Bug 857161 - Screen does not work for staff_u
Summary: Screen does not work for staff_u
Keywords:
Status: CLOSED NEXTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 17
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-09-13 17:25 UTC by Casey Dahlin
Modified: 2014-06-18 08:47 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2013-07-04 09:32:55 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
Comment (1.24 MB, text/plain)
2012-09-27 00:24 UTC, Casey Dahlin
no flags Details

Description Casey Dahlin 2012-09-13 17:25:51 UTC
strace and other tools seem to be failing since I began running my user as staff_u. Looking for ptrace privileges I see this:

[cdahlin@fearengine linus-tree ((v2.6.21))]$ sesearch -A -s staff_t -p ptrace -C
Found 7 semantic av rules:
EF allow staff_t mock_t : process ptrace ; [ deny_ptrace ]
EF allow staff_usertype git_session_t : process ptrace ; [ deny_ptrace ]
EF allow staff_t crontab_t : process ptrace ; [ deny_ptrace ]
EF allow staff_t polipo_session_t : process ptrace ; [ deny_ptrace ]
EF allow staff_usertype staff_usertype : process ptrace ; [ deny_ptrace ]
EF allow staff_t bluetooth_helper_t : process ptrace ; [ deny_ptrace ]
EF allow staff_usertype staff_dbusd_t : process ptrace ; [ deny_ptrace ]


Another Fedora user has told me that he has an 8th rule:

allow staff_usertype staff_usertype : process ptrace ;

I've not made any manual policy changes that I can recall, though this box has been preupgraded between several releases.

Comment 1 Casey Dahlin 2012-09-13 21:34:00 UTC
Hmm, the rule I thought was missing is in there on second scan. I'll reverify the symptom itself. I definitely couldn't seem to run strace as staff_u

Comment 2 Miroslav Grepl 2012-09-14 08:49:18 UTC
If you want to make this working, you need to turn off "deny_ptrace" boolean.

Comment 3 Casey Dahlin 2012-09-17 17:26:53 UTC
[cdahlin@fearengine ~]$ sudo semanage boolean -l |grep ptrace
deny_ptrace                    (off  ,  off)  Allow sysadm to debug or ptrace all processes.

Comment 4 Casey Dahlin 2012-09-17 20:58:42 UTC
On further investigation, this seems only to affect irssi, which also refuses to run. No audit message is generated, but switching to unconfined_t fixes the problem.


[cdahlin@fearengine linus-tree (master)]$ irssi

** (irssi:22765): ERROR **: Couldn't create /home/rdu/cdahlin/.irssi directory
Trace/breakpoint trap
[cdahlin@fearengine linus-tree (master)]$ strace irssi
execve("/usr/bin/irssi", ["irssi"], [/* 57 vars */]) = -1 EPERM (Operation not permitted)
write(2, "strace: exec: Operation not perm"..., 38strace: exec: Operation not permitted
) = 38
exit_group(1)                           = ?
+++ exited with 1 +++
[cdahlin@fearengine linus-tree (master)]$ ls -lZ `which irssi`
-rwxr-xr-x. root root system_u:object_r:irssi_exec_t:s0 /usr/bin/irssi
[cdahlin@fearengine linus-tree (master)]$ sudo audit2allow -laR
[sudo] password for cdahlin:

require {
        type ypbind_t;
}

#============= ypbind_t ==============
files_read_etc_runtime_files(ypbind_t)

Comment 5 Daniel Walsh 2012-09-17 23:01:30 UTC
So the error here is that staff_t is not able to ptrace irssi_t.

You need to run restorecon -R -v /home/

To fix the label of ~/.irssi

What file is ypbind_t trying to read?

Comment 6 Casey Dahlin 2012-09-18 05:35:20 UTC
Now irssi runs but spouts this when trying to connect:

01:27 [redhat] -!- Irssi: Unable to connect server memochan.usersys.redhat.com port 6697 [Permission denied]

As for ypbind:

[cdahlin@fearengine ~]$ ls -lZ /etc/yp.conf 
-rw-r--r--. root root system_u:object_r:net_conf_t:s0  /etc/yp.conf
[cdahlin@fearengine ~]$ sudo cat /var/log/audit/audit.log |grep AVC |tail
type=AVC msg=audit(1323811720.314:26): avc:  denied  { read } for  pid=1145 comm="ypbind" name="yp.conf" dev=dm-0 ino=595 scontext=system_u:system_r:ypbind_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file

Not sure how long that AVC has been sitting there. Could be stale. Restarting ypbind seems to clear it.

