Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 317211 Details for
Bug 462913
sealert won't erase some entries
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
setroubleshoot audit listener database
audit_listener_database.xml (text/xml), 22.12 KB, created by
John Griffiths
on 2008-09-19 17:13:26 UTC
(
hide
)
Description:
setroubleshoot audit listener database
Filename:
MIME Type:
Creator:
John Griffiths
Created:
2008-09-19 17:13:26 UTC
Size:
22.12 KB
patch
obsolete
><?xml version="1.0" encoding="utf-8"?> ><sigs version="3.0"> > <signature_list> > <siginfo> > <analysis_id>samba_enable_home_dirs</analysis_id> > <audit_event> > <event_id host="elijah.suretrak21.net" milli="892" seconds="1218475177" serial="134503"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=25575 comm="smbd" path="/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class" dev=dm-1 ino=2750480 scontext=system_u:system_r:smbd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file</body_text> > <event_id host="elijah.suretrak21.net" milli="892" seconds="1218475177" serial="134503"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=195 success=no exit=-13 a0=bfc575a4 a1=bfc56d24 a2=4c4ff4 a3=bfc56d24 items=0 ppid=4192 pid=25575 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=100 sgid=0 fsgid=100 tty=(none) ses=4294967295 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)</body_text> > <event_id host="elijah.suretrak21.net" milli="892" seconds="1218475177" serial="134503"/> > </audit_record> > </records> > </audit_event> > <category>SAMBA</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>elijah.suretrak21.net</hostname> > <kernel>2.6.25.10-47.fc8 i686</kernel> > <platform>Fedora release 8 (Werewolf)</platform> > <policy_rpm>selinux-policy-3.0.8-111.fc8</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux elijah.suretrak21.net 2.6.25.10-47.fc8 #1 SMP Mon Jul 7 18:39:51 EDT 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-08-11T17:17:47Z</first_seen_date> > <host>elijah.suretrak21.net</host> > <last_seen_date>2008-08-11T17:19:37Z</last_seen_date> > <local_id>85a0da8f-7129-4e27-bca0-b5b854fc52a3</local_id> > <report_count>2</report_count> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>samba_enable_home_dirs</analysis_id> > <host>elijah.suretrak21.net</host> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class</tpath> > </sig> > <solution version="1.0"> > <fix_cmd>setsebool -P samba_enable_home_dirs=1</fix_cmd> > <fix_description><![CDATA[ > If you want samba to share home directories you need to turn on > the samba_enable_home_dirs boolean: "setsebool -P samba_enable_home_dirs=1" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied the samba daemon access to users' home > directories. Someone is attempting to access your home directories > via your samba daemon. If you only setup samba to share non-home > directories, this probably signals a intrusion attempt. > For more information on SELinux integration with samba, look at the > samba_selinux man page. (man samba_selinux) > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the samba daemon from reading users' home directories. > ]]></summary> > </solution> > <source>smbd</source> > <spath>/usr/sbin/smbd</spath> > <src_rpm_list> > <rpm>samba-3.0.30-0.fc8</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="jrg3"> > <filter> > <count>2</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>samba_enable_home_dirs</analysis_id> > <audit_event> > <event_id host="elijah.suretrak21.net" milli="777" seconds="1218548167" serial="140093"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=16295 comm="smbd" path="/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class" dev=dm-1 ino=2715144 scontext=system_u:system_r:smbd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file</body_text> > <event_id host="elijah.suretrak21.net" milli="777" seconds="1218548167" serial="140093"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=195 success=no exit=-13 a0=bfc575a4 a1=bfc56d24 a2=4c4ff4 a3=bfc56d24 items=0 ppid=4192 pid=16295 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=100 sgid=0 fsgid=100 tty=(none) ses=4294967295 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)</body_text> > <event_id host="elijah.suretrak21.net" milli="777" seconds="1218548167" serial="140093"/> > </audit_record> > </records> > </audit_event> > <category>SAMBA</category> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>elijah.suretrak21.net</hostname> > <kernel>2.6.25.10-47.fc8 i686</kernel> > <platform>Fedora release 8 (Werewolf)</platform> > <policy_rpm>selinux-policy-3.0.8-111.fc8</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux elijah.suretrak21.net 2.6.25.10-47.fc8 #1 SMP Mon Jul 7 18:39:51 EDT 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-08-12T13:36:07Z</first_seen_date> > <host>elijah.suretrak21.net</host> > <last_seen_date>2008-08-12T13:36:07Z</last_seen_date> > <local_id>23f17fb1-f36c-4d98-a401-22fad6712aa5</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>samba_enable_home_dirs</analysis_id> > <host>elijah.suretrak21.net</host> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class</tpath> > </sig> > <solution version="1.0"> > <fix_cmd>setsebool -P samba_enable_home_dirs=1</fix_cmd> > <fix_description><![CDATA[ > If you want samba to share home directories you need to turn on > the