From Bugzilla Helper: User-Agent: Mozilla/5.0 (compatible; Konqueror/3.2; Linux) (KHTML, like Gecko) Description of problem: audit(1079007629.554:0): avc: denied { read } for pid=2098 exe=/usr/bin/kdm name=mem dev=hda2 ino=2683359 scontext=system_u:system_r:xdm_t tcontext=system_u:object_r:memory_device_t tclass=chr_file Above is an AVC message reported by a Fedora SE Linux user. It shows that kdm is accessing /dev/mem. I believe that this is the old "use kernel memory as source of random numbers" thing, it should be replaced by use of /dev/random. There is no reason why kdm (or any xdm type program) should directly access /dev/mem. Allowing kdm to access /dev/mem allows it to entirely break the system's security if it is compromised. Version-Release number of selected component (if applicable): How reproducible: Always Steps to Reproduce: Just run kdm. It's easy to observe on SE Linux, but when not running SE Linux strace should show it. Additional info:
*** This bug has been marked as a duplicate of 118051 ***
Changed to 'CLOSED' state since 'RESOLVED' has been deprecated.