Bug 666179
Summary: | sealert suggests a command that fails | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Michael Schwendt <bugs.michael> |
Component: | setroubleshoot | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 14 | CC: | dgates, dwalsh, gavinflower, mgrepl |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2011-01-03 11:34:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Michael Schwendt
2010-12-29 11:54:28 UTC
Every suggestion from 'sealert' that I have attempted has failed, for example (note that the underlying problem with 'cachemgr.cgi' has been raised as a separate bug report): # sealert -l 3c1a7e4a-f196-40da-9cf0-7a57f541f5da SELinux is preventing /var/www/cgi-bin/cachemgr.cgi from search access on the directory /etc/squid. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that cachemgr.cgi should be allowed search access on the squid directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep /var/www/cgi-bin/cachemgr.cgi /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp # grep /var/www/cgi-bin/cachemgr.cgi /var/log/audit/audit.log | audit2allow -M mypol compilation failed: mypol.te:6:ERROR 'syntax error' at token '' on line 6: /usr/bin/checkmodule: error(s) encountered while parsing configuration /usr/bin/checkmodule: loading policy configuration from mypol.te # I have just had the same problem. I tried to make a security policy to allow sendmail on port 26 in the past, but it has not worked. Today there was an update of many files by yum, and then I found the similar suggestion. You should report this as a bug. You can generate a local policy module to allow this access. Allow this access for now by executing: # grep /usr/sbin/sendmail.sendmail /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp But following the command failed [root@PC146 ~]# grep /usr/sbin/sendmail.sendmail /var/log/audit/audit.log | audit2allow -M mypol compilation failed: mypol.te:6:ERROR 'syntax error' at token '' on line 6: /usr/bin/checkmodule: error(s) encountered while parsing configuration /usr/bin/checkmodule: loading policy configuration from mypol.te [clearing NEEDINFO state set by mistake] *** This bug has been marked as a duplicate of bug 665505 *** |