Why wasn't the irssi issue generating AVCs? I'd tried disabling dontaudit rules and it was still quiet (not to mention why wouldn't we be auditing unauthorized uses of ptrace?)

Comment 7 Casey Dahlin 2012-09-18 05:44:21 UTC
Hmm. Looks like irssi can connect now. Can't write log files to my ~/irclogs folder anymore though. I think that's an app default since I can't seem to find it in my configs, but I can at least see why the labeling would prevent it. Relabeling temporarily until I can decide if I want a policy module for it.

Comment 8 Casey Dahlin 2012-09-18 06:14:11 UTC
At home, screen is the weird app.

[sadmac@foucault ~]$ screen
[screen is terminating]

I can't figure out how to get anything else out of it. Again, no AVCs but works in unconfined_t or with setenforce off.

Comment 9 Daniel Walsh 2012-09-18 12:29:51 UTC
semodule -DB

Will turn off dontaudit rules to get all AVC messages.

semodule -B

Will turn it back on.

I added 6697 as an ircd_port_t in F18, which will allow this access.  I also added labelling to ~/irclogs as irc_home_t.

The screen problem is a different issue.  Thanks for testing.

Comment 10 Casey Dahlin 2012-09-27 00:24:56 UTC
Created attachment 915495 [details]
Comment

(This comment was longer than 65,535 characters and has been moved to an attachment by Red Hat Bugzilla).

Comment 11 Casey Dahlin 2012-09-27 00:29:18 UTC
Wow, that was long. Here's a snipped version:

[sadmac@foucault ~]$ sudo audit2allow -laR
<Bunch of errors, no AVCs>


[sadmac@foucault ~]$ sudo semodule -DB
[sadmac@foucault ~]$ screen
[screen is terminating]
[sadmac@foucault ~]$ sudo audit2allow -laR
<Bunch of errors, no AVCs>


[sadmac@foucault ~]$ sudo setenforce 0
[sadmac@foucault ~]$ screen
<screen runs>

Comment 12 Daniel Walsh 2012-09-27 14:39:32 UTC
It looks like you have a lot of avc's about unconfined_execmem_t which no longer exists.

I think your machine might be mislabeled.  I would attempt

touch /.autorelabel; reboot

Comment 13 Casey Dahlin 2012-09-27 15:08:13 UTC
I relabeled. Things persist as they did before.

Comment 14 Miroslav Grepl 2012-09-27 17:32:56 UTC
Could you try to reinstall selinux-policy-targeted

# yum reinstall selinux-policy-targeted
# grep invalid /var/log/messages

Comment 15 Casey Dahlin 2012-09-27 19:18:23 UTC
None of this looks particularly relevant:

[sadmac@foucault ~]$ sudo grep invalid /var/log/messages
Sep 23 19:04:54 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 23 19:04:54 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 23 19:04:55 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 23 19:04:55 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 25 03:35:11 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 25 03:35:11 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 25 09:25:48 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 25 09:25:48 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 26 20:02:27 foucault udevd[410]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 26 20:02:27 foucault udevd[410]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 26 20:02:27 foucault kernel: [   10.457364] ALSA sound/usb/stream.c:200 6:1:1 : no or invalid class specific endpoint descriptor
Sep 26 20:02:27 foucault kernel: [   10.458389] ALSA sound/usb/stream.c:200 6:2:1 : no or invalid class specific endpoint descriptor
Sep 27 10:55:07 foucault udevd[402]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3'
Sep 27 10:55:07 foucault udevd[402]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5'
Sep 27 10:55:07 foucault kernel: [   11.073112] ALSA sound/usb/stream.c:200 6:1:1 : no or invalid class specific endpoint descriptor
Sep 27 10:55:07 foucault kernel: [   11.074262] ALSA sound/usb/stream.c:200 6:2:1 : no or invalid class specific endpoint descriptor

Comment 16 Miroslav Grepl 2012-12-15 20:10:14 UTC
Are you still getting this?

