Podsumowanie: SELinux is preventing /usr/bin/gmplayer from making the program stack executable. Szczegółowy opis: [SELinux jest w trybie zezwalania. Ten dostęp nie został odmówiony.] The gmplayer application attempted to make its stack executable. This is a potential security problem. This should never ever be necessary. Stack memory is not executable on most OSes these days and this will not change. Executable stack memory is one of the biggest security problems. An execstack error might in fact be most likely raised by malicious code. Applications are sometimes coded incorrectly and request this permission. The SELinux Memory Protection Tests (http://people.redhat.com/drepper/selinux-mem.html) web page explains how to remove this requirement. If gmplayer does not work and you need it to work, you can configure SELinux temporarily to allow this access until the application is fixed. Please file a bug report. Zezwalanie na dostęp: Sometimes a library is accidentally marked with the execstack flag, if you find a library with this flag you can clear it with the execstack -c LIBRARY_PATH. Then retry your application. If the app continues to not work, you can turn the flag back on with execstack -s LIBRARY_PATH. Otherwise, if you trust gmplayer to run correctly, you can change the context of the executable to execmem_exec_t. "chcon -t execmem_exec_t '/usr/bin/gmplayer'" You must also change the default file context files on the system in order to preserve them even on a full relabel. "semanage fcontext -a -t execmem_exec_t '/usr/bin/gmplayer'" Polecenie naprawy: chcon -t execmem_exec_t '/usr/bin/gmplayer' Dodatkowe informacje: Kontekst źródłowy unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Kontekst docelowy unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Obiekty docelowe None [ process ] Źródło VBoxTestOGL Ścieżka źródłowa /usr/lib/virtualbox/VBoxTestOGL Port <Nieznane> Komputer (removed) Źródłowe pakiety RPM mplayer-gui-1.0-0.111.20091029svn.fc12 Docelowe pakiety RPM Pakiet RPM polityki selinux-policy-3.6.32-41.fc12 SELinux jest włączony True Typ polityki targeted MLS jest włączone True Tryb wymuszania Permissive Nazwa wtyczki allow_execstack Nazwa komputera (removed) Platforma Linux (removed) 2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7 21:25:57 EST 2009 i686 i686 Liczba alarmów 12 Po raz pierwszy wto, 17 lis 2009, 08:13:51 Po raz ostatni śro, 18 lis 2009, 15:49:48 Lokalny identyfikator 1afee6fc-36f3-4b90-a4fe-d5d41309f90c Liczba wierszy Surowe komunikaty audytu node=(removed) type=AVC msg=audit(1258555788.910:17): avc: denied { execstack } for pid=2333 comm="gmplayer" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process node=(removed) type=SYSCALL msg=audit(1258555788.910:17): arch=40000003 syscall=125 success=yes exit=0 a0=bfc92000 a1=1000 a2=1000007 a3=bfc924b8 items=0 ppid=1633 pid=2333 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="gmplayer" exe="/usr/bin/gmplayer" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-41.fc12,allow_execstack,VBoxTestOGL,unconfined_t,unconfined_t,process,execstack audit2allow suggests: #============= unconfined_t ============== allow unconfined_t self:process execstack;
*** This bug has been marked as a duplicate of bug 533987 ***