samba_enable_home_dirs boolean: "setsebool -P samba_enable_home_dirs=1" > ]]></fix_description> > <problem_description><![CDATA[ > SELinux has denied the samba daemon access to users' home > directories. Someone is attempting to access your home directories > via your samba daemon. If you only setup samba to share non-home > directories, this probably signals a intrusion attempt. > For more information on SELinux integration with samba, look at the > samba_selinux man page. (man samba_selinux) > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing the samba daemon from reading users' home directories. > ]]></summary> > </solution> > <source>smbd</source> > <spath>/usr/sbin/smbd</spath> > <src_rpm_list> > <rpm>samba-3.0.30-0.fc8</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/remotes/zones/RemoteZoneCircleSet.class</tpath> > </siginfo> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="elijah.suretrak21.net" milli="407" seconds="1218548891" serial="160113"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=16295 comm="smbd" path="/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class" dev=dm-1 ino=2715342 scontext=system_u:system_r:smbd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file</body_text> > <event_id host="elijah.suretrak21.net" milli="407" seconds="1218548891" serial="160113"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=195 success=no exit=-13 a0=bfc575a4 a1=bfc56d24 a2=4c4ff4 a3=bfc56d24 items=0 ppid=4192 pid=16295 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=100 sgid=0 fsgid=100 tty=(none) ses=4294967295 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)</body_text> > <event_id host="elijah.suretrak21.net" milli="407" seconds="1218548891" serial="160113"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>elijah.suretrak21.net</hostname> > <kernel>2.6.25.10-47.fc8 i686</kernel> > <platform>Fedora release 8 (Werewolf)</platform> > <policy_rpm>selinux-policy-3.0.8-111.fc8</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux elijah.suretrak21.net 2.6.25.10-47.fc8 #1 SMP Mon Jul 7 18:39:51 EDT 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-08-12T13:46:43Z</first_seen_date> > <host>elijah.suretrak21.net</host> > <last_seen_date>2008-08-12T13:48:11Z</last_seen_date> > <local_id>0732e7a6-9e76-4f20-b615-c77f30039cba</local_id> > <report_count>2</report_count> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>elijah.suretrak21.net</host> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for /home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class, > <p> > restorecon -v '/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by smbd. It is not > expected that this access is required by smbd and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing smbd (smbd_t) "getattr" to /home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class (user_home_dir_t). > ]]></summary> > </solution> > <source>smbd</source> > <spath>/usr/sbin/smbd</spath> > <src_rpm_list> > <rpm>samba-3.0.30-0.fc8</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class</tpath> > <users> > <user delete_flag="False" seen_flag="False" username="jrg3"> > <filter> > <count>2</count> > <filter_type>0</filter_type> > </filter> > </user> > </users> > </siginfo> > <siginfo> > <analysis_id>catchall_file</analysis_id> > <audit_event> > <event_id host="elijah.suretrak21.net" milli="547" seconds="1218548894" serial="162294"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { getattr } for pid=16295 comm="smbd" path="/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class" dev=dm-1 ino=2715342 scontext=system_u:system_r:smbd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=file</body_text> > <event_id host="elijah.suretrak21.net" milli="547" seconds="1218548894" serial="162294"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=195 success=no exit=-13 a0=bfc575a4 a1=bfc56d24 a2=4c4ff4 a3=bfc56d24 items=0 ppid=4192 pid=16295 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=100 sgid=0 fsgid=100 tty=(none) ses=4294967295 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)</body_text> > <event_id host="elijah.suretrak21.net" milli="547" seconds="1218548894" serial="162294"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>elijah.suretrak21.net</hostname> > <kernel>2.6.25.10-47.fc8 i686</kernel> > <platform>Fedora release 8 (Werewolf)</platform> > <policy_rpm>selinux-policy-3.0.8-111.fc8</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>22</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux elijah.suretrak21.net 2.6.25.10-47.fc8 #1 SMP Mon Jul 7 18:39:51 EDT 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-08-12T13:48:14Z</first_seen_date> > <host>elijah.suretrak21.net</host> > <last_seen_date>2008-08-12T13:48:14Z</last_seen_date> > <local_id>80aefdec-4f15-48f1-b670-fcd1fe682c54</local_id> > <report_count>1</report_count> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>getattr</operation> > </access> > <analysis_id>catchall_file</analysis_id> > <host>elijah.suretrak21.net</host> > <scontext mls="s0" role="system_r" type="smbd_t" user="system_u"/> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > Sometimes labeling problems can cause SELinux denials. You could try to > restore the default system file context for /home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class, > <p> > restorecon -v '/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class' > <p> > If this does not work, there is currently no automatic way to allow this > access. Instead, you can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by smbd. It is not > expected that this access is required by smbd and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing smbd (smbd_t) "getattr" to /home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class (user_home_dir_t). > ]]></summary> > </solution> > <source>smbd</source> > <spath>/usr/sbin/smbd</spath> > <src_rpm_list> > <rpm>samba-3.0.30-0.fc8</rpm> > </src_rpm_list> > <tclass>file</tclass> > <tcontext mls="s0" role="object_r" type="user_home_dir_t" user="unconfined_u"/> > <tpath>/home/jrg3/CodeProjects/SureTrak/trunk/classes/client/zones/SymbolZoneSetPanel.class</tpath> > </siginfo> > <siginfo> > <analysis_id>catchall</analysis_id> > <audit_event> > <event_id host="elijah.suretrak21.net" milli="867" seconds="1221825841" serial="3909"/> > <records> > <audit_record record_type="AVC"> > <body_text>avc: denied { read } for pid=14302 comm="iptables-restor" path="pipe:[296247]" dev=pipefs ino=296247 scontext=system_u:system_r:iptables_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=fifo_file</body_text> > <event_id host="elijah.suretrak21.net" milli="867" seconds="1221825841" serial="3909"/> > </audit_record> > <audit_record record_type="AVC"> > <body_text>avc: denied { write } for pid=14302 comm="iptables-restor" path="pipe:[296248]" dev=pipefs ino=296248 scontext=system_u:system_r:iptables_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=fifo_file</body_text> > <event_id host="elijah.suretrak21.net" milli="867" seconds="1221825841" serial="3909"/> > </audit_record> > <audit_record record_type="AVC"> > <body_text>avc: denied { write } for pid=14302 comm="iptables-restor" path="pipe:[296248]" dev=pipefs ino=296248 scontext=system_u:system_r:iptables_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=fifo_file</body_text> > <event_id host="elijah.suretrak21.net" milli="867" seconds="1221825841" serial="3909"/> > </audit_record> > <audit_record record_type="SYSCALL"> > <body_text>arch=40000003 syscall=11 success=yes exit=0 a0=908f0a8 a1=908b898 a2=9072b98 a3=0 items=0 ppid=14167 pid=14302 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=628 comm="iptables-restor" exe="/sbin/iptables-restore" subj=system_u:system_r:iptables_t:s0 key=(null)</body_text> > <event_id host="elijah.suretrak21.net" milli="867" seconds="1221825841" serial="3909"/> > </audit_record> > </records> > </audit_event> > <environment version="1.0"> > <enforce>Enforcing</enforce> > <hostname>elijah.suretrak21.net</hostname> > <kernel>2.6.26.3-14.fc8 i686</kernel> > <platform>Fedora release 8 (Werewolf)</platform> > <policy_rpm>selinux-policy-3.0.8-115.fc8</policy_rpm> > <policy_type>targeted</policy_type> > <policyvers>23</policyvers> > <selinux_enabled>True</selinux_enabled> > <selinux_mls_enabled>True</selinux_mls_enabled> > <uname>Linux elijah.suretrak21.net 2.6.26.3-14.fc8 #1 SMP Wed Sep 3 03:40:05 EDT 2008 i686 i686</uname> > </environment> > <first_seen_date>2008-09-19T07:28:01Z</first_seen_date> > <host>elijah.suretrak21.net</host> > <last_seen_date>2008-09-19T12:04:01Z</last_seen_date> > <local_id>f1e1e880-e8d9-4bb5-9999-b43bdbc27903</local_id> > <report_count>21</report_count> > <scontext mls="s0" role="system_r" type="iptables_t" user="system_u"/> > <sig version="3.0"> > <access> > <operation>read</operation> > </access> > <analysis_id>catchall</analysis_id> > <host>elijah.suretrak21.net</host> > <scontext mls="s0" role="system_r" type="iptables_t" user="system_u"/> > <tclass>fifo_file</tclass> > <tcontext mls="s0-s0:c0.c1023" role="system_r" type="crond_t" user="system_u"/> > <tpath>pipe</tpath> > </sig> > <solution version="1.0"> > <fix_cmd></fix_cmd> > <fix_description><![CDATA[ > You can generate a local policy module to allow this > access - see <a href="http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385">FAQ</a> > Or you can disable SELinux protection altogether. Disabling > SELinux protection is not recommended. > Please file a <a href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug report</a> > against this package. > ]]></fix_description> > <problem_description><![CDATA[ > > SELinux denied access requested by iptables-restor. It is not > expected that this access is required by iptables-restor and this access > may signal an intrusion attempt. It is also possible that the specific > version or configuration of the application is causing it to require > additional access. > > ]]></problem_description> > <summary><![CDATA[ > SELinux is preventing iptables-restor (iptables_t) "read" to pipe (crond_t). > ]]></summary> > </solution> > <source>iptables</source> > <spath>/sbin/iptables</spath> > <src_rpm_list> > <rpm>iptables-1.4.1.1-2.fc8</rpm> > </src_rpm_list> > <tclass>fifo_file</tclass> > <tcontext mls="s0-s0:c0.c1023" role="system_r" type="crond_t" user="system_u"/> > <tpath>pipe</tpath> > </siginfo> > </signature_list> > <users version="1.0"> > <user_list> > <user username="jrg3" version="1.0"> > <email_alert>False</email_alert> > </user> > <user username="root" version="1.0"> > <email_alert>False</email_alert> > </user> > </user_list> > </users> ></sigs>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 462913
: 317211 |
317382