Comment 17 Casey Dahlin 2012-12-19 19:18:00 UTC
Tested again just now:

[sadmac@foucault ~]$ screen
[screen is terminating]
[sadmac@foucault ~]$ strace screen
execve("/usr/bin/screen", ["screen"], [/* 36 vars */]) = -1 EPERM (Operation not permitted)
write(2, "strace: exec: Operation not perm"..., 38strace: exec: Operation not permitted
) = 38
exit_group(1)                           = ?
+++ exited with 1 +++
[sadmac@foucault ~]$ id -Z
staff_u:staff_r:staff_t:s0-s0:c0.c1023

Comment 18 Daniel Walsh 2012-12-19 19:52:49 UTC
What AVC did you get?

Comment 19 Casey Dahlin 2012-12-20 03:39:28 UTC
None. Logs are empty. But, setenforce 0 causes things to start working.

Comment 20 Daniel Walsh 2012-12-20 14:22:14 UTC
3a4c7f6c870ab812b290e98f168a745f18a10264 fixes this for F18.

Comment 21 Miroslav Grepl 2012-12-20 21:49:51 UTC
commit 797c3a313b67114ddd85a5688782b0646b4fcf91
Author: Miroslav Grepl <mgrepl>
Date:   Thu Dec 20 22:48:35 2012 +0100

    Allow confine users to ptrace screen

Comment 22 Fedora Update System 2013-01-03 13:05:22 UTC
selinux-policy-3.10.0-166.fc17 has been submitted as an update for Fedora 17.
https://admin.fedoraproject.org/updates/FEDORA-2012-20544/selinux-policy-3.10.0-166.fc17

Comment 23 Fedora Update System 2013-01-05 06:37:23 UTC
Package selinux-policy-3.10.0-166.fc17:
* should fix your issue,
* was pushed to the Fedora 17 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-166.fc17'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2012-20544/selinux-policy-3.10.0-166.fc17
then log in and leave karma (feedback).

Comment 24 Casey Dahlin 2013-01-05 11:31:54 UTC
Fixes the central issue. Screen still isn't working, but I can trace it now.

Comment 25 Daniel Walsh 2013-01-05 11:53:15 UTC
Does screen work in permissive mode?

Comment 26 Casey Dahlin 2013-01-05 12:20:39 UTC
It works with setenforce 0. I'll try permissive mode if you think that'll make a difference.

strace seems to be pointing to trouble running /usr/libexec/pt_chown

Comment 27 Casey Dahlin 2013-01-05 12:23:29 UTC
Yes it works in permissive mode. Tested with echo 0 > /sys/fs/selinux/enforce

Comment 28 Daniel Walsh 2013-01-06 13:18:37 UTC
If you are not getting AVC's could you try with 

# semodule -DB

Run screen tests in permissive mode

# semodule -B
# ausearch -m avc -ts recent

Comment 29 Fedora Update System 2013-01-07 03:57:18 UTC
selinux-policy-3.10.0-166.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 30 Casey Dahlin 2013-01-07 12:33:13 UTC
Reopening for the screen issue. If you want to move to a new bug that's ok too.

Comment 31 Casey Dahlin 2013-01-07 12:43:14 UTC
[sadmac@foucault ~]$ sudo semodule -DB
[sudo] password for sadmac: 
[sadmac@foucault ~]$ sudo su -
[root@foucault ~]# echo 0 > /sys/fs/selinux/enforce 
[root@foucault ~]# exit
logout
[sadmac@foucault ~]$ screen
[screen is terminating] <<<<<<<<<<<<< Screen ran correctly here
[sadmac@foucault ~]$ sudo semodule -B
[sudo] password for sadmac: 
[sadmac@foucault ~]$ sudo ausearch -m avc -ts recent
<no matches>
[sadmac@foucault ~]$ sudo su -
[root@foucault ~]# echo 1 > /sys/fs/selinux/enforce 
[root@foucault ~]# exit
logout
[sadmac@foucault ~]$ screen
[screen is terminating] <<<<<<<<<<<<< Screen did not run correctly here
[sadmac@foucault ~]$ sudo ausearch -m avc -ts recent
[sudo] password for sadmac: 
<no matches>
[sadmac@foucault ~]$

