204160740" serial="1809"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>94f4f89d-cb86-4be3-9421-7ddf4ad26081</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17f5-0-67791f399af81</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17f5-0-67791f399af81'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17f5-0-67791f399af81). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17f5-0-67791f399af81). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17f5-0-67791f399af81</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="700" seconds="1204160740" serial="1810"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6138 comm="gconfd-2" name="linc-17fa-0-363223f9ab093" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="700" seconds="1204160740" serial="1810"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfefc770 a2=382e8c a3=b80d96d8 items=0 ppid=1 pid=6138 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="700" seconds="1204160740" serial="1810"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>72d5acd2-2c2f-4137-bd4e-d89eed2bc866</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17fa-0-363223f9ab093</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17fa-0-363223f9ab093'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17fa-0-363223f9ab093). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17fa-0-363223f9ab093). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17fa-0-363223f9ab093</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="816" seconds="1204160740" serial="1811"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6141 comm="gconfd-2" name="linc-17fd-0-48a3bdc76b1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="816" seconds="1204160740" serial="1811"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfef2130 a2=382e8c a3=b7fcf6d8 items=0 ppid=1 pid=6141 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="816" seconds="1204160740" serial="1811"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>b6f1895f-44f5-4370-a416-98750108e0a9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17fd-0-48a3bdc76b1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-17fd-0-48a3bdc76b1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-17fd-0-48a3bdc76b1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-17fd-0-48a3bdc76b1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-17fd-0-48a3bdc76b1</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="894" seconds="1204160740" serial="1812"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6146 comm="gconfd-2" name="linc-1802-0-4f70c21cda5f2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="894" seconds="1204160740" serial="1812"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd84e00 a2=382e8c a3=b7f626d8 items=0 ppid=1 pid=6146 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="894" seconds="1204160740" serial="1812"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:40Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:40Z</last_seen_date> > <local_id>fce917ce-3a5b-4576-99d9-cab5235361b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1802-0-4f70c21cda5f2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1802-0-4f70c21cda5f2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1802-0-4f70c21cda5f2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1802-0-4f70c21cda5f2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1802-0-4f70c21cda5f2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="18" seconds="1204160741" serial="1813"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6149 comm="gconfd-2" name="linc-1805-0-15da8279494d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="18" seconds="1204160741" serial="1813"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb54c30 a2=382e8c a3=b7f326d8 items=0 ppid=1 pid=6149 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="18" seconds="1204160741" serial="1813"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>84a5faf4-a0af-4291-a58b-7d77ae4693d7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1805-0-15da8279494d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1805-0-15da8279494d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1805-0-15da8279494d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1805-0-15da8279494d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1805-0-15da8279494d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="66" seconds="1204160741" serial="1814"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6154 comm="gconfd-2" name="linc-180a-0-71aad0b2101b7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="66" seconds="1204160741" serial="1814"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffd6850 a2=382e8c a3=b7fb36d8 items=0 ppid=1 pid=6154 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="66" seconds="1204160741" serial="1814"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>e404a7ee-5f4c-4805-9ba1-cef38df137db</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-180a-0-71aad0b2101b7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-180a-0-71aad0b2101b7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-180a-0-71aad0b2101b7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-180a-0-71aad0b2101b7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-180a-0-71aad0b2101b7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="198" seconds="1204160741" serial="1815"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6157 comm="gconfd-2" name="linc-180d-0-624c53d23080e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="198" seconds="1204160741" serial="1815"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8cf950 a2=382e8c a3=b80ad6d8 items=0 ppid=1 pid=6157 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="198" seconds="1204160741" serial="1815"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>48571285-6d73-46ab-8079-9f38322cedb5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-180d-0-624c53d23080e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-180d-0-624c53d23080e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-180d-0-624c53d23080e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-180d-0-624c53d23080e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-180d-0-624c53d23080e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="266" seconds="1204160741" serial="1816"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6163 comm="gconfd-2" name="linc-1813-0-39b7766f412a6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="266" seconds="1204160741" serial="1816"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9aa220 a2=382e8c a3=b7f856d8 items=0 ppid=1 pid=6163 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="266" seconds="1204160741" serial="1816"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>398656dd-ca8b-48e7-bb4d-d1345fbfb62c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1813-0-39b7766f412a6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1813-0-39b7766f412a6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1813-0-39b7766f412a6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1813-0-39b7766f412a6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1813-0-39b7766f412a6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="388" seconds="1204160741" serial="1817"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6166 comm="gconfd-2" name="linc-1816-0-3773b9b5ed92" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="388" seconds="1204160741" serial="1817"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8b7130 a2=382e8c a3=b80946d8 items=0 ppid=1 pid=6166 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="388" seconds="1204160741" serial="1817"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>ff93a46e-f1db-4083-a6cd-e0134631033e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1816-0-3773b9b5ed92</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1816-0-3773b9b5ed92'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1816-0-3773b9b5ed92). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1816-0-3773b9b5ed92). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1816-0-3773b9b5ed92</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="452" seconds="1204160741" serial="1818"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6171 comm="gconfd-2" name="linc-181b-0-58e5f2836e620" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="452" seconds="1204160741" serial="1818"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89b110 a2=382e8c a3=b80786d8 items=0 ppid=1 pid=6171 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="452" seconds="1204160741" serial="1818"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>14841a49-93fa-4b86-9ea7-99892e06c38e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-181b-0-58e5f2836e620</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-181b-0-58e5f2836e620'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-181b-0-58e5f2836e620). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-181b-0-58e5f2836e620). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-181b-0-58e5f2836e620</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="564" seconds="1204160741" serial="1819"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6173 comm="gconfd-2" name="linc-181d-0-6089bcbc89e5e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="564" seconds="1204160741" serial="1819"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8b7130 a2=382e8c a3=b80926d8 items=0 ppid=1 pid=6173 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="564" seconds="1204160741" serial="1819"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>61d39ec2-f05b-466a-bbd9-dfcc08bb677e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-181d-0-6089bcbc89e5e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-181d-0-6089bcbc89e5e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-181d-0-6089bcbc89e5e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-181d-0-6089bcbc89e5e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-181d-0-6089bcbc89e5e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="636" seconds="1204160741" serial="1820"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6178 comm="gconfd-2" name="linc-1822-0-50fbf6939b6ff" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="636" seconds="1204160741" serial="1820"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcd9ea0 a2=382e8c a3=b7fb66d8 items=0 ppid=1 pid=6178 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="636" seconds="1204160741" serial="1820"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>76fde86e-6918-4296-929b-e06c75ba8c68</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1822-0-50fbf6939b6ff</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1822-0-50fbf6939b6ff'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1822-0-50fbf6939b6ff). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1822-0-50fbf6939b6ff). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1822-0-50fbf6939b6ff</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="749" seconds="1204160741" serial="1821"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6181 comm="gconfd-2" name="linc-1825-0-70ac8c1b6ef6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="749" seconds="1204160741" serial="1821"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9401c0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=6181 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="749" seconds="1204160741" serial="1821"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>fc77e747-8038-44b1-a8fa-01972a3b8edd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1825-0-70ac8c1b6ef6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1825-0-70ac8c1b6ef6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1825-0-70ac8c1b6ef6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1825-0-70ac8c1b6ef6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1825-0-70ac8c1b6ef6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="818" seconds="1204160741" serial="1822"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6186 comm="gconfd-2" name="linc-182a-0-2a0a1c17c7d3f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="818" seconds="1204160741" serial="1822"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff34670 a2=382e8c a3=b80116d8 items=0 ppid=1 pid=6186 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="818" seconds="1204160741" serial="1822"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>fc8a144f-63d6-42a9-98c2-7ee7d21bade9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-182a-0-2a0a1c17c7d3f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-182a-0-2a0a1c17c7d3f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-182a-0-2a0a1c17c7d3f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-182a-0-2a0a1c17c7d3f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-182a-0-2a0a1c17c7d3f</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="934" seconds="1204160741" serial="1823"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6189 comm="gconfd-2" name="linc-182d-0-78c6d022e42dc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="934" seconds="1204160741" serial="1823"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfba6870 a2=382e8c a3=b80836d8 items=0 ppid=1 pid=6189 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="934" seconds="1204160741" serial="1823"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>0d53787a-d09d-4db5-acf9-e1af57f1c0e8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-182d-0-78c6d022e42dc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-182d-0-78c6d022e42dc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-182d-0-78c6d022e42dc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-182d-0-78c6d022e42dc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-182d-0-78c6d022e42dc</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="994" seconds="1204160741" serial="1824"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6194 comm="gconfd-2" name="linc-1832-0-62a649fff2ba0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="994" seconds="1204160741" serial="1824"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8c5140 a2=382e8c a3=b80a26d8 items=0 ppid=1 pid=6194 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="994" seconds="1204160741" serial="1824"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:41Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:41Z</last_seen_date> > <local_id>0089442e-7f75-49ee-942a-652d0d39409c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1832-0-62a649fff2ba0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1832-0-62a649fff2ba0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1832-0-62a649fff2ba0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1832-0-62a649fff2ba0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1832-0-62a649fff2ba0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="114" seconds="1204160742" serial="1825"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6197 comm="gconfd-2" name="linc-1835-0-1bf9fab91c055" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="114" seconds="1204160742" serial="1825"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbf9470 a2=382e8c a3=b80d46d8 items=0 ppid=1 pid=6197 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="114" seconds="1204160742" serial="1825"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>33a8d20f-ddbf-4c95-aae5-c47f23d8d08a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1835-0-1bf9fab91c055</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1835-0-1bf9fab91c055'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1835-0-1bf9fab91c055). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1835-0-1bf9fab91c055). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1835-0-1bf9fab91c055</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="180" seconds="1204160742" serial="1826"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6202 comm="gconfd-2" name="linc-183a-0-2751eb782c091" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="180" seconds="1204160742" serial="1826"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffe7860 a2=382e8c a3=b7fc26d8 items=0 ppid=1 pid=6202 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="180" seconds="1204160742" serial="1826"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>66451c06-3709-4d14-b303-fda8128abc6f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-183a-0-2751eb782c091</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-183a-0-2751eb782c091'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-183a-0-2751eb782c091). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-183a-0-2751eb782c091). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-183a-0-2751eb782c091</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="298" seconds="1204160742" serial="1827"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6206 comm="gconfd-2" name="linc-183e-0-5d1b32da48f6e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="298" seconds="1204160742" serial="1827"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf932fe0 a2=382e8c a3=b800f6d8 items=0 ppid=1 pid=6206 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="298" seconds="1204160742" serial="1827"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>96b2ce71-2860-4e7e-8e34-45d5945bb73f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-183e-0-5d1b32da48f6e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-183e-0-5d1b32da48f6e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-183e-0-5d1b32da48f6e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-183e-0-5d1b32da48f6e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-183e-0-5d1b32da48f6e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="369" seconds="1204160742" serial="1828"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6211 comm="gconfd-2" name="linc-1843-0-62816b605a45d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="369" seconds="1204160742" serial="1828"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbd5cc0 a2=382e8c a3=b80b36d8 items=0 ppid=1 pid=6211 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="369" seconds="1204160742" serial="1828"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>3a4285fa-492e-405c-a2fc-581a8b7f44b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1843-0-62816b605a45d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1843-0-62816b605a45d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1843-0-62816b605a45d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1843-0-62816b605a45d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1843-0-62816b605a45d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="483" seconds="1204160742" serial="1829"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6215 comm="gconfd-2" name="linc-1847-0-40b80c6d75ef7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="483" seconds="1204160742" serial="1829"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf2370 a2=382e8c a3=b80cd6d8 items=0 ppid=1 pid=6215 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="483" seconds="1204160742" serial="1829"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>021f3857-7c48-4558-8f35-f53a7a32c1f6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1847-0-40b80c6d75ef7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1847-0-40b80c6d75ef7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1847-0-40b80c6d75ef7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1847-0-40b80c6d75ef7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1847-0-40b80c6d75ef7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="554" seconds="1204160742" serial="1830"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6219 comm="gconfd-2" name="linc-184b-0-1e5b03ff874a5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160742" serial="1830"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfedff60 a2=382e8c a3=b7fbb6d8 items=0 ppid=1 pid=6219 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160742" serial="1830"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>bb45c114-069c-433f-8028-42d8f7916c3f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-184b-0-1e5b03ff874a5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-184b-0-1e5b03ff874a5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-184b-0-1e5b03ff874a5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-184b-0-1e5b03ff874a5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-184b-0-1e5b03ff874a5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="653" seconds="1204160742" serial="1831"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6223 comm="gconfd-2" name="linc-184f-0-4f2148dc9f714" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="653" seconds="1204160742" serial="1831"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfede930 a2=382e8c a3=b80bc6d8 items=0 ppid=1 pid=6223 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="653" seconds="1204160742" serial="1831"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>9337659e-7e5b-418e-8bf7-a2ac2aeece4d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-184f-0-4f2148dc9f714</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-184f-0-4f2148dc9f714'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-184f-0-4f2148dc9f714). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-184f-0-4f2148dc9f714). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-184f-0-4f2148dc9f714</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="745" seconds="1204160742" serial="1832"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6228 comm="gconfd-2" name="linc-1854-0-601c3a3db6193" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="745" seconds="1204160742" serial="1832"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfae5b60 a2=382e8c a3=b7fc36d8 items=0 ppid=1 pid=6228 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="745" seconds="1204160742" serial="1832"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>bdda6049-764c-4755-b70c-fe45251c557c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1854-0-601c3a3db6193</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1854-0-601c3a3db6193'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1854-0-601c3a3db6193). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1854-0-601c3a3db6193). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1854-0-601c3a3db6193</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="872" seconds="1204160742" serial="1833"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6232 comm="gconfd-2" name="linc-1858-0-741b09add51c9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="872" seconds="1204160742" serial="1833"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8e8160 a2=382e8c a3=b80c36d8 items=0 ppid=1 pid=6232 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="872" seconds="1204160742" serial="1833"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>3a0b812f-8a92-4dcd-9620-bf78d1d83914</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1858-0-741b09add51c9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1858-0-741b09add51c9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1858-0-741b09add51c9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1858-0-741b09add51c9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1858-0-741b09add51c9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="926" seconds="1204160742" serial="1834"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6236 comm="gconfd-2" name="linc-185c-0-488998cde2448" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="926" seconds="1204160742" serial="1834"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed3750 a2=382e8c a3=b7fae6d8 items=0 ppid=6235 pid=6236 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="926" seconds="1204160742" serial="1834"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:42Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:42Z</last_seen_date> > <local_id>89c6c707-deef-479e-9637-883aee66c3df</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-185c-0-488998cde2448</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-185c-0-488998cde2448'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-185c-0-488998cde2448). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-185c-0-488998cde2448). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-185c-0-488998cde2448</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="55" seconds="1204160743" serial="1835"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6240 comm="gconfd-2" name="linc-1860-0-13aba276d868" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="55" seconds="1204160743" serial="1835"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe06e80 a2=382e8c a3=b7ee26d8 items=0 ppid=1 pid=6240 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="55" seconds="1204160743" serial="1835"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>9fe33d5a-eaf9-4e00-af35-bdc5a53d8493</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1860-0-13aba276d868</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1860-0-13aba276d868'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1860-0-13aba276d868). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1860-0-13aba276d868). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1860-0-13aba276d868</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="97" seconds="1204160743" serial="1836"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6245 comm="gconfd-2" name="linc-1865-0-c41a9917dd1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="97" seconds="1204160743" serial="1836"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa9eb20 a2=382e8c a3=b807c6d8 items=0 ppid=1 pid=6245 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="97" seconds="1204160743" serial="1836"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>5a035eac-6f0e-43f9-8c47-b89dce94a431</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1865-0-c41a9917dd1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1865-0-c41a9917dd1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1865-0-c41a9917dd1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1865-0-c41a9917dd1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1865-0-c41a9917dd1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="221" seconds="1204160743" serial="1837"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6248 comm="gconfd-2" name="linc-1868-0-2e6fc4df35fd0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="221" seconds="1204160743" serial="1837"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf97aee0 a2=382e8c a3=b7f576d8 items=0 ppid=1 pid=6248 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="221" seconds="1204160743" serial="1837"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>a305f02b-3c60-447c-8adc-422b3799d8ee</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1868-0-2e6fc4df35fd0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1868-0-2e6fc4df35fd0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1868-0-2e6fc4df35fd0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1868-0-2e6fc4df35fd0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1868-0-2e6fc4df35fd0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="272" seconds="1204160743" serial="1838"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6253 comm="gconfd-2" name="linc-186d-0-46e7f31942989" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="272" seconds="1204160743" serial="1838"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe5c6d0 a2=382e8c a3=b7f376d8 items=0 ppid=1 pid=6253 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="272" seconds="1204160743" serial="1838"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>6f500bac-887a-43ff-b0bb-4cbb8065baac</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-186d-0-46e7f31942989</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-186d-0-46e7f31942989'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-186d-0-46e7f31942989). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-186d-0-46e7f31942989). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-186d-0-46e7f31942989</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="407" seconds="1204160743" serial="1839"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6255 comm="gconfd-2" name="linc-186f-0-65a12ca8638d2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="407" seconds="1204160743" serial="1839"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea9f20 a2=382e8c a3=b7f856d8 items=0 ppid=1 pid=6255 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="407" seconds="1204160743" serial="1839"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>cc906953-3ed5-4e40-995b-1b0fe0b372e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-186f-0-65a12ca8638d2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-186f-0-65a12ca8638d2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-186f-0-65a12ca8638d2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-186f-0-65a12ca8638d2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-186f-0-65a12ca8638d2</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="453" seconds="1204160743" serial="1840"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6261 comm="gconfd-2" name="linc-1875-0-2c452f646eaec" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="453" seconds="1204160743" serial="1840"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe4e6d0 a2=382e8c a3=b7f2b6d8 items=0 ppid=1 pid=6261 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="453" seconds="1204160743" serial="1840"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>25d4c4d6-ea8d-4e18-8b59-cdeca0782585</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1875-0-2c452f646eaec</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1875-0-2c452f646eaec'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1875-0-2c452f646eaec). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1875-0-2c452f646eaec). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1875-0-2c452f646eaec</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="556" seconds="1204160743" serial="1841"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6264 comm="gconfd-2" name="linc-1878-0-6987295587ba7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="556" seconds="1204160743" serial="1841"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff387b0 a2=382e8c a3=b80136d8 items=0 ppid=1 pid=6264 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="556" seconds="1204160743" serial="1841"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>e7dbde7a-636d-4be1-82fe-b635d1dee65a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1878-0-6987295587ba7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1878-0-6987295587ba7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1878-0-6987295587ba7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1878-0-6987295587ba7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1878-0-6987295587ba7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="612" seconds="1204160743" serial="1842"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6268 comm="gconfd-2" name="linc-187c-0-4a4ccd09959f6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="612" seconds="1204160743" serial="1842"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdb3630 a2=382e8c a3=b808e6d8 items=0 ppid=1 pid=6268 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="612" seconds="1204160743" serial="1842"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>c2c6b8b3-f977-4a49-ae6b-ae4e0172bc17</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-187c-0-4a4ccd09959f6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-187c-0-4a4ccd09959f6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-187c-0-4a4ccd09959f6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-187c-0-4a4ccd09959f6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-187c-0-4a4ccd09959f6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="714" seconds="1204160743" serial="1843"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6272 comm="gconfd-2" name="linc-1880-0-28b77f1cae4d5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="714" seconds="1204160743" serial="1843"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff49fc0 a2=382e8c a3=b7f276d8 items=0 ppid=1 pid=6272 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="714" seconds="1204160743" serial="1843"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>5123fcb7-fba7-4f6b-b646-f9bca24476da</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1880-0-28b77f1cae4d5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1880-0-28b77f1cae4d5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1880-0-28b77f1cae4d5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1880-0-28b77f1cae4d5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1880-0-28b77f1cae4d5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="769" seconds="1204160743" serial="1844"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6277 comm="gconfd-2" name="linc-1885-0-13dbebf2bbba7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="769" seconds="1204160743" serial="1844"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcc1540 a2=382e8c a3=b7f9e6d8 items=0 ppid=1 pid=6277 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="769" seconds="1204160743" serial="1844"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>aef9a157-272f-4eaa-be85-2881e061974f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1885-0-13dbebf2bbba7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1885-0-13dbebf2bbba7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1885-0-13dbebf2bbba7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1885-0-13dbebf2bbba7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1885-0-13dbebf2bbba7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="940" seconds="1204160743" serial="1845"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6280 comm="gconfd-2" name="linc-1888-0-7b315047e59d7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160743" serial="1845"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdf6670 a2=382e8c a3=b80d16d8 items=0 ppid=1 pid=6280 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160743" serial="1845"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>7955ba87-f219-4702-b859-c9fd3369533d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1888-0-7b315047e59d7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1888-0-7b315047e59d7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1888-0-7b315047e59d7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1888-0-7b315047e59d7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1888-0-7b315047e59d7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="993" seconds="1204160743" serial="1846"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6288 comm="gconfd-2" name="linc-1890-0-438ed270f2a52" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="993" seconds="1204160743" serial="1846"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff737f0 a2=382e8c a3=b7f506d8 items=0 ppid=1 pid=6288 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="993" seconds="1204160743" serial="1846"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:43Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:43Z</last_seen_date> > <local_id>d7aa19ce-1faa-4674-9964-4a2d81f28cac</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1890-0-438ed270f2a52</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1890-0-438ed270f2a52'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1890-0-438ed270f2a52). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1890-0-438ed270f2a52). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1890-0-438ed270f2a52</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="121" seconds="1204160744" serial="1847"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6292 comm="gconfd-2" name="linc-1894-0-713de7ef1dbe7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="121" seconds="1204160744" serial="1847"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa78ae0 a2=382e8c a3=b80556d8 items=0 ppid=1 pid=6292 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="121" seconds="1204160744" serial="1847"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>7ec8cafa-bcc0-45fa-8021-a7058d2f1027</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1894-0-713de7ef1dbe7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1894-0-713de7ef1dbe7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1894-0-713de7ef1dbe7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1894-0-713de7ef1dbe7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1894-0-713de7ef1dbe7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="173" seconds="1204160744" serial="1848"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6298 comm="gconfd-2" name="linc-189a-0-72ee26082a753" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="173" seconds="1204160744" serial="1848"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbffc80 a2=382e8c a3=b7fdd6d8 items=0 ppid=1 pid=6298 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="173" seconds="1204160744" serial="1848"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>802007da-50f7-4406-988d-f3ff45769489</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-189a-0-72ee26082a753</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-189a-0-72ee26082a753'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-189a-0-72ee26082a753). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-189a-0-72ee26082a753). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-189a-0-72ee26082a753</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="305" seconds="1204160744" serial="1849"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6303 comm="gconfd-2" name="linc-189f-0-5d53d68a4a8cf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="305" seconds="1204160744" serial="1849"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9be230 a2=382e8c a3=b80996d8 items=0 ppid=1 pid=6303 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="305" seconds="1204160744" serial="1849"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>055b1ee0-a4ad-4bbe-ae72-9203b6ea81dd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-189f-0-5d53d68a4a8cf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-189f-0-5d53d68a4a8cf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-189f-0-5d53d68a4a8cf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-189f-0-5d53d68a4a8cf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-189f-0-5d53d68a4a8cf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="408" seconds="1204160744" serial="1850"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6311 comm="gconfd-2" name="linc-18a7-0-34e96c0963bdb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="408" seconds="1204160744" serial="1850"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb92410 a2=382e8c a3=b806f6d8 items=0 ppid=1 pid=6311 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="408" seconds="1204160744" serial="1850"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>2fb527ba-d659-4246-b947-f64e58292309</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18a7-0-34e96c0963bdb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18a7-0-34e96c0963bdb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18a7-0-34e96c0963bdb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18a7-0-34e96c0963bdb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18a7-0-34e96c0963bdb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="613" seconds="1204160744" serial="1851"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6317 comm="gconfd-2" name="linc-18ad-0-237669ef95df0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="613" seconds="1204160744" serial="1851"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa302b0 a2=382e8c a3=b800b6d8 items=0 ppid=1 pid=6317 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="613" seconds="1204160744" serial="1851"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>6987463b-b4bb-401a-83f1-bbf7b4bc161a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ad-0-237669ef95df0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18ad-0-237669ef95df0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18ad-0-237669ef95df0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18ad-0-237669ef95df0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ad-0-237669ef95df0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="679" seconds="1204160744" serial="1852"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6327 comm="gconfd-2" name="linc-18b7-0-704e5175a5d1e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160744" serial="1852"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd35190 a2=382e8c a3=b7f116d8 items=0 ppid=1 pid=6327 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="679" seconds="1204160744" serial="1852"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>8711d80a-a30e-45e6-8abe-f2d2664e1b7a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18b7-0-704e5175a5d1e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18b7-0-704e5175a5d1e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18b7-0-704e5175a5d1e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18b7-0-704e5175a5d1e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18b7-0-704e5175a5d1e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="816" seconds="1204160744" serial="1853"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6331 comm="gconfd-2" name="linc-18bb-0-6f3344a1c75f6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="816" seconds="1204160744" serial="1853"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff2be00 a2=382e8c a3=b7f086d8 items=0 ppid=1 pid=6331 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="816" seconds="1204160744" serial="1853"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>c72936a2-019d-474f-afec-eca53b2ed2d2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18bb-0-6f3344a1c75f6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18bb-0-6f3344a1c75f6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18bb-0-6f3344a1c75f6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18bb-0-6f3344a1c75f6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18bb-0-6f3344a1c75f6</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="883" seconds="1204160744" serial="1854"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6336 comm="gconfd-2" name="linc-18c0-0-5faf7a74d7a73" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="883" seconds="1204160744" serial="1854"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9c9a40 a2=382e8c a3=b7fa76d8 items=0 ppid=1 pid=6336 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="883" seconds="1204160744" serial="1854"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:44Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:44Z</last_seen_date> > <local_id>de172622-0cf8-4c3f-9f95-242fdda97414</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c0-0-5faf7a74d7a73</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18c0-0-5faf7a74d7a73'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18c0-0-5faf7a74d7a73). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18c0-0-5faf7a74d7a73). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c0-0-5faf7a74d7a73</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="13" seconds="1204160745" serial="1855"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6339 comm="gconfd-2" name="linc-18c3-0-27c7bcab3338" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="13" seconds="1204160745" serial="1855"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa93310 a2=382e8c a3=b7f706d8 items=0 ppid=1 pid=6339 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="13" seconds="1204160745" serial="1855"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>3bd982d5-9048-420c-9d7b-0c614ca6b4c2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c3-0-27c7bcab3338</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18c3-0-27c7bcab3338'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18c3-0-27c7bcab3338). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18c3-0-27c7bcab3338). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c3-0-27c7bcab3338</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="50" seconds="1204160745" serial="1856"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6346 comm="gconfd-2" name="linc-18ca-0-632a09c4c401" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="50" seconds="1204160745" serial="1856"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd82e00 a2=382e8c a3=b805e6d8 items=0 ppid=6345 pid=6346 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="50" seconds="1204160745" serial="1856"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>6eb123fe-9c1d-4387-8738-7cde918a2b78</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ca-0-632a09c4c401</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18ca-0-632a09c4c401'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18ca-0-632a09c4c401). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18ca-0-632a09c4c401). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ca-0-632a09c4c401</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="117" seconds="1204160745" serial="1857"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6344 comm="gconfd-2" name="linc-18c8-0-2e3c40a31c8da" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="117" seconds="1204160745" serial="1857"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd9a7b0 a2=382e8c a3=b7f756d8 items=0 ppid=1 pid=6344 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="117" seconds="1204160745" serial="1857"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>11caf691-3ae6-4841-bd49-1763f71f4d10</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c8-0-2e3c40a31c8da</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18c8-0-2e3c40a31c8da'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18c8-0-2e3c40a31c8da). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18c8-0-2e3c40a31c8da). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18c8-0-2e3c40a31c8da</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="184" seconds="1204160745" serial="1858"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6352 comm="gconfd-2" name="linc-18d0-0-4218f04f2d11d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="184" seconds="1204160745" serial="1858"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb05380 a2=382e8c a3=b7ee26d8 items=0 ppid=1 pid=6352 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="184" seconds="1204160745" serial="1858"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>4c544167-1cef-4a88-ad85-1285e7672d27</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d0-0-4218f04f2d11d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18d0-0-4218f04f2d11d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18d0-0-4218f04f2d11d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18d0-0-4218f04f2d11d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d0-0-4218f04f2d11d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="236" seconds="1204160745" serial="1859"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6350 comm="gconfd-2" name="linc-18ce-0-5c90904439b06" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="236" seconds="1204160745" serial="1859"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffaf830 a2=382e8c a3=b7f8c6d8 items=0 ppid=1 pid=6350 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="236" seconds="1204160745" serial="1859"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>fb3ebc2d-49c9-44f2-97fd-8dc67299fbd8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ce-0-5c90904439b06</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18ce-0-5c90904439b06'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18ce-0-5c90904439b06). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18ce-0-5c90904439b06). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18ce-0-5c90904439b06</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="330" seconds="1204160745" serial="1860"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6358 comm="gconfd-2" name="linc-18d6-0-5f73f79a50a38" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="330" seconds="1204160745" serial="1860"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa87b00 a2=382e8c a3=b80656d8 items=0 ppid=6357 pid=6358 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="330" seconds="1204160745" serial="1860"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>def0680b-4b7d-4ad8-be37-c3d84db42b84</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d6-0-5f73f79a50a38</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18d6-0-5f73f79a50a38'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18d6-0-5f73f79a50a38). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18d6-0-5f73f79a50a38). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d6-0-5f73f79a50a38</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="389" seconds="1204160745" serial="1861"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6356 comm="gconfd-2" name="linc-18d4-0-c3e00375f1ec" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="389" seconds="1204160745" serial="1861"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff6d7f0 a2=382e8c a3=b804a6d8 items=0 ppid=1 pid=6356 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="389" seconds="1204160745" serial="1861"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>4d6c3d08-dc4b-4aa9-b33f-a64c60496ebb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d4-0-c3e00375f1ec</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18d4-0-c3e00375f1ec'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18d4-0-c3e00375f1ec). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18d4-0-c3e00375f1ec). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18d4-0-c3e00375f1ec</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="448" seconds="1204160745" serial="1862"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6364 comm="gconfd-2" name="linc-18dc-0-4c00136e6d92c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="448" seconds="1204160745" serial="1862"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc6e730 a2=382e8c a3=b7f4b6d8 items=0 ppid=1 pid=6364 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="448" seconds="1204160745" serial="1862"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>ed78920e-7638-4fa8-9eea-7a52dfe6eea9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18dc-0-4c00136e6d92c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18dc-0-4c00136e6d92c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18dc-0-4c00136e6d92c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18dc-0-4c00136e6d92c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18dc-0-4c00136e6d92c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="499" seconds="1204160745" serial="1863"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6362 comm="gconfd-2" name="linc-18da-0-2aae0a7279d75" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="499" seconds="1204160745" serial="1863"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf88d900 a2=382e8c a3=b7f696d8 items=0 ppid=1 pid=6362 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="499" seconds="1204160745" serial="1863"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>088fd4c0-dab7-4c83-9db2-659c1570ef00</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18da-0-2aae0a7279d75</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18da-0-2aae0a7279d75'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18da-0-2aae0a7279d75). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18da-0-2aae0a7279d75). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18da-0-2aae0a7279d75</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="570" seconds="1204160745" serial="1864"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6371 comm="gconfd-2" name="linc-18e3-0-47bc44648b524" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="570" seconds="1204160745" serial="1864"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd0dd90 a2=382e8c a3=b7feb6d8 items=0 ppid=1 pid=6371 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="570" seconds="1204160745" serial="1864"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>f4df2480-100a-427c-aa19-5cc87572f052</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e3-0-47bc44648b524</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18e3-0-47bc44648b524'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18e3-0-47bc44648b524). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18e3-0-47bc44648b524). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e3-0-47bc44648b524</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="603" seconds="1204160745" serial="1865"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6368 comm="gconfd-2" name="linc-18e0-0-7db77db09352d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="603" seconds="1204160745" serial="1865"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd2a5a0 a2=382e8c a3=b7f056d8 items=0 ppid=1 pid=6368 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="603" seconds="1204160745" serial="1865"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>3ea88422-963e-4ec0-a172-4bc7deb6d54a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e0-0-7db77db09352d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18e0-0-7db77db09352d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18e0-0-7db77db09352d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18e0-0-7db77db09352d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e0-0-7db77db09352d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="789" seconds="1204160745" serial="1866"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6374 comm="gconfd-2" name="linc-18e6-0-42b9b748c0cae" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160745" serial="1866"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9c0240 a2=382e8c a3=b7f9b6d8 items=0 ppid=1 pid=6374 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160745" serial="1866"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>24285588-e335-4ef5-95d4-eb127ef15f66</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e6-0-42b9b748c0cae</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18e6-0-42b9b748c0cae'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18e6-0-42b9b748c0cae). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18e6-0-42b9b748c0cae). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18e6-0-42b9b748c0cae</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="836" seconds="1204160745" serial="1867"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6384 comm="gconfd-2" name="linc-18f0-0-260000fccc1ea" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="836" seconds="1204160745" serial="1867"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbf9c70 a2=382e8c a3=b7fd76d8 items=0 ppid=6383 pid=6384 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="836" seconds="1204160745" serial="1867"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:45Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:45Z</last_seen_date> > <local_id>27161d05-03b0-404e-a34d-7ca09456b63a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f0-0-260000fccc1ea</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18f0-0-260000fccc1ea'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18f0-0-260000fccc1ea). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18f0-0-260000fccc1ea). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f0-0-260000fccc1ea</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="34" seconds="1204160746" serial="1868"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6387 comm="gconfd-2" name="linc-18f3-0-79b091598839" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="34" seconds="1204160746" serial="1868"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbfcc70 a2=382e8c a3=b7fd86d8 items=0 ppid=1 pid=6387 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="34" seconds="1204160746" serial="1868"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:46Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:46Z</last_seen_date> > <local_id>e61ecb7b-c894-445d-8565-145b8f4a0c12</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f3-0-79b091598839</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18f3-0-79b091598839'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18f3-0-79b091598839). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18f3-0-79b091598839). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f3-0-79b091598839</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="65" seconds="1204160746" serial="1869"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6392 comm="gconfd-2" name="linc-18f8-0-5bcb150610037" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="65" seconds="1204160746" serial="1869"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf893570 a2=382e8c a3=b7f6f6d8 items=0 ppid=1 pid=6392 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="65" seconds="1204160746" serial="1869"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:46Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:46Z</last_seen_date> > <local_id>0845187a-c190-4ef5-8844-2d40688d782c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f8-0-5bcb150610037</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18f8-0-5bcb150610037'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18f8-0-5bcb150610037). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18f8-0-5bcb150610037). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18f8-0-5bcb150610037</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="354" seconds="1204160747" serial="1870"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6395 comm="gconfd-2" name="linc-18fb-0-66810b8a56a10" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="354" seconds="1204160747" serial="1870"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb703f0 a2=382e8c a3=b7f4b6d8 items=0 ppid=1 pid=6395 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="354" seconds="1204160747" serial="1870"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>1cab647f-15a7-4772-875f-1edbdb15d747</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18fb-0-66810b8a56a10</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-18fb-0-66810b8a56a10'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-18fb-0-66810b8a56a10). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-18fb-0-66810b8a56a10). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-18fb-0-66810b8a56a10</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="471" seconds="1204160747" serial="1871"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6448 comm="gconfd-2" name="linc-1930-0-10a35bcd73316" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="471" seconds="1204160747" serial="1871"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa87300 a2=382e8c a3=b80626d8 items=0 ppid=6447 pid=6448 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="471" seconds="1204160747" serial="1871"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>28a3b7e6-6e27-4948-9f0f-698ff28dd223</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1930-0-10a35bcd73316</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1930-0-10a35bcd73316'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1930-0-10a35bcd73316). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1930-0-10a35bcd73316). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1930-0-10a35bcd73316</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="500" seconds="1204160747" serial="1872"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6450 comm="gconfd-2" name="linc-1932-0-1c303b2f7a48d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="500" seconds="1204160747" serial="1872"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed1e10 a2=382e8c a3=b7fae6d8 items=0 ppid=1 pid=6450 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="500" seconds="1204160747" serial="1872"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>7ddd91b7-01df-4087-860c-cb994b1fc3bb</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1932-0-1c303b2f7a48d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1932-0-1c303b2f7a48d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1932-0-1c303b2f7a48d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1932-0-1c303b2f7a48d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1932-0-1c303b2f7a48d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="536" seconds="1204160747" serial="1873"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6452 comm="gconfd-2" name="linc-1934-0-786fe6ae82ee3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="536" seconds="1204160747" serial="1873"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd6bde0 a2=382e8c a3=b80476d8 items=0 ppid=1 pid=6452 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="536" seconds="1204160747" serial="1873"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>3dafb462-2494-4dff-9e33-7000c37eb76f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1934-0-786fe6ae82ee3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1934-0-786fe6ae82ee3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1934-0-786fe6ae82ee3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1934-0-786fe6ae82ee3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1934-0-786fe6ae82ee3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="746" seconds="1204160747" serial="1874"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6457 comm="gconfd-2" name="linc-1939-0-31958900b63eb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="746" seconds="1204160747" serial="1874"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf90d980 a2=382e8c a3=b7ee96d8 items=0 ppid=1 pid=6457 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="746" seconds="1204160747" serial="1874"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>1098e388-3603-45e2-bf5a-fe2495ebbd76</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1939-0-31958900b63eb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1939-0-31958900b63eb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1939-0-31958900b63eb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1939-0-31958900b63eb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1939-0-31958900b63eb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="748" seconds="1204160747" serial="1875"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6455 comm="gconfd-2" name="linc-1937-0-6d0ae28ab6bb8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="748" seconds="1204160747" serial="1875"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89c920 a2=382e8c a3=b7f7a6d8 items=0 ppid=1 pid=6455 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="748" seconds="1204160747" serial="1875"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>065e85c2-23c2-4831-99b1-2910f6f3c351</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1937-0-6d0ae28ab6bb8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1937-0-6d0ae28ab6bb8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1937-0-6d0ae28ab6bb8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1937-0-6d0ae28ab6bb8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1937-0-6d0ae28ab6bb8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="783" seconds="1204160747" serial="1876"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6459 comm="gconfd-2" name="linc-193b-0-535da533bf437" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="783" seconds="1204160747" serial="1876"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffe3600 a2=382e8c a3=b7fbf6d8 items=0 ppid=1 pid=6459 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="783" seconds="1204160747" serial="1876"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>9c247a76-7942-4e9d-882d-d00b38043e77</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-193b-0-535da533bf437</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-193b-0-535da533bf437'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-193b-0-535da533bf437). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-193b-0-535da533bf437). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-193b-0-535da533bf437</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="828" seconds="1204160747" serial="1877"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6465 comm="gconfd-2" name="linc-1941-0-5b940b00ca50b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="828" seconds="1204160747" serial="1877"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf99fa20 a2=382e8c a3=b807d6d8 items=0 ppid=1 pid=6465 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="828" seconds="1204160747" serial="1877"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>5345fbc7-6769-4bb8-955b-18405d4a73a0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1941-0-5b940b00ca50b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1941-0-5b940b00ca50b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1941-0-5b940b00ca50b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1941-0-5b940b00ca50b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1941-0-5b940b00ca50b</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="860" seconds="1204160747" serial="1878"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6463 comm="gconfd-2" name="linc-193f-0-656ea44ed2121" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="860" seconds="1204160747" serial="1878"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffa1170 a2=382e8c a3=b807d6d8 items=0 ppid=1 pid=6463 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="860" seconds="1204160747" serial="1878"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>99415b84-a611-4dd3-b3e8-91f4751cb5c0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-193f-0-656ea44ed2121</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-193f-0-656ea44ed2121'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-193f-0-656ea44ed2121). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-193f-0-656ea44ed2121). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-193f-0-656ea44ed2121</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="897" seconds="1204160747" serial="1879"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6468 comm="gconfd-2" name="linc-1944-0-50335d1bdb316" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="897" seconds="1204160747" serial="1879"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8c5940 a2=382e8c a3=b7fa36d8 items=0 ppid=1 pid=6468 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="897" seconds="1204160747" serial="1879"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:47Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:47Z</last_seen_date> > <local_id>a02a4818-9eb0-4a09-a4a3-514fe52f933b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1944-0-50335d1bdb316</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1944-0-50335d1bdb316'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1944-0-50335d1bdb316). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1944-0-50335d1bdb316). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1944-0-50335d1bdb316</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="51" seconds="1204160748" serial="1880"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6473 comm="gconfd-2" name="linc-1949-0-3a236d82c9a0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="51" seconds="1204160748" serial="1880"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe2deb0 a2=382e8c a3=b7f0b6d8 items=0 ppid=1 pid=6473 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="51" seconds="1204160748" serial="1880"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>ad182ded-d0ac-4cd2-98a8-765bf33cc0f1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1949-0-3a236d82c9a0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1949-0-3a236d82c9a0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1949-0-3a236d82c9a0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1949-0-3a236d82c9a0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1949-0-3a236d82c9a0</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="59" seconds="1204160748" serial="1881"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6471 comm="gconfd-2" name="linc-1947-0-73cb0d24e94a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="59" seconds="1204160748" serial="1881"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff2bfa0 a2=382e8c a3=b7f076d8 items=0 ppid=1 pid=6471 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="59" seconds="1204160748" serial="1881"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>95ec381b-bf7d-41ed-828b-81a96bede20a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1947-0-73cb0d24e94a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1947-0-73cb0d24e94a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1947-0-73cb0d24e94a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1947-0-73cb0d24e94a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1947-0-73cb0d24e94a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="136" seconds="1204160748" serial="1882"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6482 comm="gconfd-2" name="linc-1952-0-ce5e4c021550" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="136" seconds="1204160748" serial="1882"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9611e0 a2=382e8c a3=b7f3c6d8 items=0 ppid=1 pid=6482 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="136" seconds="1204160748" serial="1882"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>361273c7-6ff9-4c18-8793-b7dd1f027b28</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1952-0-ce5e4c021550</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1952-0-ce5e4c021550'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1952-0-ce5e4c021550). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1952-0-ce5e4c021550). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1952-0-ce5e4c021550</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="145" seconds="1204160748" serial="1884"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6475 comm="gconfd-2" name="linc-194b-0-3437c5b023743" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="145" seconds="1204160748" serial="1884"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff05780 a2=382e8c a3=b7ee06d8 items=0 ppid=1 pid=6475 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="145" seconds="1204160748" serial="1884"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>7065a703-7766-4360-a10c-3704f6b83535</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-194b-0-3437c5b023743</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-194b-0-3437c5b023743'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-194b-0-3437c5b023743). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-194b-0-3437c5b023743). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-194b-0-3437c5b023743</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="164" seconds="1204160748" serial="1883"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6480 comm="gconfd-2" name="linc-1950-0-3076ebf280e3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="164" seconds="1204160748" serial="1883"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa01a00 a2=382e8c a3=b7fde6d8 items=0 ppid=1 pid=6480 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="164" seconds="1204160748" serial="1883"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>e87f5bf3-763a-4bf0-9a2c-f37b853e79f2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1950-0-3076ebf280e3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1950-0-3076ebf280e3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1950-0-3076ebf280e3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1950-0-3076ebf280e3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1950-0-3076ebf280e3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="248" seconds="1204160748" serial="1885"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6484 comm="gconfd-2" name="linc-1954-0-152ac6983c9ca" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="248" seconds="1204160748" serial="1885"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfff4870 a2=382e8c a3=b7fd16d8 items=0 ppid=1 pid=6484 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="248" seconds="1204160748" serial="1885"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>040863f2-6604-4c70-a83b-2221b7a5b26e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1954-0-152ac6983c9ca</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1954-0-152ac6983c9ca'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1954-0-152ac6983c9ca). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1954-0-152ac6983c9ca). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1954-0-152ac6983c9ca</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="360" seconds="1204160748" serial="1886"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6487 comm="gconfd-2" name="linc-1957-0-2bb3119858090" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="360" seconds="1204160748" serial="1886"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf910190 a2=382e8c a3=b7fed6d8 items=0 ppid=1 pid=6487 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="360" seconds="1204160748" serial="1886"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>4c7bdced-d269-4a6c-8e37-2229e31c2752</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1957-0-2bb3119858090</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1957-0-2bb3119858090'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1957-0-2bb3119858090). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1957-0-2bb3119858090). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1957-0-2bb3119858090</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="363" seconds="1204160748" serial="1887"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6488 comm="gconfd-2" name="linc-1958-0-57e98a6f58adb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="363" seconds="1204160748" serial="1887"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfceab80 a2=382e8c a3=b7fc76d8 items=0 ppid=1 pid=6488 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="363" seconds="1204160748" serial="1887"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>4c6b30a7-d83a-4fe2-b2d0-69df04898de7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1958-0-57e98a6f58adb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1958-0-57e98a6f58adb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1958-0-57e98a6f58adb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1958-0-57e98a6f58adb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1958-0-57e98a6f58adb</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="460" seconds="1204160748" serial="1888"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6498 comm="gconfd-2" name="linc-1962-0-2b8c14b470851" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="460" seconds="1204160748" serial="1888"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf85d8d0 a2=382e8c a3=b7f396d8 items=0 ppid=1 pid=6498 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="460" seconds="1204160748" serial="1888"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>1fa4ba01-6d21-4572-bc68-d13192e9c6b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1962-0-2b8c14b470851</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1962-0-2b8c14b470851'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1962-0-2b8c14b470851). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1962-0-2b8c14b470851). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1962-0-2b8c14b470851</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="463" seconds="1204160748" serial="1889"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6495 comm="gconfd-2" name="linc-195f-0-642b3a0c7139a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="463" seconds="1204160748" serial="1889"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc07c80 a2=382e8c a3=b7ee36d8 items=0 ppid=1 pid=6495 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="463" seconds="1204160748" serial="1889"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>95d4a4f2-c9ad-4245-bbf3-8b5539c91b7d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-195f-0-642b3a0c7139a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-195f-0-642b3a0c7139a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-195f-0-642b3a0c7139a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-195f-0-642b3a0c7139a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-195f-0-642b3a0c7139a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="490" seconds="1204160748" serial="1890"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6492 comm="gconfd-2" name="linc-195c-0-453d48f577d13" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="490" seconds="1204160748" serial="1890"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9bda40 a2=382e8c a3=b809b6d8 items=0 ppid=1 pid=6492 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="490" seconds="1204160748" serial="1890"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>775f7fba-12d5-4608-9e11-c96eeae82fec</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-195c-0-453d48f577d13</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-195c-0-453d48f577d13'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-195c-0-453d48f577d13). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-195c-0-453d48f577d13). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-195c-0-453d48f577d13</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="569" seconds="1204160748" serial="1891"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6504 comm="gconfd-2" name="linc-1968-0-33db61d88b0e8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="569" seconds="1204160748" serial="1891"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbd2450 a2=382e8c a3=b7faf6d8 items=0 ppid=1 pid=6504 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="569" seconds="1204160748" serial="1891"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>6faeb6bc-b07f-4bd0-b3c7-0e24f7997a03</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1968-0-33db61d88b0e8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1968-0-33db61d88b0e8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1968-0-33db61d88b0e8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1968-0-33db61d88b0e8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1968-0-33db61d88b0e8</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="675" seconds="1204160748" serial="1892"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6501 comm="gconfd-2" name="linc-1965-0-efd4496a4c75" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="675" seconds="1204160748" serial="1892"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ec160 a2=382e8c a3=b7fc96d8 items=0 ppid=1 pid=6501 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="675" seconds="1204160748" serial="1892"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>b5c4c10d-cda7-43c7-b1b5-eabb6803bcca</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1965-0-efd4496a4c75</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1965-0-efd4496a4c75'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1965-0-efd4496a4c75). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1965-0-efd4496a4c75). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1965-0-efd4496a4c75</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="681" seconds="1204160748" serial="1893"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6502 comm="gconfd-2" name="linc-1966-0-525c3f53a65af" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="681" seconds="1204160748" serial="1893"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd315b0 a2=382e8c a3=b800c6d8 items=0 ppid=1 pid=6502 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="681" seconds="1204160748" serial="1893"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>f3883e32-00d4-4124-954b-f9ca1ca94404</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1966-0-525c3f53a65af</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1966-0-525c3f53a65af'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1966-0-525c3f53a65af). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1966-0-525c3f53a65af). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1966-0-525c3f53a65af</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="763" seconds="1204160748" serial="1894"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6511 comm="gconfd-2" name="linc-196f-0-18f2fcd8ba4f7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="763" seconds="1204160748" serial="1894"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfef8f70 a2=382e8c a3=b7fd66d8 items=0 ppid=1 pid=6511 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="763" seconds="1204160748" serial="1894"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>fa9a2e6f-423f-4778-8a26-fa70157c1200</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-196f-0-18f2fcd8ba4f7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-196f-0-18f2fcd8ba4f7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-196f-0-18f2fcd8ba4f7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-196f-0-18f2fcd8ba4f7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-196f-0-18f2fcd8ba4f7</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="764" seconds="1204160748" serial="1895"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6513 comm="gconfd-2" name="linc-1971-0-5d232d87baa9a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="764" seconds="1204160748" serial="1895"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf911990 a2=382e8c a3=b7eed6d8 items=0 ppid=1 pid=6513 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="764" seconds="1204160748" serial="1895"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>6cb9629a-8a20-4df2-9cf1-30848987b9dc</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1971-0-5d232d87baa9a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1971-0-5d232d87baa9a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1971-0-5d232d87baa9a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1971-0-5d232d87baa9a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1971-0-5d232d87baa9a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="799" seconds="1204160748" serial="1896"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6508 comm="gconfd-2" name="linc-196c-0-34da244c317e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160748" serial="1896"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff38fb0 a2=382e8c a3=b80166d8 items=0 ppid=1 pid=6508 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160748" serial="1896"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>8bc6ddd9-07e3-4709-946a-92352cc18fea</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-196c-0-34da244c317e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-196c-0-34da244c317e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-196c-0-34da244c317e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-196c-0-34da244c317e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-196c-0-34da244c317e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="879" seconds="1204160748" serial="1897"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6521 comm="gconfd-2" name="linc-1979-0-62264e92d6b96" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160748" serial="1897"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe6c6e0 a2=382e8c a3=b80476d8 items=0 ppid=1 pid=6521 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160748" serial="1897"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>e2a97819-355b-4262-b0fe-79ac3b98139e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1979-0-62264e92d6b96</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1979-0-62264e92d6b96'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1979-0-62264e92d6b96). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1979-0-62264e92d6b96). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1979-0-62264e92d6b96</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="972" seconds="1204160748" serial="1898"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6516 comm="gconfd-2" name="linc-1974-0-1887c8e5ed787" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="972" seconds="1204160748" serial="1898"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8d0150 a2=382e8c a3=b80ab6d8 items=0 ppid=1 pid=6516 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="972" seconds="1204160748" serial="1898"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>ceac617d-6a05-436a-848d-7136e9127662</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1974-0-1887c8e5ed787</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1974-0-1887c8e5ed787'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1974-0-1887c8e5ed787). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1974-0-1887c8e5ed787). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1974-0-1887c8e5ed787</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="989" seconds="1204160748" serial="1899"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6519 comm="gconfd-2" name="linc-1977-0-73557343f1a19" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="989" seconds="1204160748" serial="1899"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff42fc0 a2=382e8c a3=b80206d8 items=0 ppid=1 pid=6519 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="989" seconds="1204160748" serial="1899"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:48Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:48Z</last_seen_date> > <local_id>70cb215f-9279-46da-a73d-39df0a5cc299</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1977-0-73557343f1a19</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1977-0-73557343f1a19'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1977-0-73557343f1a19). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1977-0-73557343f1a19). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1977-0-73557343f1a19</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="80" seconds="1204160749" serial="1900"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6527 comm="gconfd-2" name="linc-197f-0-55e81cfa13a07" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="80" seconds="1204160749" serial="1900"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaa9b20 a2=382e8c a3=b80856d8 items=0 ppid=1 pid=6527 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="80" seconds="1204160749" serial="1900"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>a21ee24a-d973-4561-8101-9f802523d5e9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-197f-0-55e81cfa13a07</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-197f-0-55e81cfa13a07'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-197f-0-55e81cfa13a07). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-197f-0-55e81cfa13a07). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-197f-0-55e81cfa13a07</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="82" seconds="1204160749" serial="1901"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6530 comm="gconfd-2" name="linc-1982-0-6821738b141ad" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="82" seconds="1204160749" serial="1901"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf919190 a2=382e8c a3=b7ef46d8 items=0 ppid=6529 pid=6530 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="82" seconds="1204160749" serial="1901"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>05ecd25c-8758-49ed-9495-a2cd3ef37c2d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1982-0-6821738b141ad</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1982-0-6821738b141ad'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1982-0-6821738b141ad). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1982-0-6821738b141ad). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1982-0-6821738b141ad</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="146" seconds="1204160749" serial="1902"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6524 comm="gconfd-2" name="linc-197c-0-6dabdd3723d0c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="146" seconds="1204160749" serial="1902"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8420c0 a2=382e8c a3=b7f1f6d8 items=0 ppid=1 pid=6524 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="146" seconds="1204160749" serial="1902"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>5ccf1d15-05f4-4bc9-a1fe-9d9be72b630b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-197c-0-6dabdd3723d0c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-197c-0-6dabdd3723d0c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-197c-0-6dabdd3723d0c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-197c-0-6dabdd3723d0c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-197c-0-6dabdd3723d0c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="234" seconds="1204160749" serial="1903"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6538 comm="gconfd-2" name="linc-198a-0-186e13df392b3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="234" seconds="1204160749" serial="1903"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe5eee0 a2=382e8c a3=b803c6d8 items=0 ppid=1 pid=6538 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="234" seconds="1204160749" serial="1903"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>911c7628-0353-431a-8226-0a4d9f594b4b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-198a-0-186e13df392b3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-198a-0-186e13df392b3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-198a-0-186e13df392b3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-198a-0-186e13df392b3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-198a-0-186e13df392b3</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="283" seconds="1204160749" serial="1904"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6534 comm="gconfd-2" name="linc-1986-0-554789fd45379" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="283" seconds="1204160749" serial="1904"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa85b00 a2=382e8c a3=b7f636d8 items=0 ppid=1 pid=6534 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="283" seconds="1204160749" serial="1904"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>c15642f9-32af-4e75-9f40-114029c8ef3e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1986-0-554789fd45379</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1986-0-554789fd45379'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1986-0-554789fd45379). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1986-0-554789fd45379). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1986-0-554789fd45379</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="301" seconds="1204160749" serial="1905"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6535 comm="gconfd-2" name="linc-1987-0-6558ee1149811" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="301" seconds="1204160749" serial="1905"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc81500 a2=382e8c a3=b805c6d8 items=0 ppid=1 pid=6535 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="301" seconds="1204160749" serial="1905"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>48b275ee-18b8-4e16-954b-09b7d09fbe0f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1987-0-6558ee1149811</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1987-0-6558ee1149811'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1987-0-6558ee1149811). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1987-0-6558ee1149811). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1987-0-6558ee1149811</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="384" seconds="1204160749" serial="1906"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6544 comm="gconfd-2" name="linc-1990-0-681b21115ddc1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="384" seconds="1204160749" serial="1906"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb20f20 a2=382e8c a3=b7ffd6d8 items=0 ppid=6543 pid=6544 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="384" seconds="1204160749" serial="1906"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>bbb18d74-a826-4883-8bdf-75b12e249d9f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1990-0-681b21115ddc1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1990-0-681b21115ddc1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1990-0-681b21115ddc1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1990-0-681b21115ddc1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1990-0-681b21115ddc1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="400" seconds="1204160749" serial="1907"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6546 comm="gconfd-2" name="linc-1992-0-59d58cf361af1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="400" seconds="1204160749" serial="1907"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe556d0 a2=382e8c a3=b80326d8 items=0 ppid=6545 pid=6546 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="400" seconds="1204160749" serial="1907"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>491ffff9-396d-4a1b-af62-577d2fe38a52</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1992-0-59d58cf361af1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1992-0-59d58cf361af1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1992-0-59d58cf361af1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1992-0-59d58cf361af1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1992-0-59d58cf361af1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="461" seconds="1204160749" serial="1908"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6541 comm="gconfd-2" name="linc-198d-0-44dd959870b86" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="461" seconds="1204160749" serial="1908"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfea9f20 a2=382e8c a3=b80856d8 items=0 ppid=1 pid=6541 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="461" seconds="1204160749" serial="1908"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>5a39cb4c-77f0-46f6-889c-bb85075cf665</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-198d-0-44dd959870b86</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-198d-0-44dd959870b86'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-198d-0-44dd959870b86). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-198d-0-44dd959870b86). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-198d-0-44dd959870b86</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="537" seconds="1204160749" serial="1909"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6554 comm="gconfd-2" name="linc-199a-0-6c1988858323c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="537" seconds="1204160749" serial="1909"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf92b5f0 a2=382e8c a3=b80066d8 items=0 ppid=1 pid=6554 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="537" seconds="1204160749" serial="1909"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>774d95f6-ac97-4876-a50c-672661ac99ea</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-199a-0-6c1988858323c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-199a-0-6c1988858323c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-199a-0-6c1988858323c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-199a-0-6c1988858323c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-199a-0-6c1988858323c</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="595" seconds="1204160749" serial="1910"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6549 comm="gconfd-2" name="linc-1995-0-6d3dd2999171e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="595" seconds="1204160749" serial="1910"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe4bec0 a2=382e8c a3=b7f296d8 items=0 ppid=1 pid=6549 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="595" seconds="1204160749" serial="1910"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>9704b066-7fe2-44e1-99bd-8e71b92e97e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1995-0-6d3dd2999171e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1995-0-6d3dd2999171e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1995-0-6d3dd2999171e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1995-0-6d3dd2999171e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1995-0-6d3dd2999171e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="607" seconds="1204160749" serial="1911"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6551 comm="gconfd-2" name="linc-1997-0-4d04cb1b9469e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="607" seconds="1204160749" serial="1911"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe4bec0 a2=382e8c a3=b7f296d8 items=0 ppid=1 pid=6551 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="607" seconds="1204160749" serial="1911"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>8427a1e4-259f-4f24-9711-d811f2010035</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1997-0-4d04cb1b9469e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1997-0-4d04cb1b9469e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1997-0-4d04cb1b9469e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1997-0-4d04cb1b9469e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1997-0-4d04cb1b9469e</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="695" seconds="1204160749" serial="1912"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6560 comm="gconfd-2" name="linc-19a0-0-560c7a38a9b5a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="695" seconds="1204160749" serial="1912"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa95b10 a2=382e8c a3=b80736d8 items=0 ppid=6559 pid=6560 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="695" seconds="1204160749" serial="1912"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>2ffba1c3-faf2-4085-b1cf-94eadcf1e57a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a0-0-560c7a38a9b5a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19a0-0-560c7a38a9b5a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19a0-0-560c7a38a9b5a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19a0-0-560c7a38a9b5a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a0-0-560c7a38a9b5a</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="708" seconds="1204160749" serial="1913"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6563 comm="gconfd-2" name="linc-19a3-0-421bb738acdcf" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="708" seconds="1204160749" serial="1913"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe63ee0 a2=382e8c a3=b80416d8 items=0 ppid=6562 pid=6563 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="708" seconds="1204160749" serial="1913"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>6159a7f4-7be9-43fd-9d2a-8a59792bb898</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a3-0-421bb738acdcf</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19a3-0-421bb738acdcf'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19a3-0-421bb738acdcf). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19a3-0-421bb738acdcf). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a3-0-421bb738acdcf</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="781" seconds="1204160749" serial="1914"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6557 comm="gconfd-2" name="linc-199d-0-741822fbee02" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="781" seconds="1204160749" serial="1914"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc98510 a2=382e8c a3=b7f756d8 items=0 ppid=1 pid=6557 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="781" seconds="1204160749" serial="1914"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>d1c09095-b556-41f2-baf8-8c8ac8532075</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-199d-0-741822fbee02</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-199d-0-741822fbee02'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-199d-0-741822fbee02). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-199d-0-741822fbee02). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-199d-0-741822fbee02</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="891" seconds="1204160749" serial="1915"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6571 comm="gconfd-2" name="linc-19ab-0-9f53674d80d9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="891" seconds="1204160749" serial="1915"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed3750 a2=382e8c a3=b80b06d8 items=0 ppid=6570 pid=6571 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="891" seconds="1204160749" serial="1915"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>56a71467-5f02-40c8-912c-fadec7831567</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ab-0-9f53674d80d9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19ab-0-9f53674d80d9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19ab-0-9f53674d80d9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19ab-0-9f53674d80d9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ab-0-9f53674d80d9</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="940" seconds="1204160749" serial="1916"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6566 comm="gconfd-2" name="linc-19a6-0-457fcd90e59b5" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160749" serial="1916"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd235a0 a2=382e8c a3=b7ffe6d8 items=0 ppid=1 pid=6566 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160749" serial="1916"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>a25534f3-76bf-4c10-9c7f-14ee3a35ad40</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a6-0-457fcd90e59b5</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19a6-0-457fcd90e59b5'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19a6-0-457fcd90e59b5). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19a6-0-457fcd90e59b5). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a6-0-457fcd90e59b5</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="957" seconds="1204160749" serial="1917"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6567 comm="gconfd-2" name="linc-19a7-0-7e77259ee9cf1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="957" seconds="1204160749" serial="1917"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfca1520 a2=382e8c a3=b7f7e6d8 items=0 ppid=1 pid=6567 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="957" seconds="1204160749" serial="1917"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:49Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:49Z</last_seen_date> > <local_id>c2f9b736-8824-4372-8408-ffbad1780f63</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a7-0-7e77259ee9cf1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19a7-0-7e77259ee9cf1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19a7-0-7e77259ee9cf1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19a7-0-7e77259ee9cf1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19a7-0-7e77259ee9cf1</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="41" seconds="1204160750" serial="1918"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6577 comm="gconfd-2" name="linc-19b1-0-4a3d8ceaa2d3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="41" seconds="1204160750" serial="1918"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe8af00 a2=382e8c a3=b80666d8 items=0 ppid=1 pid=6577 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="41" seconds="1204160750" serial="1918"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>dad997c9-de6a-412c-99a8-639892fbb565</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b1-0-4a3d8ceaa2d3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19b1-0-4a3d8ceaa2d3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19b1-0-4a3d8ceaa2d3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19b1-0-4a3d8ceaa2d3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b1-0-4a3d8ceaa2d3</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="61" seconds="1204160750" serial="1919"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6579 comm="gconfd-2" name="linc-19b3-0-3d6dc4d7f152" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="61" seconds="1204160750" serial="1919"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfefe780 a2=382e8c a3=b7fdb6d8 items=0 ppid=1 pid=6579 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="61" seconds="1204160750" serial="1919"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>27a7efa5-3e1d-4a91-b0fa-5d88ccaad72f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b3-0-3d6dc4d7f152</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19b3-0-3d6dc4d7f152'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19b3-0-3d6dc4d7f152). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19b3-0-3d6dc4d7f152). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b3-0-3d6dc4d7f152</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="142" seconds="1204160750" serial="1920"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6574 comm="gconfd-2" name="linc-19ae-0-895f5522db4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="142" seconds="1204160750" serial="1920"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff44fc0 a2=382e8c a3=b80226d8 items=0 ppid=1 pid=6574 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="142" seconds="1204160750" serial="1920"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>4e1ed114-a626-4fd8-a6e4-705d5e6bd82e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ae-0-895f5522db4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19ae-0-895f5522db4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19ae-0-895f5522db4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19ae-0-895f5522db4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ae-0-895f5522db4</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="218" seconds="1204160750" serial="1921"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6587 comm="gconfd-2" name="linc-19bb-0-3f329f7a3562a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="218" seconds="1204160750" serial="1921"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff86800 a2=382e8c a3=b80636d8 items=0 ppid=1 pid=6587 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="218" seconds="1204160750" serial="1921"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>cb61f843-c9f4-4cd1-a240-c2d68c6fdba5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19bb-0-3f329f7a3562a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19bb-0-3f329f7a3562a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19bb-0-3f329f7a3562a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19bb-0-3f329f7a3562a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19bb-0-3f329f7a3562a</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="232" seconds="1204160750" serial="1922"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6583 comm="gconfd-2" name="linc-19b7-0-7228d27038a26" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="232" seconds="1204160750" serial="1922"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb773f0 a2=382e8c a3=b80526d8 items=0 ppid=1 pid=6583 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="232" seconds="1204160750" serial="1922"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>9e80fdfd-d9d4-4a06-8fc6-91e6ff59af43</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b7-0-7228d27038a26</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19b7-0-7228d27038a26'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19b7-0-7228d27038a26). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19b7-0-7228d27038a26). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b7-0-7228d27038a26</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="263" seconds="1204160750" serial="1923"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6584 comm="gconfd-2" name="linc-19b8-0-7cf03f7440464" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="263" seconds="1204160750" serial="1923"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe1fea0 a2=382e8c a3=b7ffd6d8 items=0 ppid=1 pid=6584 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="263" seconds="1204160750" serial="1923"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>dcc1885f-8174-41f6-9b63-c085c1d3d0a1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b8-0-7cf03f7440464</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19b8-0-7cf03f7440464'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19b8-0-7cf03f7440464). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19b8-0-7cf03f7440464). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19b8-0-7cf03f7440464</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="317" seconds="1204160750" serial="1924"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6593 comm="gconfd-2" name="linc-19c1-0-beee7ef4d7eb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="317" seconds="1204160750" serial="1924"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8eb160 a2=382e8c a3=b7fc86d8 items=0 ppid=1 pid=6593 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="317" seconds="1204160750" serial="1924"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>b57974fe-10a0-4cf1-8d68-de247938796a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c1-0-beee7ef4d7eb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19c1-0-beee7ef4d7eb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19c1-0-beee7ef4d7eb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19c1-0-beee7ef4d7eb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c1-0-beee7ef4d7eb</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="375" seconds="1204160750" serial="1925"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6595 comm="gconfd-2" name="linc-19c3-0-13ffb70d5bbf9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="375" seconds="1204160750" serial="1925"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe5e6d0 a2=382e8c a3=b80396d8 items=0 ppid=1 pid=6595 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="375" seconds="1204160750" serial="1925"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>5905f9b3-4f6b-42dc-b087-bccb89b3a738</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c3-0-13ffb70d5bbf9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19c3-0-13ffb70d5bbf9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19c3-0-13ffb70d5bbf9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19c3-0-13ffb70d5bbf9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c3-0-13ffb70d5bbf9</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="471" seconds="1204160750" serial="1926"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6591 comm="gconfd-2" name="linc-19bf-0-2abb390473308" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="471" seconds="1204160750" serial="1926"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfce9d60 a2=382e8c a3=b80c76d8 items=0 ppid=1 pid=6591 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="471" seconds="1204160750" serial="1926"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>abfe2772-7ac5-4df4-813a-b6cfc7ffceb3</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19bf-0-2abb390473308</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19bf-0-2abb390473308'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19bf-0-2abb390473308). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19bf-0-2abb390473308). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19bf-0-2abb390473308</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="554" seconds="1204160750" serial="1927"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6604 comm="gconfd-2" name="linc-19cc-0-193245918758d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160750" serial="1927"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffef070 a2=382e8c a3=b80cc6d8 items=0 ppid=6603 pid=6604 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="554" seconds="1204160750" serial="1927"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>bdd132df-8a46-4839-b0dd-fd692c769928</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19cc-0-193245918758d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19cc-0-193245918758d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19cc-0-193245918758d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19cc-0-193245918758d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19cc-0-193245918758d</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="592" seconds="1204160750" serial="1928"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6598 comm="gconfd-2" name="linc-19c6-0-3170b29490add" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="592" seconds="1204160750" serial="1928"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb87c00 a2=382e8c a3=b80646d8 items=0 ppid=1 pid=6598 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="592" seconds="1204160750" serial="1928"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>a5dcc8a5-1c35-46c5-ade3-c62a2aabf452</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c6-0-3170b29490add</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19c6-0-3170b29490add'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19c6-0-3170b29490add). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19c6-0-3170b29490add). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c6-0-3170b29490add</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="595" seconds="1204160750" serial="1929"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6601 comm="gconfd-2" name="linc-19c9-0-dbdfe6291497" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="595" seconds="1204160750" serial="1929"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfede760 a2=382e8c a3=b7fbb6d8 items=0 ppid=1 pid=6601 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="595" seconds="1204160750" serial="1929"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>39fcc033-d0c3-4e28-af6c-e0a8fa870612</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c9-0-dbdfe6291497</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19c9-0-dbdfe6291497'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19c9-0-dbdfe6291497). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19c9-0-dbdfe6291497). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19c9-0-dbdfe6291497</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="659" seconds="1204160750" serial="1930"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6611 comm="gconfd-2" name="linc-19d3-0-40a36a32a1151" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="659" seconds="1204160750" serial="1930"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb9c410 a2=382e8c a3=b80776d8 items=0 ppid=1 pid=6611 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="659" seconds="1204160750" serial="1930"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>634149df-061a-494b-ba94-280ca0652a97</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d3-0-40a36a32a1151</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19d3-0-40a36a32a1151'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19d3-0-40a36a32a1151). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19d3-0-40a36a32a1151). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d3-0-40a36a32a1151</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="681" seconds="1204160750" serial="1931"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6609 comm="gconfd-2" name="linc-19d1-0-44105666a671e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="681" seconds="1204160750" serial="1931"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc66ce0 a2=382e8c a3=b80426d8 items=0 ppid=1 pid=6609 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="681" seconds="1204160750" serial="1931"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>995ad55c-1fe8-4111-8cdb-430bffdcab13</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d1-0-44105666a671e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19d1-0-44105666a671e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19d1-0-44105666a671e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19d1-0-44105666a671e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d1-0-44105666a671e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="800" seconds="1204160750" serial="1932"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6607 comm="gconfd-2" name="linc-19cf-0-5822e7e1c381f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160750" serial="1932"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc5b4d0 a2=382e8c a3=b7f366d8 items=0 ppid=1 pid=6607 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160750" serial="1932"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>7a7882ba-fcb6-4dcc-bdba-d096d4bdf228</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19cf-0-5822e7e1c381f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19cf-0-5822e7e1c381f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19cf-0-5822e7e1c381f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19cf-0-5822e7e1c381f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19cf-0-5822e7e1c381f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="871" seconds="1204160750" serial="1933"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6621 comm="gconfd-2" name="linc-19dd-0-489a7166d4d5b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="871" seconds="1204160750" serial="1933"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9399b0 a2=382e8c a3=b80156d8 items=0 ppid=1 pid=6621 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="871" seconds="1204160750" serial="1933"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>421f3e5a-6fcb-447f-b9a9-e6fd74d0f79b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19dd-0-489a7166d4d5b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19dd-0-489a7166d4d5b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19dd-0-489a7166d4d5b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19dd-0-489a7166d4d5b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19dd-0-489a7166d4d5b</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="900" seconds="1204160750" serial="1934"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6616 comm="gconfd-2" name="linc-19d8-0-2b741d94dbc6f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="900" seconds="1204160750" serial="1934"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf800880 a2=382e8c a3=b7fdf6d8 items=0 ppid=1 pid=6616 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="900" seconds="1204160750" serial="1934"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>d3c86d21-df63-4b7a-8c8b-2a132da3c863</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d8-0-2b741d94dbc6f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19d8-0-2b741d94dbc6f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19d8-0-2b741d94dbc6f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19d8-0-2b741d94dbc6f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d8-0-2b741d94dbc6f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="902" seconds="1204160750" serial="1935"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6615 comm="gconfd-2" name="linc-19d7-0-16958661dc485" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="902" seconds="1204160750" serial="1935"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfda1620 a2=382e8c a3=b7f7e6d8 items=0 ppid=1 pid=6615 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="902" seconds="1204160750" serial="1935"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>fa2c218c-187d-4374-80a5-8f0a7d6e7e23</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d7-0-16958661dc485</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19d7-0-16958661dc485'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19d7-0-16958661dc485). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19d7-0-16958661dc485). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19d7-0-16958661dc485</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="995" seconds="1204160750" serial="1936"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6626 comm="gconfd-2" name="linc-19e2-0-7bf19295f301f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="995" seconds="1204160750" serial="1936"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfae8b60 a2=382e8c a3=b80c66d8 items=0 ppid=1 pid=6626 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="995" seconds="1204160750" serial="1936"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>a03276d8-4a25-4e1d-93a6-6d23617d0b25</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e2-0-7bf19295f301f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19e2-0-7bf19295f301f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19e2-0-7bf19295f301f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19e2-0-7bf19295f301f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e2-0-7bf19295f301f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="999" seconds="1204160750" serial="1937"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6628 comm="gconfd-2" name="linc-19e4-0-2678eba5f362d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="999" seconds="1204160750" serial="1937"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9ada20 a2=382e8c a3=b7f896d8 items=0 ppid=1 pid=6628 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="999" seconds="1204160750" serial="1937"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:50Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:50Z</last_seen_date> > <local_id>e0a4be33-2bde-4297-99bd-b5e443426b13</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e4-0-2678eba5f362d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19e4-0-2678eba5f362d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19e4-0-2678eba5f362d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19e4-0-2678eba5f362d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e4-0-2678eba5f362d</tpath> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="109" seconds="1204160751" serial="1938"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6623 comm="gconfd-2" name="linc-19df-0-6afb16031ad15" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="109" seconds="1204160751" serial="1938"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfda9e20 a2=382e8c a3=b80876d8 items=0 ppid=1 pid=6623 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="109" seconds="1204160751" serial="1938"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>3cb4a730-e0ff-47fd-a051-1ebf13e05ff7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19df-0-6afb16031ad15</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19df-0-6afb16031ad15'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19df-0-6afb16031ad15). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19df-0-6afb16031ad15). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19df-0-6afb16031ad15</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="173" seconds="1204160751" serial="1940"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6637 comm="gconfd-2" name="linc-19ed-0-3d1de1652a5da" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="173" seconds="1204160751" serial="1940"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff3bbb0 a2=382e8c a3=b80196d8 items=0 ppid=1 pid=6637 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="173" seconds="1204160751" serial="1940"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>8ba40e7e-d079-4326-b103-1dd1e9b54f1a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ed-0-3d1de1652a5da</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19ed-0-3d1de1652a5da'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19ed-0-3d1de1652a5da). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19ed-0-3d1de1652a5da). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19ed-0-3d1de1652a5da</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="201" seconds="1204160751" serial="1939"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6632 comm="gconfd-2" name="linc-19e8-0-2dcd378d313c6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160751" serial="1939"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc10c90 a2=382e8c a3=b7fec6d8 items=0 ppid=1 pid=6632 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160751" serial="1939"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>175fade6-19ae-4d10-ab34-a4a57a8f8788</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e8-0-2dcd378d313c6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19e8-0-2dcd378d313c6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19e8-0-2dcd378d313c6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19e8-0-2dcd378d313c6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e8-0-2dcd378d313c6</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="207" seconds="1204160751" serial="1941"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6633 comm="gconfd-2" name="linc-19e9-0-1d45bc3c328e0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="207" seconds="1204160751" serial="1941"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9409c0 a2=382e8c a3=b7f1c6d8 items=0 ppid=1 pid=6633 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="207" seconds="1204160751" serial="1941"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>f613c8ee-a724-475c-ab56-bb8dc1b6c3df</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e9-0-1d45bc3c328e0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19e9-0-1d45bc3c328e0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19e9-0-1d45bc3c328e0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19e9-0-1d45bc3c328e0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19e9-0-1d45bc3c328e0</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="313" seconds="1204160751" serial="1942"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6644 comm="gconfd-2" name="linc-19f4-0-674c953e4c994" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="313" seconds="1204160751" serial="1942"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9369b0 a2=382e8c a3=b80126d8 items=0 ppid=6643 pid=6644 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="313" seconds="1204160751" serial="1942"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>6321973c-ac88-43ce-aa01-af5aacaa5d4a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f4-0-674c953e4c994</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19f4-0-674c953e4c994'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19f4-0-674c953e4c994). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19f4-0-674c953e4c994). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f4-0-674c953e4c994</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="315" seconds="1204160751" serial="1943"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6641 comm="gconfd-2" name="linc-19f1-0-68dba1ae4d028" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="315" seconds="1204160751" serial="1943"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa2eab0 a2=382e8c a3=b800a6d8 items=0 ppid=1 pid=6641 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="315" seconds="1204160751" serial="1943"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>d79ebda8-ed2f-4ba5-82f1-84425b9925c9</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f1-0-68dba1ae4d028</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19f1-0-68dba1ae4d028'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19f1-0-68dba1ae4d028). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19f1-0-68dba1ae4d028). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f1-0-68dba1ae4d028</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="444" seconds="1204160751" serial="1944"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6642 comm="gconfd-2" name="linc-19f2-0-7c0b76aa6c7bb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="444" seconds="1204160751" serial="1944"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff697e0 a2=382e8c a3=b7f446d8 items=0 ppid=1 pid=6642 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="444" seconds="1204160751" serial="1944"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>4f338b0c-85e3-42ff-a2e0-431f4fb8429a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f2-0-7c0b76aa6c7bb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19f2-0-7c0b76aa6c7bb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19f2-0-7c0b76aa6c7bb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19f2-0-7c0b76aa6c7bb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f2-0-7c0b76aa6c7bb</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="510" seconds="1204160751" serial="1945"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6649 comm="gconfd-2" name="linc-19f9-0-2197c0597caa8" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="510" seconds="1204160751" serial="1945"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd05d80 a2=382e8c a3=b7ee16d8 items=0 ppid=1 pid=6649 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="510" seconds="1204160751" serial="1945"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>8bce524f-47ee-463a-ac29-b4e9f0ea5fda</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f9-0-2197c0597caa8</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19f9-0-2197c0597caa8'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19f9-0-2197c0597caa8). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19f9-0-2197c0597caa8). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f9-0-2197c0597caa8</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="519" seconds="1204160751" serial="1946"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6653 comm="gconfd-2" name="linc-19fd-0-33cf7bb87eb48" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="519" seconds="1204160751" serial="1946"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe7cf00 a2=382e8c a3=b7f5a6d8 items=0 ppid=1 pid=6653 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="519" seconds="1204160751" serial="1946"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>293e7b40-b3ba-49b1-8dad-715df575f14c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19fd-0-33cf7bb87eb48</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19fd-0-33cf7bb87eb48'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19fd-0-33cf7bb87eb48). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19fd-0-33cf7bb87eb48). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19fd-0-33cf7bb87eb48</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="520" seconds="1204160751" serial="1947"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6648 comm="gconfd-2" name="linc-19f8-0-335fb7107eff6" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="520" seconds="1204160751" serial="1947"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffec860 a2=382e8c a3=b80c76d8 items=0 ppid=1 pid=6648 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="520" seconds="1204160751" serial="1947"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>3939e3e2-7df6-4f36-93c3-476ad047da0b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f8-0-335fb7107eff6</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-19f8-0-335fb7107eff6'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-19f8-0-335fb7107eff6). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-19f8-0-335fb7107eff6). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-19f8-0-335fb7107eff6</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="608" seconds="1204160751" serial="1948"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6657 comm="gconfd-2" name="linc-1a01-0-2258879994a15" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="608" seconds="1204160751" serial="1948"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc81500 a2=382e8c a3=b805c6d8 items=0 ppid=6656 pid=6657 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="608" seconds="1204160751" serial="1948"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>b9579907-5ac8-42ce-91a7-b8f125ce6fcc</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a01-0-2258879994a15</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a01-0-2258879994a15'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a01-0-2258879994a15). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a01-0-2258879994a15). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a01-0-2258879994a15</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="614" seconds="1204160751" serial="1949"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6659 comm="gconfd-2" name="linc-1a03-0-7948086696162" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="614" seconds="1204160751" serial="1949"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf86e0e0 a2=382e8c a3=b80496d8 items=0 ppid=6658 pid=6659 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="614" seconds="1204160751" serial="1949"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>9ae45bf5-f06f-48c1-89c8-f004572893a8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a03-0-7948086696162</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a03-0-7948086696162'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a03-0-7948086696162). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a03-0-7948086696162). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a03-0-7948086696162</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="753" seconds="1204160751" serial="1950"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6660 comm="gconfd-2" name="linc-1a04-0-34f75217b7feb" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="753" seconds="1204160751" serial="1950"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8f2970 a2=382e8c a3=b7fd06d8 items=0 ppid=1 pid=6660 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="753" seconds="1204160751" serial="1950"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>d143b3de-61b0-4aa1-9c05-f722aa908438</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a04-0-34f75217b7feb</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a04-0-34f75217b7feb'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a04-0-34f75217b7feb). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a04-0-34f75217b7feb). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a04-0-34f75217b7feb</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="835" seconds="1204160751" serial="1951"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6670 comm="gconfd-2" name="linc-1a0e-0-47c2e76fcbf1a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="835" seconds="1204160751" serial="1951"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc6fcf0 a2=382e8c a3=b7f4b6d8 items=0 ppid=1 pid=6670 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="835" seconds="1204160751" serial="1951"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>dd7dc933-23e9-4542-a5af-6dc6a53fe54f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a0e-0-47c2e76fcbf1a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a0e-0-47c2e76fcbf1a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a0e-0-47c2e76fcbf1a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a0e-0-47c2e76fcbf1a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a0e-0-47c2e76fcbf1a</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1952"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6666 comm="gconfd-2" name="linc-1a0a-0-77c3dbccccdea" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1952"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfafd380 a2=382e8c a3=b7fda6d8 items=0 ppid=1 pid=6666 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1952"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>05d3f1c1-cbf6-434d-9a41-85ab95a4ec75</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a0a-0-77c3dbccccdea</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a0a-0-77c3dbccccdea'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a0a-0-77c3dbccccdea). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a0a-0-77c3dbccccdea). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a0a-0-77c3dbccccdea</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1953"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6665 comm="gconfd-2" name="linc-1a09-0-426cb146cd058" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1953"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff627e0 a2=382e8c a3=b803f6d8 items=0 ppid=1 pid=6665 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="839" seconds="1204160751" serial="1953"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>f9dad8a7-7187-440f-9063-3c25db063a91</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a09-0-426cb146cd058</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a09-0-426cb146cd058'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a09-0-426cb146cd058). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a09-0-426cb146cd058). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a09-0-426cb146cd058</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="914" seconds="1204160751" serial="1954"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6675 comm="gconfd-2" name="linc-1a13-0-3bdd43d3df419" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="914" seconds="1204160751" serial="1954"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdc7e40 a2=382e8c a3=b7fa56d8 items=0 ppid=1 pid=6675 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="914" seconds="1204160751" serial="1954"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>fce31289-db41-4899-a705-3ea0b6cedb48</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a13-0-3bdd43d3df419</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a13-0-3bdd43d3df419'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a13-0-3bdd43d3df419). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a13-0-3bdd43d3df419). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a13-0-3bdd43d3df419</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="928" seconds="1204160751" serial="1955"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6673 comm="gconfd-2" name="linc-1a11-0-b656c3de2a96" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="928" seconds="1204160751" serial="1955"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed8750 a2=382e8c a3=b7fb56d8 items=0 ppid=1 pid=6673 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="928" seconds="1204160751" serial="1955"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:51Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:51Z</last_seen_date> > <local_id>5c988585-517e-41fb-81c2-1bc217d9b375</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a11-0-b656c3de2a96</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a11-0-b656c3de2a96'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a11-0-b656c3de2a96). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a11-0-b656c3de2a96). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a11-0-b656c3de2a96</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="102" seconds="1204160752" serial="1956"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6677 comm="gconfd-2" name="linc-1a15-0-16be8d1c1910e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="102" seconds="1204160752" serial="1956"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd3a5b0 a2=382e8c a3=b80156d8 items=0 ppid=1 pid=6677 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="102" seconds="1204160752" serial="1956"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>307ad32c-d9af-4cc0-ae09-41dbd031c077</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a15-0-16be8d1c1910e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a15-0-16be8d1c1910e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a15-0-16be8d1c1910e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a15-0-16be8d1c1910e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a15-0-16be8d1c1910e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="128" seconds="1204160752" serial="1957"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6680 comm="gconfd-2" name="linc-1a18-0-2cccf8ff1f520" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="128" seconds="1204160752" serial="1957"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf85f0e0 a2=382e8c a3=b803a6d8 items=0 ppid=1 pid=6680 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="128" seconds="1204160752" serial="1957"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>3139726e-9e07-4cd8-a647-c997d1ee2e4e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a18-0-2cccf8ff1f520</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a18-0-2cccf8ff1f520'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a18-0-2cccf8ff1f520). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a18-0-2cccf8ff1f520). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a18-0-2cccf8ff1f520</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="134" seconds="1204160752" serial="1958"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6682 comm="gconfd-2" name="linc-1a1a-0-5600b46620d2e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="134" seconds="1204160752" serial="1958"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7bcf0 a2=382e8c a3=b7f576d8 items=0 ppid=1 pid=6682 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="134" seconds="1204160752" serial="1958"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>933c6000-51c7-4d48-91cf-bcd32a4406ad</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a1a-0-5600b46620d2e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a1a-0-5600b46620d2e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a1a-0-5600b46620d2e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a1a-0-5600b46620d2e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a1a-0-5600b46620d2e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="186" seconds="1204160752" serial="1959"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6686 comm="gconfd-2" name="linc-1a1e-0-1602bf372d75f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="186" seconds="1204160752" serial="1959"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb6f3f0 a2=382e8c a3=b804a6d8 items=0 ppid=1 pid=6686 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="186" seconds="1204160752" serial="1959"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>b54b5e2a-d7d4-4e2b-967d-6df865a753b6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a1e-0-1602bf372d75f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a1e-0-1602bf372d75f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a1e-0-1602bf372d75f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a1e-0-1602bf372d75f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a1e-0-1602bf372d75f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="233" seconds="1204160752" serial="1961"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6692 comm="gconfd-2" name="linc-1a24-0-561ad73e391b1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="233" seconds="1204160752" serial="1961"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf88e100 a2=382e8c a3=b7f696d8 items=0 ppid=6691 pid=6692 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="233" seconds="1204160752" serial="1961"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>429ad390-7589-4f56-b869-68644462f68b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a24-0-561ad73e391b1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a24-0-561ad73e391b1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a24-0-561ad73e391b1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a24-0-561ad73e391b1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a24-0-561ad73e391b1</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="236" seconds="1204160752" serial="1960"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6689 comm="gconfd-2" name="linc-1a21-0-2019b64239d04" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="236" seconds="1204160752" serial="1960"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb6e230 a2=382e8c a3=b7f4b6d8 items=0 ppid=1 pid=6689 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="236" seconds="1204160752" serial="1960"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>2d694da8-7338-4aec-ae22-f746a9d28345</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a21-0-2019b64239d04</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a21-0-2019b64239d04'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a21-0-2019b64239d04). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a21-0-2019b64239d04). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a21-0-2019b64239d04</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="415" seconds="1204160752" serial="1962"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6695 comm="gconfd-2" name="linc-1a27-0-325b6ea65807" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="415" seconds="1204160752" serial="1962"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf83a8b0 a2=382e8c a3=b7f166d8 items=0 ppid=1 pid=6695 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="415" seconds="1204160752" serial="1962"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>477e915c-8e55-4bb5-8f46-fd4c31785b22</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a27-0-325b6ea65807</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a27-0-325b6ea65807'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a27-0-325b6ea65807). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a27-0-325b6ea65807). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a27-0-325b6ea65807</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="417" seconds="1204160752" serial="1963"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6696 comm="gconfd-2" name="linc-1a28-0-522866816605d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="417" seconds="1204160752" serial="1963"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfad0350 a2=382e8c a3=b7fab6d8 items=0 ppid=1 pid=6696 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="417" seconds="1204160752" serial="1963"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>5e7c4eef-d5d2-4391-9353-2f442bbc5d25</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a28-0-522866816605d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a28-0-522866816605d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a28-0-522866816605d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a28-0-522866816605d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a28-0-522866816605d</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="423" seconds="1204160752" serial="1964"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6699 comm="gconfd-2" name="linc-1a2b-0-3ec70f3667628" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="423" seconds="1204160752" serial="1964"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb07b80 a2=382e8c a3=b7ee36d8 items=0 ppid=1 pid=6699 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="423" seconds="1204160752" serial="1964"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>bb398878-9037-4ab3-9ea5-20e87dee78c4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a2b-0-3ec70f3667628</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a2b-0-3ec70f3667628'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a2b-0-3ec70f3667628). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a2b-0-3ec70f3667628). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a2b-0-3ec70f3667628</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="506" seconds="1204160752" serial="1965"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6705 comm="gconfd-2" name="linc-1a31-0-696786557b87f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="506" seconds="1204160752" serial="1965"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff7f000 a2=382e8c a3=b805a6d8 items=0 ppid=6704 pid=6705 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="506" seconds="1204160752" serial="1965"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>76ebe22a-a56b-4275-bbb8-b1ba9ee28375</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a31-0-696786557b87f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a31-0-696786557b87f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a31-0-696786557b87f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a31-0-696786557b87f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a31-0-696786557b87f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="534" seconds="1204160752" serial="1966"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6703 comm="gconfd-2" name="linc-1a2f-0-59e1d39d82850" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="534" seconds="1204160752" serial="1966"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb3f3c0 a2=382e8c a3=b7f1c6d8 items=0 ppid=1 pid=6703 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="534" seconds="1204160752" serial="1966"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>293d3ac4-350e-48bf-9d4d-a211f6314a4e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a2f-0-59e1d39d82850</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a2f-0-59e1d39d82850'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a2f-0-59e1d39d82850). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a2f-0-59e1d39d82850). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a2f-0-59e1d39d82850</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="538" seconds="1204160752" serial="1967"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6707 comm="gconfd-2" name="linc-1a33-0-208de6e3835e1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="538" seconds="1204160752" serial="1967"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc7ccf0 a2=382e8c a3=b80586d8 items=0 ppid=1 pid=6707 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="538" seconds="1204160752" serial="1967"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>4d0a9622-5862-4236-9c0b-b7d2d2474ff8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a33-0-208de6e3835e1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a33-0-208de6e3835e1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a33-0-208de6e3835e1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a33-0-208de6e3835e1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a33-0-208de6e3835e1</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="709" seconds="1204160752" serial="1968"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6710 comm="gconfd-2" name="linc-1a36-0-2207f13ad352" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="709" seconds="1204160752" serial="1968"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf999210 a2=382e8c a3=b7f766d8 items=0 ppid=1 pid=6710 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="709" seconds="1204160752" serial="1968"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>200ab86d-7eb3-4fa4-b6b5-8d3fe5a6583d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a36-0-2207f13ad352</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a36-0-2207f13ad352'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a36-0-2207f13ad352). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a36-0-2207f13ad352). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a36-0-2207f13ad352</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="712" seconds="1204160752" serial="1969"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6713 comm="gconfd-2" name="linc-1a39-0-447f5c94ae008" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="712" seconds="1204160752" serial="1969"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa7b2f0 a2=382e8c a3=b80566d8 items=0 ppid=1 pid=6713 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="712" seconds="1204160752" serial="1969"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>8705cb40-9e6e-448a-889b-b904939f82e4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a39-0-447f5c94ae008</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a39-0-447f5c94ae008'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a39-0-447f5c94ae008). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a39-0-447f5c94ae008). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a39-0-447f5c94ae008</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="788" seconds="1204160752" serial="1970"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6717 comm="gconfd-2" name="linc-1a3d-0-1f7d22fcc0658" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="788" seconds="1204160752" serial="1970"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa87b00 a2=382e8c a3=b7f636d8 items=0 ppid=1 pid=6717 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="788" seconds="1204160752" serial="1970"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>367db5f5-35dc-4b1d-9a56-69b2d0fae6d2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a3d-0-1f7d22fcc0658</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a3d-0-1f7d22fcc0658'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a3d-0-1f7d22fcc0658). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a3d-0-1f7d22fcc0658). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a3d-0-1f7d22fcc0658</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="823" seconds="1204160752" serial="1971"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6719 comm="gconfd-2" name="linc-1a3f-0-53404d22c910f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="823" seconds="1204160752" serial="1971"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfed7750 a2=382e8c a3=b7fb46d8 items=0 ppid=1 pid=6719 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="823" seconds="1204160752" serial="1971"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>1c2097be-c9bf-4e92-8579-3e5c10afd427</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a3f-0-53404d22c910f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a3f-0-53404d22c910f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a3f-0-53404d22c910f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a3f-0-53404d22c910f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a3f-0-53404d22c910f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="931" seconds="1204160752" serial="1972"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6722 comm="gconfd-2" name="linc-1a42-0-7e364192e36af" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="931" seconds="1204160752" serial="1972"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ac260 a2=382e8c a3=b80886d8 items=0 ppid=1 pid=6722 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="931" seconds="1204160752" serial="1972"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>abaeaf18-2023-4c6c-abfb-f6e8230e02c2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a42-0-7e364192e36af</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a42-0-7e364192e36af'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a42-0-7e364192e36af). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a42-0-7e364192e36af). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a42-0-7e364192e36af</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="957" seconds="1204160752" serial="1973"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6725 comm="gconfd-2" name="linc-1a45-0-279fe836e9be9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="957" seconds="1204160752" serial="1973"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb9a410 a2=382e8c a3=b80776d8 items=0 ppid=1 pid=6725 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="957" seconds="1204160752" serial="1973"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>e1b680dd-97b4-426f-9907-6872a298c658</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a45-0-279fe836e9be9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a45-0-279fe836e9be9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a45-0-279fe836e9be9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a45-0-279fe836e9be9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a45-0-279fe836e9be9</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="996" seconds="1204160752" serial="1974"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6729 comm="gconfd-2" name="linc-1a49-0-1dc27882f3492" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="996" seconds="1204160752" serial="1974"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa11a90 a2=382e8c a3=b7eed6d8 items=0 ppid=1 pid=6729 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="996" seconds="1204160752" serial="1974"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:52Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:52Z</last_seen_date> > <local_id>83d71de2-2090-409e-8b64-f649ea05f886</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a49-0-1dc27882f3492</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a49-0-1dc27882f3492'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a49-0-1dc27882f3492). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a49-0-1dc27882f3492). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a49-0-1dc27882f3492</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="50" seconds="1204160753" serial="1975"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6732 comm="gconfd-2" name="linc-1a4c-0-2b4378c9c30e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="50" seconds="1204160753" serial="1975"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd41dc0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=6732 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="50" seconds="1204160753" serial="1975"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>9b699605-fe6e-42cb-bea5-3eb6bfcce9b4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a4c-0-2b4378c9c30e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a4c-0-2b4378c9c30e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a4c-0-2b4378c9c30e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a4c-0-2b4378c9c30e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a4c-0-2b4378c9c30e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="193" seconds="1204160753" serial="1976"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6736 comm="gconfd-2" name="linc-1a50-0-703653822f352" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="193" seconds="1204160753" serial="1976"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd73df0 a2=382e8c a3=b7f4f6d8 items=0 ppid=1 pid=6736 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="193" seconds="1204160753" serial="1976"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>42e0ce16-0a87-4af8-a745-6a079c840e47</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a50-0-703653822f352</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a50-0-703653822f352'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a50-0-703653822f352). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a50-0-703653822f352). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a50-0-703653822f352</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="220" seconds="1204160753" serial="1977"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6737 comm="gconfd-2" name="linc-1a51-0-680cc2b335e9f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="220" seconds="1204160753" serial="1977"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfecc740 a2=382e8c a3=b7fa76d8 items=0 ppid=1 pid=6737 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="220" seconds="1204160753" serial="1977"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>24621315-dcd6-4e44-b2d4-41e8b92cec73</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a51-0-680cc2b335e9f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a51-0-680cc2b335e9f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a51-0-680cc2b335e9f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a51-0-680cc2b335e9f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a51-0-680cc2b335e9f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="250" seconds="1204160753" serial="1978"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6742 comm="gconfd-2" name="linc-1a56-0-7e8bad083d12d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="250" seconds="1204160753" serial="1978"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8770f0 a2=382e8c a3=b7f526d8 items=0 ppid=6741 pid=6742 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="250" seconds="1204160753" serial="1978"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>ed3ab8da-de44-4d02-86b0-178ee4b0d5d4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a56-0-7e8bad083d12d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a56-0-7e8bad083d12d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a56-0-7e8bad083d12d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a56-0-7e8bad083d12d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a56-0-7e8bad083d12d</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="299" seconds="1204160753" serial="1979"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6744 comm="gconfd-2" name="linc-1a58-0-60b421fd49126" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="299" seconds="1204160753" serial="1979"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff90810 a2=382e8c a3=b806d6d8 items=0 ppid=1 pid=6744 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="299" seconds="1204160753" serial="1979"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>478c4e3a-4278-488f-a040-311ed420b4b2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a58-0-60b421fd49126</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a58-0-60b421fd49126'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a58-0-60b421fd49126). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a58-0-60b421fd49126). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a58-0-60b421fd49126</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="456" seconds="1204160753" serial="1980"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6748 comm="gconfd-2" name="linc-1a5c-0-3cd70b006f77b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="456" seconds="1204160753" serial="1980"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdade20 a2=382e8c a3=b7f896d8 items=0 ppid=1 pid=6748 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="456" seconds="1204160753" serial="1980"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>f136b3fe-8929-44a4-9ec5-9f8468098a5c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a5c-0-3cd70b006f77b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a5c-0-3cd70b006f77b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a5c-0-3cd70b006f77b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a5c-0-3cd70b006f77b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a5c-0-3cd70b006f77b</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="459" seconds="1204160753" serial="1981"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6749 comm="gconfd-2" name="linc-1a5d-0-134a1fae70185" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="459" seconds="1204160753" serial="1981"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8668e0 a2=382e8c a3=b80446d8 items=0 ppid=1 pid=6749 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="459" seconds="1204160753" serial="1981"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>652a3169-5dfa-4816-b929-449221a44a81</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a5d-0-134a1fae70185</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a5d-0-134a1fae70185'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a5d-0-134a1fae70185). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a5d-0-134a1fae70185). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a5d-0-134a1fae70185</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="540" seconds="1204160753" serial="1982"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6754 comm="gconfd-2" name="linc-1a62-0-16213457840d2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="540" seconds="1204160753" serial="1982"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf987200 a2=382e8c a3=b80626d8 items=0 ppid=1 pid=6754 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="540" seconds="1204160753" serial="1982"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>05e9c0dc-8fa0-47b5-893f-208662340a22</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a62-0-16213457840d2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a62-0-16213457840d2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a62-0-16213457840d2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a62-0-16213457840d2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a62-0-16213457840d2</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="543" seconds="1204160753" serial="1983"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6756 comm="gconfd-2" name="linc-1a64-0-75da4918849e7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="543" seconds="1204160753" serial="1983"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb0f30 a2=382e8c a3=b808e6d8 items=0 ppid=6755 pid=6756 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="543" seconds="1204160753" serial="1983"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>8181c803-71fb-4a47-8fa4-024ff718e5f6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a64-0-75da4918849e7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a64-0-75da4918849e7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a64-0-75da4918849e7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a64-0-75da4918849e7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a64-0-75da4918849e7</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="685" seconds="1204160753" serial="1984"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6759 comm="gconfd-2" name="linc-1a67-0-50c9a0f7a75f4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="685" seconds="1204160753" serial="1984"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffb9830 a2=382e8c a3=b7f966d8 items=0 ppid=1 pid=6759 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="685" seconds="1204160753" serial="1984"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>395ecd42-adf0-42c8-af55-ae5394c250da</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a67-0-50c9a0f7a75f4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a67-0-50c9a0f7a75f4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a67-0-50c9a0f7a75f4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a67-0-50c9a0f7a75f4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a67-0-50c9a0f7a75f4</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="710" seconds="1204160753" serial="1985"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6761 comm="gconfd-2" name="linc-1a69-0-21672563ad52c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="710" seconds="1204160753" serial="1985"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd92610 a2=382e8c a3=b806f6d8 items=0 ppid=1 pid=6761 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="710" seconds="1204160753" serial="1985"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>bd0b5d6e-5fb5-4594-a336-5dbb6a41e6d4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a69-0-21672563ad52c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a69-0-21672563ad52c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a69-0-21672563ad52c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a69-0-21672563ad52c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a69-0-21672563ad52c</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="742" seconds="1204160753" serial="1986"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6766 comm="gconfd-2" name="linc-1a6e-0-509f834cb540a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="742" seconds="1204160753" serial="1986"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc5f4e0 a2=382e8c a3=b803a6d8 items=0 ppid=6765 pid=6766 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="742" seconds="1204160753" serial="1986"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>3af3752d-c9d6-4b27-b182-e35575a42e0d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a6e-0-509f834cb540a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a6e-0-509f834cb540a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a6e-0-509f834cb540a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a6e-0-509f834cb540a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a6e-0-509f834cb540a</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="786" seconds="1204160753" serial="1987"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6768 comm="gconfd-2" name="linc-1a70-0-41fda4bc014e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="786" seconds="1204160753" serial="1987"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb433c0 a2=382e8c a3=b7f206d8 items=0 ppid=1 pid=6768 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="786" seconds="1204160753" serial="1987"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>d199ed47-cef1-4cf6-b54e-e4143df1c8e1</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a70-0-41fda4bc014e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a70-0-41fda4bc014e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a70-0-41fda4bc014e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a70-0-41fda4bc014e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a70-0-41fda4bc014e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="940" seconds="1204160753" serial="1988"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6772 comm="gconfd-2" name="linc-1a74-0-4ce6e1bbe5a38" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160753" serial="1988"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfbeec70 a2=382e8c a3=b7fcc6d8 items=0 ppid=1 pid=6772 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="940" seconds="1204160753" serial="1988"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>fd3e388d-ee50-4614-a0b5-1814d0e14a57</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a74-0-4ce6e1bbe5a38</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a74-0-4ce6e1bbe5a38'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a74-0-4ce6e1bbe5a38). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a74-0-4ce6e1bbe5a38). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a74-0-4ce6e1bbe5a38</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="967" seconds="1204160753" serial="1989"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6773 comm="gconfd-2" name="linc-1a75-0-2f1d405dec2b7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="967" seconds="1204160753" serial="1989"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfdfa670 a2=382e8c a3=b80d76d8 items=0 ppid=1 pid=6773 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="967" seconds="1204160753" serial="1989"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:53Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:53Z</last_seen_date> > <local_id>e828e8e8-2979-4f3f-9358-8756bb145506</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a75-0-2f1d405dec2b7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a75-0-2f1d405dec2b7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a75-0-2f1d405dec2b7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a75-0-2f1d405dec2b7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a75-0-2f1d405dec2b7</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="25" seconds="1204160754" serial="1990"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6779 comm="gconfd-2" name="linc-1a7b-0-4b2e68256492" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="25" seconds="1204160754" serial="1990"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8c0140 a2=382e8c a3=b809b6d8 items=0 ppid=6778 pid=6779 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="25" seconds="1204160754" serial="1990"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>155eb6a9-85c4-4796-aec2-88cc6cab6dfe</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a7b-0-4b2e68256492</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a7b-0-4b2e68256492'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a7b-0-4b2e68256492). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a7b-0-4b2e68256492). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a7b-0-4b2e68256492</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="48" seconds="1204160754" serial="1991"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6781 comm="gconfd-2" name="linc-1a7d-0-5e5659acbbe4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="48" seconds="1204160754" serial="1991"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcc4540 a2=382e8c a3=b809f6d8 items=0 ppid=1 pid=6781 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="48" seconds="1204160754" serial="1991"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>b4c14af1-4a52-416f-a477-62e953735ba4</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a7d-0-5e5659acbbe4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a7d-0-5e5659acbbe4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a7d-0-5e5659acbbe4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a7d-0-5e5659acbbe4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a7d-0-5e5659acbbe4</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="200" seconds="1204160754" serial="1992"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6786 comm="gconfd-2" name="linc-1a82-0-4f83bfe431020" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="200" seconds="1204160754" serial="1992"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf816090 a2=382e8c a3=b7ef36d8 items=0 ppid=1 pid=6786 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="200" seconds="1204160754" serial="1992"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>313f2726-20f7-463f-a791-5986f3f694d6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a82-0-4f83bfe431020</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a82-0-4f83bfe431020'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a82-0-4f83bfe431020). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a82-0-4f83bfe431020). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a82-0-4f83bfe431020</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="201" seconds="1204160754" serial="1993"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6784 comm="gconfd-2" name="linc-1a80-0-54ad812e3147d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160754" serial="1993"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfeb1730 a2=382e8c a3=b808e6d8 items=0 ppid=1 pid=6784 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="201" seconds="1204160754" serial="1993"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>c84df066-7c9a-4035-b354-276b1eeff376</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a80-0-54ad812e3147d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a80-0-54ad812e3147d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a80-0-54ad812e3147d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a80-0-54ad812e3147d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a80-0-54ad812e3147d</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="271" seconds="1204160754" serial="1994"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6791 comm="gconfd-2" name="linc-1a87-0-4990fc50425fc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="271" seconds="1204160754" serial="1994"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfec9740 a2=382e8c a3=b7fa46d8 items=0 ppid=6790 pid=6791 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="271" seconds="1204160754" serial="1994"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>f048c685-eb51-4227-a3ea-e01a70ca2462</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a87-0-4990fc50425fc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a87-0-4990fc50425fc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a87-0-4990fc50425fc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a87-0-4990fc50425fc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a87-0-4990fc50425fc</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="306" seconds="1204160754" serial="1995"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6793 comm="gconfd-2" name="linc-1a89-0-46f435c84ab43" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="306" seconds="1204160754" serial="1995"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa3d2c0 a2=382e8c a3=b801a6d8 items=0 ppid=1 pid=6793 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="306" seconds="1204160754" serial="1995"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>07849d57-b6a6-4761-81d9-9429e3c1f63b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a89-0-46f435c84ab43</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a89-0-46f435c84ab43'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a89-0-46f435c84ab43). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a89-0-46f435c84ab43). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a89-0-46f435c84ab43</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="495" seconds="1204160754" serial="1996"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6796 comm="gconfd-2" name="linc-1a8c-0-5997bfe278e97" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="495" seconds="1204160754" serial="1996"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9301b0 a2=382e8c a3=b7f0d6d8 items=0 ppid=1 pid=6796 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="495" seconds="1204160754" serial="1996"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>39df120b-88bb-4811-9b80-e148bf7db62d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a8c-0-5997bfe278e97</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a8c-0-5997bfe278e97'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a8c-0-5997bfe278e97). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a8c-0-5997bfe278e97). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a8c-0-5997bfe278e97</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="497" seconds="1204160754" serial="1997"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6798 comm="gconfd-2" name="linc-1a8e-0-2e50a4317983e" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="497" seconds="1204160754" serial="1997"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd26da0 a2=382e8c a3=b80026d8 items=0 ppid=1 pid=6798 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="497" seconds="1204160754" serial="1997"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>827437c8-f14a-4dde-b8ce-1a1823b7813b</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a8e-0-2e50a4317983e</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a8e-0-2e50a4317983e'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a8e-0-2e50a4317983e). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a8e-0-2e50a4317983e). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a8e-0-2e50a4317983e</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="576" seconds="1204160754" serial="1998"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6806 comm="gconfd-2" name="linc-1a96-0-5991d7c28cc4d" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="576" seconds="1204160754" serial="1998"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaabb20 a2=382e8c a3=b80876d8 items=0 ppid=6805 pid=6806 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="576" seconds="1204160754" serial="1998"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>73b80ab6-ea0a-4efa-89fc-ffc71cadf21c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a96-0-5991d7c28cc4d</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a96-0-5991d7c28cc4d'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a96-0-5991d7c28cc4d). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a96-0-5991d7c28cc4d). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a96-0-5991d7c28cc4d</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="581" seconds="1204160754" serial="1999"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6803 comm="gconfd-2" name="linc-1a93-0-14091a558df9f" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="581" seconds="1204160754" serial="1999"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe41fc0 a2=382e8c a3=b7f1d6d8 items=0 ppid=1 pid=6803 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="581" seconds="1204160754" serial="1999"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>aa67dadc-b134-46ca-969b-08450138614c</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a93-0-14091a558df9f</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a93-0-14091a558df9f'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a93-0-14091a558df9f). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a93-0-14091a558df9f). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a93-0-14091a558df9f</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="789" seconds="1204160754" serial="2000"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6810 comm="gconfd-2" name="linc-1a9a-0-3503c046c0ab2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160754" serial="2000"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf94ee70 a2=382e8c a3=b802c6d8 items=0 ppid=1 pid=6810 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="789" seconds="1204160754" serial="2000"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>9bb9bbe7-423d-4ac3-a215-bbad273e6cdf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9a-0-3503c046c0ab2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a9a-0-3503c046c0ab2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a9a-0-3503c046c0ab2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a9a-0-3503c046c0ab2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9a-0-3503c046c0ab2</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="791" seconds="1204160754" serial="2001"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6811 comm="gconfd-2" name="linc-1a9b-0-208d78efc14ac" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="791" seconds="1204160754" serial="2001"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffd6050 a2=382e8c a3=b80b16d8 items=0 ppid=1 pid=6811 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="791" seconds="1204160754" serial="2001"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>1d32e5ac-a928-47bf-a74c-353a98d59809</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9b-0-208d78efc14ac</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a9b-0-208d78efc14ac'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a9b-0-208d78efc14ac). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a9b-0-208d78efc14ac). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9b-0-208d78efc14ac</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="873" seconds="1204160754" serial="2002"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6813 comm="gconfd-2" name="linc-1a9d-0-467ed99bd530b" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="873" seconds="1204160754" serial="2002"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe9af10 a2=382e8c a3=b7f786d8 items=0 ppid=1 pid=6813 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="873" seconds="1204160754" serial="2002"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>1761d058-f812-4dbc-b4eb-17eaf65f5808</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9d-0-467ed99bd530b</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a9d-0-467ed99bd530b'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a9d-0-467ed99bd530b). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a9d-0-467ed99bd530b). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9d-0-467ed99bd530b</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="879" seconds="1204160754" serial="2003"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6815 comm="gconfd-2" name="linc-1a9f-0-26a444c1d6ab4" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160754" serial="2003"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb12b90 a2=382e8c a3=b7ff06d8 items=0 ppid=1 pid=6815 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160754" serial="2003"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:54Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:54Z</last_seen_date> > <local_id>341a1022-f524-4c4f-8abb-fb9b1315d2e7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9f-0-26a444c1d6ab4</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1a9f-0-26a444c1d6ab4'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1a9f-0-26a444c1d6ab4). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1a9f-0-26a444c1d6ab4). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1a9f-0-26a444c1d6ab4</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="22" seconds="1204160755" serial="2004"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6818 comm="gconfd-2" name="linc-1aa2-0-4165775c58a3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="22" seconds="1204160755" serial="2004"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc0840 a2=382e8c a3=b809b6d8 items=0 ppid=1 pid=6818 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="22" seconds="1204160755" serial="2004"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>83660c66-5ab6-4be3-88e7-f3dbc058d5ff</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa2-0-4165775c58a3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aa2-0-4165775c58a3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aa2-0-4165775c58a3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aa2-0-4165775c58a3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa2-0-4165775c58a3</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="24" seconds="1204160755" serial="2005"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6819 comm="gconfd-2" name="linc-1aa3-0-406299e95f94" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="24" seconds="1204160755" serial="2005"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfb05380 a2=382e8c a3=b7ee26d8 items=0 ppid=1 pid=6819 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="24" seconds="1204160755" serial="2005"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>31a9a52c-0235-476d-a0da-ebf265966975</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa3-0-406299e95f94</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aa3-0-406299e95f94'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aa3-0-406299e95f94). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aa3-0-406299e95f94). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa3-0-406299e95f94</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="54" seconds="1204160755" serial="2006"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6821 comm="gconfd-2" name="linc-1aa5-0-1a57baf8d3dc" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="54" seconds="1204160755" serial="2006"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8e9960 a2=382e8c a3=b7fc56d8 items=0 ppid=6820 pid=6821 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="54" seconds="1204160755" serial="2006"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>5a088e91-77e8-4b67-851b-cb56aa00a61d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa5-0-1a57baf8d3dc</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aa5-0-1a57baf8d3dc'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aa5-0-1a57baf8d3dc). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aa5-0-1a57baf8d3dc). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa5-0-1a57baf8d3dc</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="111" seconds="1204160755" serial="2007"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6823 comm="gconfd-2" name="linc-1aa7-0-f5727c21b434" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="111" seconds="1204160755" serial="2007"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfebadc0 a2=382e8c a3=b7f976d8 items=0 ppid=1 pid=6823 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="111" seconds="1204160755" serial="2007"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>45b1b397-19a4-44d5-86d8-c56d347c2e36</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa7-0-f5727c21b434</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aa7-0-f5727c21b434'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aa7-0-f5727c21b434). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aa7-0-f5727c21b434). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aa7-0-f5727c21b434</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="273" seconds="1204160755" serial="2008"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6827 comm="gconfd-2" name="linc-1aab-0-1f89a1a342cf9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="273" seconds="1204160755" serial="2008"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa96b10 a2=382e8c a3=b7f726d8 items=0 ppid=1 pid=6827 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="273" seconds="1204160755" serial="2008"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>789ae102-5a8e-4002-97d4-aced986dc096</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aab-0-1f89a1a342cf9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aab-0-1f89a1a342cf9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aab-0-1f89a1a342cf9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aab-0-1f89a1a342cf9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aab-0-1f89a1a342cf9</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="299" seconds="1204160755" serial="2009"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6828 comm="gconfd-2" name="linc-1aac-0-545036ce49131" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="299" seconds="1204160755" serial="2009"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8136f0 a2=382e8c a3=b7fee6d8 items=0 ppid=1 pid=6828 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="299" seconds="1204160755" serial="2009"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>9319262e-f84a-42e2-b5f7-de0d93c720cf</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aac-0-545036ce49131</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aac-0-545036ce49131'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aac-0-545036ce49131). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aac-0-545036ce49131). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aac-0-545036ce49131</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="368" seconds="1204160755" serial="2010"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6832 comm="gconfd-2" name="linc-1ab0-0-3b325b5959ef9" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="368" seconds="1204160755" serial="2010"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf89a4a0 a2=382e8c a3=b80776d8 items=0 ppid=1 pid=6832 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="368" seconds="1204160755" serial="2010"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>20cebdfe-ea44-43b4-a67a-1a67960b6765</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab0-0-3b325b5959ef9</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ab0-0-3b325b5959ef9'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ab0-0-3b325b5959ef9). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ab0-0-3b325b5959ef9). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab0-0-3b325b5959ef9</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="383" seconds="1204160755" serial="2011"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6830 comm="gconfd-2" name="linc-1aae-0-334eb9925d7d0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="383" seconds="1204160755" serial="2011"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ae130 a2=382e8c a3=b7f8b6d8 items=0 ppid=1 pid=6830 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="383" seconds="1204160755" serial="2011"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>18b381e6-9541-4f6d-8ff9-22634bd16d5a</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aae-0-334eb9925d7d0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1aae-0-334eb9925d7d0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1aae-0-334eb9925d7d0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1aae-0-334eb9925d7d0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1aae-0-334eb9925d7d0</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="564" seconds="1204160755" serial="2012"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6836 comm="gconfd-2" name="linc-1ab4-0-17cbf68a89e4c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="564" seconds="1204160755" serial="2012"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc40cc0 a2=382e8c a3=b801c6d8 items=0 ppid=1 pid=6836 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="564" seconds="1204160755" serial="2012"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>565a1943-6d1d-410b-b39f-0244d651b967</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab4-0-17cbf68a89e4c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ab4-0-17cbf68a89e4c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ab4-0-17cbf68a89e4c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ab4-0-17cbf68a89e4c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab4-0-17cbf68a89e4c</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="567" seconds="1204160755" serial="2013"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6837 comm="gconfd-2" name="linc-1ab5-0-517db0978a8da" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="567" seconds="1204160755" serial="2013"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe12e90 a2=382e8c a3=b7fee6d8 items=0 ppid=1 pid=6837 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="567" seconds="1204160755" serial="2013"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>74d7dfaf-305b-4f0e-8361-55e8dab69375</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab5-0-517db0978a8da</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ab5-0-517db0978a8da'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ab5-0-517db0978a8da). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ab5-0-517db0978a8da). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab5-0-517db0978a8da</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="656" seconds="1204160755" serial="2014"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6839 comm="gconfd-2" name="linc-1ab7-0-4940c9b6a03f0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="656" seconds="1204160755" serial="2014"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf8ddef0 a2=382e8c a3=b80b96d8 items=0 ppid=1 pid=6839 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="656" seconds="1204160755" serial="2014"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>dc2bf287-bc15-4086-b97d-3360890439b0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab7-0-4940c9b6a03f0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ab7-0-4940c9b6a03f0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ab7-0-4940c9b6a03f0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ab7-0-4940c9b6a03f0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab7-0-4940c9b6a03f0</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="663" seconds="1204160755" serial="2015"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6841 comm="gconfd-2" name="linc-1ab9-0-69c1e668a1da2" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="663" seconds="1204160755" serial="2015"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcaf530 a2=382e8c a3=b808a6d8 items=0 ppid=1 pid=6841 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="663" seconds="1204160755" serial="2015"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>98ee2b74-c1a1-4918-94d7-df24bacbb769</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab9-0-69c1e668a1da2</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ab9-0-69c1e668a1da2'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ab9-0-69c1e668a1da2). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ab9-0-69c1e668a1da2). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ab9-0-69c1e668a1da2</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="797" seconds="1204160755" serial="2016"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6844 comm="gconfd-2" name="linc-1abc-0-eb49733c2c43" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="797" seconds="1204160755" serial="2016"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf991a10 a2=382e8c a3=b7f6d6d8 items=0 ppid=1 pid=6844 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="797" seconds="1204160755" serial="2016"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>bdf62bd2-fc46-49c8-a5c0-377aaee95bd2</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abc-0-eb49733c2c43</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1abc-0-eb49733c2c43'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1abc-0-eb49733c2c43). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1abc-0-eb49733c2c43). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abc-0-eb49733c2c43</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="799" seconds="1204160755" serial="2017"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6845 comm="gconfd-2" name="linc-1abd-0-23166537c33a7" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160755" serial="2017"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfacdb50 a2=382e8c a3=b80ab6d8 items=0 ppid=1 pid=6845 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="799" seconds="1204160755" serial="2017"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>42d41a1e-0812-4876-b4c9-89f63d7fd919</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abd-0-23166537c33a7</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1abd-0-23166537c33a7'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1abd-0-23166537c33a7). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1abd-0-23166537c33a7). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abd-0-23166537c33a7</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="880" seconds="1204160755" serial="2018"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6849 comm="gconfd-2" name="linc-1ac1-0-71762f13d6eb0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="880" seconds="1204160755" serial="2018"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfaf9370 a2=382e8c a3=b80d46d8 items=0 ppid=1 pid=6849 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="880" seconds="1204160755" serial="2018"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>2d2a86db-766d-4b8e-99fa-0431bf6f9fe6</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ac1-0-71762f13d6eb0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ac1-0-71762f13d6eb0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ac1-0-71762f13d6eb0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ac1-0-71762f13d6eb0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ac1-0-71762f13d6eb0</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="905" seconds="1204160755" serial="2019"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6847 comm="gconfd-2" name="linc-1abf-0-76f3cabbdd055" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="905" seconds="1204160755" serial="2019"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff0a780 a2=382e8c a3=b7fe56d8 items=0 ppid=1 pid=6847 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="905" seconds="1204160755" serial="2019"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:55Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:55Z</last_seen_date> > <local_id>684f5c98-d115-4c18-82f0-e925b0ccc3e7</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abf-0-76f3cabbdd055</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1abf-0-76f3cabbdd055'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1abf-0-76f3cabbdd055). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1abf-0-76f3cabbdd055). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1abf-0-76f3cabbdd055</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="376" seconds="1204160756" serial="2026"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6863 comm="gconfd-2" name="linc-1acf-0-279635135bef1" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="376" seconds="1204160756" serial="2026"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfe296a0 a2=382e8c a3=b80046d8 items=0 ppid=1 pid=6863 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="376" seconds="1204160756" serial="2026"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>b5394be6-f135-4445-8a40-729694756cea</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1acf-0-279635135bef1</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1acf-0-279635135bef1'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1acf-0-279635135bef1). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1acf-0-279635135bef1). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1acf-0-279635135bef1</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="405" seconds="1204160756" serial="2028"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6865 comm="gconfd-2" name="linc-1ad1-0-5da2150362e59" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="405" seconds="1204160756" serial="2028"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa262a0 a2=382e8c a3=b80016d8 items=0 ppid=1 pid=6865 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="405" seconds="1204160756" serial="2028"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>82ebffad-5a3e-4129-bcd6-cb0706ff85fd</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad1-0-5da2150362e59</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ad1-0-5da2150362e59'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ad1-0-5da2150362e59). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ad1-0-5da2150362e59). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad1-0-5da2150362e59</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="538" seconds="1204160756" serial="2029"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6868 comm="gconfd-2" name="linc-1ad4-0-209da00e83771" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="538" seconds="1204160756" serial="2029"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf87f900 a2=382e8c a3=b805d6d8 items=0 ppid=1 pid=6868 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="538" seconds="1204160756" serial="2029"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>1ac0f4b8-cfc5-41ca-acb5-3e7d8203562f</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad4-0-209da00e83771</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ad4-0-209da00e83771'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ad4-0-209da00e83771). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ad4-0-209da00e83771). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad4-0-209da00e83771</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="550" seconds="1204160756" serial="2030"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6869 comm="gconfd-2" name="linc-1ad5-0-16b0cb03864d3" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="550" seconds="1204160756" serial="2030"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcb0d30 a2=382e8c a3=b7f8c6d8 items=0 ppid=1 pid=6869 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="550" seconds="1204160756" serial="2030"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>114adf37-4aa0-4cf3-bf6d-736255c40c13</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad5-0-16b0cb03864d3</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ad5-0-16b0cb03864d3'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ad5-0-16b0cb03864d3). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ad5-0-16b0cb03864d3). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad5-0-16b0cb03864d3</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="640" seconds="1204160756" serial="2031"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6871 comm="gconfd-2" name="linc-1ad7-0-5638b54a9c614" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160756" serial="2031"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bff54100 a2=382e8c a3=b7f2f6d8 items=0 ppid=6870 pid=6871 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="640" seconds="1204160756" serial="2031"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>be3290ce-bbcf-4cd2-86c5-e44b7af709b5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad7-0-5638b54a9c614</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ad7-0-5638b54a9c614'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ad7-0-5638b54a9c614). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ad7-0-5638b54a9c614). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad7-0-5638b54a9c614</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="651" seconds="1204160756" serial="2032"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6873 comm="gconfd-2" name="linc-1ad9-0-27a0d59f9f00c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="651" seconds="1204160756" serial="2032"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc8040 a2=382e8c a3=b7fa56d8 items=0 ppid=6872 pid=6873 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="651" seconds="1204160756" serial="2032"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>5b377bd3-09c3-4f43-be87-4c953ed39b4e</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad9-0-27a0d59f9f00c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ad9-0-27a0d59f9f00c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ad9-0-27a0d59f9f00c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ad9-0-27a0d59f9f00c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ad9-0-27a0d59f9f00c</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="774" seconds="1204160756" serial="2033"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6877 comm="gconfd-2" name="linc-1add-0-4e6dec8bd150" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="774" seconds="1204160756" serial="2033"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf9db250 a2=382e8c a3=b7fb86d8 items=0 ppid=1 pid=6877 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="774" seconds="1204160756" serial="2033"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>200365aa-4524-45da-bb14-d24867030fc5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1add-0-4e6dec8bd150</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1add-0-4e6dec8bd150'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1add-0-4e6dec8bd150). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1add-0-4e6dec8bd150). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1add-0-4e6dec8bd150</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="800" seconds="1204160756" serial="2034"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6876 comm="gconfd-2" name="linc-1adc-0-6d2b5d8dc37db" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160756" serial="2034"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfc25ca0 a2=382e8c a3=b80036d8 items=0 ppid=1 pid=6876 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="800" seconds="1204160756" serial="2034"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>06ecdcd6-d63f-4fd2-bed6-d45b5f28f97d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1adc-0-6d2b5d8dc37db</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1adc-0-6d2b5d8dc37db'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1adc-0-6d2b5d8dc37db). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1adc-0-6d2b5d8dc37db). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1adc-0-6d2b5d8dc37db</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="879" seconds="1204160756" serial="2035"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6881 comm="gconfd-2" name="linc-1ae1-0-4a76be66d6d1c" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160756" serial="2035"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfcbfd40 a2=382e8c a3=b809d6d8 items=0 ppid=6880 pid=6881 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="879" seconds="1204160756" serial="2035"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>1a84c8b0-a672-4b92-93da-7ac82edecc9d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ae1-0-4a76be66d6d1c</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1ae1-0-4a76be66d6d1c'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1ae1-0-4a76be66d6d1c). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1ae1-0-4a76be66d6d1c). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1ae1-0-4a76be66d6d1c</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="881" seconds="1204160756" serial="2036"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=6879 comm="gconfd-2" name="linc-1adf-0-6dd4bed4d713a" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="881" seconds="1204160756" serial="2036"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfa08da0 a2=382e8c a3=b7ee56d8 items=0 ppid=6878 pid=6879 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="881" seconds="1204160756" serial="2036"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:05:56Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:05:56Z</last_seen_date> > <local_id>5ff13cf6-3d7d-45ed-b4f2-43be43e033c8</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1adf-0-6dd4bed4d713a</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1adf-0-6dd4bed4d713a'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1adf-0-6dd4bed4d713a). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1adf-0-6dd4bed4d713a). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1adf-0-6dd4bed4d713a</tpath> > <users> > <user delete_flag="True" seen_flag="False" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="861" seconds="1204160765" serial="2151"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=7238 comm="gconfd-2" name="linc-1c46-0-3ced8e13d2513" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="861" seconds="1204160765" serial="2151"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bffc2040 a2=382e8c a3=b7f9f6d8 items=0 ppid=1 pid=7238 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="861" seconds="1204160765" serial="2151"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:06:05Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:06:05Z</last_seen_date> > <local_id>ad4c27f4-3fce-441b-8819-ea245c770fa0</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1c46-0-3ced8e13d2513</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1c46-0-3ced8e13d2513'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1c46-0-3ced8e13d2513). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1c46-0-3ced8e13d2513). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1c46-0-3ced8e13d2513</tpath> > <users> > <user delete_flag="True" seen_flag="True" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>home_tmp_bad_labels</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="969" seconds="1204160765" serial="2152"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { create } for pid=7247 comm="gconfd-2" name="linc-1c4f-0-3f567d6aec9e0" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_tmp_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="969" seconds="1204160765" serial="2152"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bfd425c0 a2=382e8c a3=b7f1f6d8 items=0 ppid=1 pid=7247 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="969" seconds="1204160765" serial="2152"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.65.rc2.git7.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.0-1.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.65.rc2.git7.fc9 #1 SMP Sat Feb 23 23:06:09 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-02-28T01:06:05Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-02-28T01:06:05Z</last_seen_date> > <local_id>fc21e578-cd3e-4044-8822-8046f9a01c6d</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>create</operation> > </access> > <analysis_id>home_tmp_bad_labels</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="xdm_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1c4f-0-3f567d6aec9e0</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > If you want gconfd-2 to access this files, you need to > relabel them using restorecon -v 'linc-1c4f-0-3f567d6aec9e0'. You might want to > relabel the entire directory using restorecon -R -v '<Unknown>'. > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied gconfd-2 access to potentially > mislabeled file(s) (linc-1c4f-0-3f567d6aec9e0). This means that SELinux will not > allow gconfd-2 to use these files. It is common for users to edit > files in their home directory or tmp directories and then move > (mv) them to system directories. The problem is that the files > end up with the wrong file context which confined applications are not allowed to access. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the gconfd-2 from using potentially mislabeled files (linc-1c4f-0-3f567d6aec9e0). > ]]></summary> > </solution> > <source>gconfd-2</source> > <spath>/usr/libexec/gconfd-2</spath> > <src_rpm_list> > <rpm>GConf2-2.21.90-2.fc9</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="user_tmp_t" user="system_u"/> > <tpath>linc-1c4f-0-3f567d6aec9e0</tpath> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="109" seconds="1204626507" serial="75"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=2710 comm="ck-get-x11-serv" name=".Xauthority" dev=sdb2 ino=3742 scontext=system_u:system_r:consolekit_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="109" seconds="1204626507" serial="75"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=33 success=no exit=-13 a0=bfffcfa6 a1=4 a2=b1d9f0 a3=bfffcfa6 items=0 ppid=2709 pid=2710 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="ck-get-x11-serv" exe="/usr/libexec/ck-get-x11-server-pid" subj=system_u:system_r:consolekit_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="109" seconds="1204626507" serial="75"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T10:28:27Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T10:28:27Z</last_seen_date> > <local_id>3c57ecff-b6d8-43ff-bf8e-ee56e1d727e5</local_id> > <report_count>1</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="consolekit_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="consolekit_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.Xauthority</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>ck-get-x11-serv</source> > <spath>/usr/libexec/ck-get-x11-server-pid</spath> > <src_rpm_list> > <rpm>ConsoleKit-x11-0.2.10-1.fc9</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.Xauthority</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>0</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="113" seconds="1204632417" serial="103"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name="virtual-lordmorgul.e6tXya" dev=sdb3 ino=47381 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="113" seconds="1204632417" serial="103"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="113" seconds="1204632417" serial="103"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>2ddda422-80b9-43c0-b51a-8224db18ea8e</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.e6tXya</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.e6tXya</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="320" seconds="1204632417" serial="104"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name="fah" dev=sdb3 ino=47273 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="320" seconds="1204632417" serial="104"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="320" seconds="1204632417" serial="104"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>b72b36b9-7640-48c2-a376-c5c02c1669ec</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./fah</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./fah</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="356" seconds="1204632417" serial="105"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name="virtual-lordmorgul.qw9BmR" dev=sdb3 ino=47252 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="356" seconds="1204632417" serial="105"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="356" seconds="1204632417" serial="105"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>37eb97b2-c894-4b65-978a-c9c7686e6ea1</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.qw9BmR</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.qw9BmR</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="439" seconds="1204632417" serial="106"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name="virtual-lordmorgul.4FvBXq" dev=sdb3 ino=47420 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="439" seconds="1204632417" serial="106"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="439" seconds="1204632417" serial="106"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>54975a81-53e3-4cc2-a788-f22e80a22675</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.4FvBXq</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.4FvBXq</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="520" seconds="1204632417" serial="107"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name=".esd-500" dev=sdb3 ino=47330 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="520" seconds="1204632417" serial="107"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="520" seconds="1204632417" serial="107"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>e814eefa-5f17-4d1b-b6ce-bfb1cd91e423</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.esd-500</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.esd-500</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="809" seconds="1204632417" serial="108"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=8780 comm="tmpwatch" path="/tmp/gnome-system-monitor.lordmorgul.777456431" dev=sdb3 ino=283515 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="809" seconds="1204632417" serial="108"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=856578b a1=bfb4aeb4 a2=967ff4 a3=856578b items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="809" seconds="1204632417" serial="108"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>d2a2e562-4ce3-4c51-bf56-04e3f7814c6c</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/gnome-system-monitor.lordmorgul.777456431</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/gnome-system-monitor.lordmorgul.777456431</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="921" seconds="1204632417" serial="109"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=8780 comm="tmpwatch" path="/tmp/banshee-NDesk.DBus.Bus.txt" dev=sdb3 ino=47476 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="921" seconds="1204632417" serial="109"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=85658c3 a1=bfb4aeb4 a2=967ff4 a3=85658c3 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="921" seconds="1204632417" serial="109"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>b15e3b8b-1f45-4be6-a730-709bb8373aba</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/banshee-NDesk.DBus.Bus.txt</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/banshee-NDesk.DBus.Bus.txt</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="937" seconds="1204632417" serial="110"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=8780 comm="tmpwatch" path="/tmp/pulse-lordmorgul/pid" dev=sdb3 ino=47313 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="937" seconds="1204632417" serial="110"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=85666ab a1=bfb4ad84 a2=967ff4 a3=85666ab items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="937" seconds="1204632417" serial="110"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:57Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:57Z</last_seen_date> > <local_id>6e5f76c3-ca64-4023-a149-1316e71e408f</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/pulse-lordmorgul/pid</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/pulse-lordmorgul/pid</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="246" seconds="1204632418" serial="111"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=8780 comm="tmpwatch" path="/tmp/fahcore-iolock.txt" dev=sdb3 ino=62982 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="246" seconds="1204632418" serial="111"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=856595b a1=bfb4aeb4 a2=967ff4 a3=856595b items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="246" seconds="1204632418" serial="111"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:58Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:58Z</last_seen_date> > <local_id>8c2b9c24-00d6-4bd3-8c38-9b535e84929a</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/fahcore-iolock.txt</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/fahcore-iolock.txt</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="264" seconds="1204632419" serial="112"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8780 comm="tmpwatch" name="keyring-vaxTjg" dev=sdb3 ino=47271 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="264" seconds="1204632419" serial="112"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="264" seconds="1204632419" serial="112"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:59Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:59Z</last_seen_date> > <local_id>3e605b22-c2e0-4ab8-a88e-ac9a7f5d6a94</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./keyring-vaxTjg</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./keyring-vaxTjg</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="515" seconds="1204632419" serial="113"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=8781 comm="tmpwatch" name="kdecache-lordmorgul" dev=sdb3 ino=347111 scontext=system_u:system_r:tmpreaper_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="515" seconds="1204632419" serial="113"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=8778 pid=8781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0 key=(null)</body_text> > <event_id host="cirithungol" milli="515" seconds="1204632419" serial="113"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-04T12:06:59Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:06:59Z</last_seen_date> > <local_id>f70cb769-f1c2-4097-aac8-afe03065052e</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./kdecache-lordmorgul</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./kdecache-lordmorgul</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="262" seconds="1204633715" serial="114"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name="virtual-lordmorgul.e6tXya" dev=sdb3 ino=47381 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="262" seconds="1204633715" serial="114"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="262" seconds="1204633715" serial="114"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>497eadf9-acc1-4b6c-93ac-8be1c5c6b64f</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.e6tXya</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.e6tXya</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="314" seconds="1204633715" serial="115"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name="fah" dev=sdb3 ino=47273 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="314" seconds="1204633715" serial="115"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="314" seconds="1204633715" serial="115"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:17Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>f45e27e3-0527-4a71-99ee-0200d7043b36</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./fah</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./fah</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="329" seconds="1204633715" serial="116"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name="virtual-lordmorgul.qw9BmR" dev=sdb3 ino=47252 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="329" seconds="1204633715" serial="116"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="329" seconds="1204633715" serial="116"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>9698b088-c7d5-4024-bddd-addf3058844e</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.qw9BmR</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.qw9BmR</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="350" seconds="1204633715" serial="117"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name="virtual-lordmorgul.4FvBXq" dev=sdb3 ino=47420 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="350" seconds="1204633715" serial="117"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="350" seconds="1204633715" serial="117"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>5c122964-4c7f-4f7c-ac2f-3123bcd87f33</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.4FvBXq</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./virtual-lordmorgul.4FvBXq</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="351" seconds="1204633715" serial="118"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name=".esd-500" dev=sdb3 ino=47330 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="351" seconds="1204633715" serial="118"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="351" seconds="1204633715" serial="118"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>49ec67bb-09be-4ac2-afff-0335c1bc77e3</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.esd-500</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./.esd-500</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="404" seconds="1204633715" serial="119"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=12656 comm="tmpwatch" path="/tmp/gnome-system-monitor.lordmorgul.777456431" dev=sdb3 ino=283515 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=sock_file</body_text> > <event_id host="cirithungol" milli="404" seconds="1204633715" serial="119"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=89d278b a1=bfd684b4 a2=967ff4 a3=89d278b items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="404" seconds="1204633715" serial="119"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>5c36720d-36fb-477a-aa73-1b3da255bd6b</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/gnome-system-monitor.lordmorgul.777456431</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>sock_file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/gnome-system-monitor.lordmorgul.777456431</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="417" seconds="1204633715" serial="120"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=12656 comm="tmpwatch" path="/tmp/banshee-NDesk.DBus.Bus.txt" dev=sdb3 ino=47476 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="417" seconds="1204633715" serial="120"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=89d28c3 a1=bfd684b4 a2=967ff4 a3=89d28c3 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="417" seconds="1204633715" serial="120"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>afc1d2c8-93e9-4539-8a3b-0ef5542199fe</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/banshee-NDesk.DBus.Bus.txt</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/banshee-NDesk.DBus.Bus.txt</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="418" seconds="1204633715" serial="121"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=12656 comm="tmpwatch" path="/tmp/pulse-lordmorgul/pid" dev=sdb3 ino=47313 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="418" seconds="1204633715" serial="121"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=89d36ab a1=bfd68384 a2=967ff4 a3=89d36ab items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="418" seconds="1204633715" serial="121"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>b9c5b01b-19a5-4c8d-8483-2fa6cd57f862</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/pulse-lordmorgul/pid</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/pulse-lordmorgul/pid</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="436" seconds="1204633715" serial="122"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=12656 comm="tmpwatch" path="/tmp/fahcore-iolock.txt" dev=sdb3 ino=62982 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file</body_text> > <event_id host="cirithungol" milli="436" seconds="1204633715" serial="122"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=196 success=no exit=-13 a0=89d295b a1=bfd684b4 a2=967ff4 a3=89d295b items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="436" seconds="1204633715" serial="122"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>c9586559-43ff-4787-a291-8901ea466b74</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/fahcore-iolock.txt</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>/tmp/fahcore-iolock.txt</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="537" seconds="1204633715" serial="123"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12656 comm="tmpwatch" name="keyring-vaxTjg" dev=sdb3 ino=47271 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="537" seconds="1204633715" serial="123"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12656 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="537" seconds="1204633715" serial="123"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>c30a2549-366d-4e63-a15f-64e720a4aae2</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./keyring-vaxTjg</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./keyring-vaxTjg</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>file</analysis_id> > <audit_event> > <event_id host="cirithungol" milli="627" seconds="1204633715" serial="124"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=12659 comm="tmpwatch" name="kdecache-lordmorgul" dev=sdb3 ino=347111 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <event_id host="cirithungol" milli="627" seconds="1204633715" serial="124"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=5 success=no exit=-13 a0=804ac62 a1=98800 a2=0 a3=0 items=0 ppid=12655 pid=12659 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null)</body_text> > <event_id host="cirithungol" milli="627" seconds="1204633715" serial="124"/> > </audit_record> > </records> > </audit_event> > <category>File Label</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>cirithungol</hostname> > <kernel>2.6.25-0.82.rc3.git2.fc9 i686</kernel> > <platform>Fedora release 8.90 (Rawhide)</platform> > <policy_rpm>selinux-policy-3.3.1-9.fc9</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux cirithungol 2.6.25-0.82.rc3.git2.fc9 #1 SMP Sun Mar 2 23:05:25 EST 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-03-03T12:32:18Z</first_seen_date> > <host>cirithungol</host> > <last_seen_date>2008-03-04T12:28:35Z</last_seen_date> > <local_id>53e583fe-2135-4f61-9872-41f35425e7eb</local_id> > <report_count>2</report_count> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>file</analysis_id> > <host>cirithungol</host> > <scontext mls="s0-s0:c0.c1023" role="system_r" type="tmpreaper_t" user="system_u"/> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./kdecache-lordmorgul</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can execute the following command as root to relabel your > computer system: "touch /.autorelabel; reboot" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux permission checks on files labeled file_t are being > denied. file_t is the context the SELinux kernel gives to files > that do not have a label. This indicates a serious labeling > problem. No files on an SELinux box should ever be labeled file_t. > If you have just added a new disk drive to the system you can > relabel it using the restorecon command. Otherwise you should > relabel the entire files system. > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing access to files with the label, file_t. > ]]></summary> > </solution> > <source>tmpwatch</source> > <spath>/usr/sbin/tmpwatch</spath> > <src_rpm_list> > <rpm>tmpwatch-2.9.13-2</rpm> > </src_rpm_list> > <tclass>dir</tclass> > <tcontext mls="s0" role="object_r" type="file_t" user="system_u"/> > <tpath>./kdecache-lordmorgul</tpath> > <users> > <user delete_flag="False" seen_flag="True" username="lordmorgul"> > <filter> > <count>1</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > </signature_list> > <users version="1.0"> > <user_list> > <user username="lordmorgul" version="1.0"> > <email_alert>False</email_alert> > </user> > <user username="root" version="1.0"> > <email_alert>False</email_alert> > </user> > </user_list> > </users> ></sigs>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 436032
:
296822
| 296824 |
297902