Comment 32 Daniel Walsh 2013-01-07 19:13:58 UTC
Looks like audit is not running on your machine?

systemctl start auditd

As root what does id show?

id -Z

Comment 33 Casey Dahlin 2013-01-08 15:51:21 UTC
[sadmac@foucault ~]$ id -Z
staff_u:staff_r:staff_t:s0-s0:c0.c1023
[sadmac@foucault ~]$ sudo id -Z
[sudo] password for sadmac: 
staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023

Turned on auditd. Ran the test again:

[sadmac@foucault ~]$ sudo semodule -DB
[sadmac@foucault ~]$ sudo su -
[root@foucault ~]# echo 0 > /sys/fs/selinux/enforce 
[root@foucault ~]# exit
logout
[sadmac@foucault ~]$ screen
[screen is terminating] # Ran correctly
[sadmac@foucault ~]$ sudo semodule -B
[sudo] password for sadmac: 
[sadmac@foucault ~]$ sudo ausearch -m avc -ts recent
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.645:6405): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff91f783a0 a2=40000000 a3=4000 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.645:6405): avc:  denied  { read } for  pid=7861 comm="sudo" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.642:6404): arch=c000003e syscall=59 success=yes exit=0 a0=118d640 a1=10f43e0 a2=1189b10 a3=20 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.642:6404): avc:  denied  { noatsecure } for  pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.642:6404): avc:  denied  { siginh } for  pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.642:6404): avc:  denied  { rlimitinh } for  pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.648:6406): arch=c000003e syscall=47 success=yes exit=14 a0=5 a1=7fff91f79200 a2=40000000 a3=4000 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.648:6406): avc:  denied  { read } for  pid=7861 comm="sudo" path="/var/db/nscd/group" dev="dm-0" ino=968 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.650:6407): arch=c000003e syscall=59 success=yes exit=0 a0=189a9a0 a1=189a8c0 a2=189a010 a3=1 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.650:6407): avc:  denied  { noatsecure } for  pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.650:6407): avc:  denied  { siginh } for  pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.650:6407): avc:  denied  { rlimitinh } for  pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.864:6412): arch=c000003e syscall=59 success=yes exit=0 a0=7f73a9a06a33 a1=7f73aaf83950 a2=7f73aaf8a3e0 a3=20 items=0 ppid=7861 pid=7864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 ses=1722 comm="sesh" exe="/usr/libexec/sesh" subj=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.864:6412): avc:  denied  { noatsecure } for  pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.864:6412): avc:  denied  { siginh } for  pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659922.864:6412): avc:  denied  { rlimitinh } for  pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:22 2013
type=SYSCALL msg=audit(1357659922.938:6413): arch=c000003e syscall=47 success=yes exit=15 a0=4 a1=7fffefe33170 a2=40000000 a3=4000 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659922.938:6413): avc:  denied  { read } for  pid=7863 comm="setroubleshootd" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:24 2013
type=SYSCALL msg=audit(1357659924.122:6418): arch=c000003e syscall=47 success=yes exit=14 a0=9 a1=7fffefe23260 a2=40000000 a3=4000 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659924.122:6418): avc:  denied  { read } for  pid=7863 comm="setroubleshootd" path="/var/db/nscd/hosts" dev="dm-0" ino=1088 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:24 2013
type=SYSCALL msg=audit(1357659924.523:6419): arch=c000003e syscall=2 success=no exit=-13 a0=24c1b60 a1=2 a2=0 a3=16 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659924.523:6419): avc:  denied  { write } for  pid=7863 comm="setroubleshootd" name="__db.001" dev="dm-0" ino=1154 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file
----
time->Tue Jan  8 10:45:25 2013
type=SYSCALL msg=audit(1357659925.562:6420): arch=c000003e syscall=47 success=yes exit=14 a0=3 a1=7fffefe37360 a2=40000000 a3=4000 items=0 ppid=1 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659925.562:6420): avc:  denied  { read } for  pid=7863 comm="setroubleshootd" path="/var/db/nscd/group" dev="dm-0" ino=968 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.891:6427): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffc5185020 a2=40000000 a3=4000 items=0 ppid=7639 pid=7892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=pts7 ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.891:6427): avc:  denied  { read } for  pid=7892 comm="screen" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.887:6426): arch=c000003e syscall=59 success=yes exit=0 a0=117a6f0 a1=118d1a0 a2=1189b10 a3=10 items=0 ppid=7639 pid=7892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=pts7 ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.887:6426): avc:  denied  { noatsecure } for  pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659940.887:6426): avc:  denied  { siginh } for  pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659940.887:6426): avc:  denied  { rlimitinh } for  pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.894:6428): arch=c000003e syscall=160 success=yes exit=0 a0=4 a1=7fffc5183c60 a2=3f501b2b80 a3=7fdf8709ba10 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.894:6428): avc:  denied  { setrlimit } for  pid=7894 comm="screen" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.895:6429): arch=c000003e syscall=59 success=yes exit=0 a0=3f4ff77c8e a1=7fffc51817b0 a2=0 a3=6 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.895:6429): avc:  denied  { execute_no_trans } for  pid=7894 comm="screen" path="/usr/libexec/pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file
type=AVC msg=audit(1357659940.895:6429): avc:  denied  { read open } for  pid=7894 comm="screen" path="/usr/libexec/pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file
type=AVC msg=audit(1357659940.895:6429): avc:  denied  { execute } for  pid=7894 comm="screen" name="pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.914:6430): arch=c000003e syscall=92 success=yes exit=0 a0=7f11aa5d2c80 a1=1f4 a2=5 a3=7f11aa995656 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.914:6430): avc:  denied  { chown } for  pid=7894 comm="pt_chown" capability=0  scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=capability
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.916:6431): arch=c000003e syscall=59 success=yes exit=0 a0=1bfa1f0 a1=66f210 a2=1c0ab80 a3=6c616e696d726574 items=0 ppid=7893 pid=7895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 ses=1722 comm="bash" exe="/usr/bin/bash" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.916:6431): avc:  denied  { noatsecure } for  pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659940.916:6431): avc:  denied  { siginh } for  pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659940.916:6431): avc:  denied  { rlimitinh } for  pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.918:6432): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffc8229aa0 a2=40000000 a3=4000 items=0 ppid=7893 pid=7895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 ses=1722 comm="bash" exe="/usr/bin/bash" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.918:6432): avc:  denied  { read } for  pid=7895 comm="bash" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.915:6433): arch=c000003e syscall=59 success=yes exit=0 a0=3f50200cf8 a1=7fffc5184b20 a2=7fffc5186658 a3=7fdf8709ba10 items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.915:6433): avc:  denied  { read write } for  pid=7896 comm="utempter" path="socket:[309528677]" dev="sockfs" ino=309528677 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=unix_stream_socket
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.935:6434): arch=c000003e syscall=2 success=yes exit=7 a0=3f4ff77c62 a1=80002 a2=3f4ff77c62 a3=d items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.935:6434): avc:  denied  { write } for  pid=7896 comm="utempter" name="utmp" dev="tmpfs" ino=12747 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.935:6435): arch=c000003e syscall=2 success=yes exit=6 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.935:6435): avc:  denied  { write } for  pid=7896 comm="utempter" name="wtmp" dev="dm-0" ino=18404 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file
----
time->Tue Jan  8 10:45:40 2013
type=SYSCALL msg=audit(1357659940.966:6436): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff645d1980 a2=40000000 a3=4000 items=0 ppid=7863 pid=7915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="sh" exe="/usr/bin/bash" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659940.966:6436): avc:  denied  { read } for  pid=7915 comm="sh" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:45:44 2013
type=SYSCALL msg=audit(1357659944.098:6438): arch=c000003e syscall=2 success=yes exit=6 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=7893 pid=7933 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659944.098:6438): avc:  denied  { write } for  pid=7933 comm="utempter" name="wtmp" dev="dm-0" ino=18404 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file
----
time->Tue Jan  8 10:45:44 2013
type=SYSCALL msg=audit(1357659944.098:6437): arch=c000003e syscall=2 success=yes exit=7 a0=3f4ff77c62 a1=80002 a2=3f4ff77c62 a3=d items=0 ppid=7893 pid=7933 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659944.098:6437): avc:  denied  { write } for  pid=7933 comm="utempter" name="utmp" dev="tmpfs" ino=12747 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:46:34 2013
type=SYSCALL msg=audit(1357659994.468:6440): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffb1919520 a2=40000000 a3=4000 items=0 ppid=7639 pid=7945 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659994.468:6440): avc:  denied  { read } for  pid=7945 comm="sudo" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:46:34 2013
type=SYSCALL msg=audit(1357659994.466:6439): arch=c000003e syscall=59 success=yes exit=0 a0=10f83c0 a1=10ed3f0 a2=1189b10 a3=20 items=0 ppid=7639 pid=7945 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659994.466:6439): avc:  denied  { noatsecure } for  pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.466:6439): avc:  denied  { siginh } for  pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.466:6439): avc:  denied  { rlimitinh } for  pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:46:34 2013
type=SYSCALL msg=audit(1357659994.483:6441): arch=c000003e syscall=59 success=yes exit=0 a0=1d85870 a1=1d85800 a2=1d85010 a3=15 items=0 ppid=7946 pid=7947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="fprintd" exe="/usr/libexec/fprintd" subj=system_u:system_r:fprintd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659994.483:6441): avc:  denied  { noatsecure } for  pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.483:6441): avc:  denied  { siginh } for  pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.483:6441): avc:  denied  { rlimitinh } for  pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process
----
time->Tue Jan  8 10:46:34 2013
type=SYSCALL msg=audit(1357659994.496:6442): arch=c000003e syscall=59 success=yes exit=0 a0=7f2a99b9bc78 a1=7fffb191a210 a2=7f2a99da2368 a3=7 items=0 ppid=7945 pid=7948 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659994.496:6442): avc:  denied  { noatsecure } for  pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.496:6442): avc:  denied  { siginh } for  pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.496:6442): avc:  denied  { rlimitinh } for  pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357659994.496:6442): avc:  denied  { read write } for  pid=7948 comm="unix_chkpwd" path="/dev/pts/7" dev="devpts" ino=10 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:user_devpts_t:s0 tclass=chr_file
----
time->Tue Jan  8 10:46:34 2013
type=SYSCALL msg=audit(1357659994.513:6443): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff849853a0 a2=40000000 a3=4000 items=0 ppid=7945 pid=7948 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357659994.513:6443): avc:  denied  { read } for  pid=7948 comm="unix_chkpwd" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file
----
time->Tue Jan  8 10:46:42 2013
type=SYSCALL msg=audit(1357660002.722:6445): arch=c000003e syscall=59 success=yes exit=0 a0=7f2a99b9bc78 a1=7fffb191a1a0 a2=7f2a99da2368 a3=7 items=0 ppid=7945 pid=7957 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357660002.722:6445): avc:  denied  { read write } for  pid=7957 comm="unix_chkpwd" path="/dev/pts/7" dev="devpts" ino=10 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:user_devpts_t:s0 tclass=chr_file
----
time->Tue Jan  8 10:46:42 2013
type=SYSCALL msg=audit(1357660002.743:6452): arch=c000003e syscall=59 success=yes exit=0 a0=7f2aa533ba33 a1=7f2aa5c09b80 a2=7f2aa5bed440 a3=20 items=0 ppid=7945 pid=7959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 ses=1722 comm="sesh" exe="/usr/libexec/sesh" subj=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1357660002.743:6452): avc:  denied  { noatsecure } for  pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357660002.743:6452): avc:  denied  { siginh } for  pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
type=AVC msg=audit(1357660002.743:6452): avc:  denied  { rlimitinh } for  pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process

Comment 34 Fedora End Of Life 2013-07-04 06:17:34 UTC
This message is a reminder that Fedora 17 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 17. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as WONTFIX if it remains open with a Fedora 
'version' of '17'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version prior to Fedora 17's end of life.

Bug Reporter:  Thank you for reporting this issue and we are sorry that 
we may not be able to fix it before Fedora 17 is end of life. If you 
would still like  to see this bug fixed and are able to reproduce it 
against a later version  of Fedora, you are encouraged  change the 
'version' to a later Fedora version prior to Fedora 17's end of life.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 35 Miroslav Grepl 2013-07-04 09:32:55 UTC
We have a lot of fixes in F18+. Closing this bug as NEXTRELEASE. Please re-open if you see this also on newer releases. Thank you.


Note You need to log in before you can comment on or make changes to this bug.