Additional info: libreport version: 2.0.18 kernel: 3.6.6-1.fc17.x86_64 description: :SELinux is preventing /usr/bin/xauth from 'open' accesses on the file /tmp/.XauthcmMUfc. : :***** Plugin catchall (100. confidence) suggests *************************** : :If cree que de manera predeterminada, xauth debería permitir acceso open sobre .XauthcmMUfc file. :Then debería reportar esto como un error. :Puede generar un módulo de política local para permitir este acceso. :Do :permita el acceso momentáneamente executando: :# grep xauth /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:xauth_t:s0 :Target Context system_u:object_r:initrc_tmp_t:s0 :Target Objects /tmp/.XauthcmMUfc [ file ] :Source xauth :Source Path /usr/bin/xauth :Port <Desconocido> :Host (removed) :Source RPM Packages xorg-x11-xauth-1.0.7-1.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-159.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.6.6-1.fc17.x86_64 #1 SMP Mon Nov : 5 21:59:35 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen 2012-11-16 22:48:20 CST :Last Seen 2012-11-16 22:48:20 CST :Local ID 401e8e66-2f7f-4a63-80b3-b177128c1002 : :Raw Audit Messages :type=AVC msg=audit(1353127700.768:97): avc: denied { open } for pid=2068 comm="xauth" path="/tmp/.XauthcmMUfc" dev="sda2" ino=4149 scontext=unconfined_u:unconfined_r:xauth_t:s0 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=file : : :type=SYSCALL msg=audit(1353127700.768:97): arch=x86_64 syscall=open success=no exit=EACCES a0=7fff4b0a232d a1=0 a2=1b6 a3=238 items=0 ppid=2061 pid=2068 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=pts0 ses=1 comm=xauth exe=/usr/bin/xauth subj=unconfined_u:unconfined_r:xauth_t:s0 key=(null) : :Hash: xauth,xauth_t,initrc_tmp_t,file,open : :audit2allow : :#============= xauth_t ============== :allow xauth_t initrc_tmp_t:file open; : :audit2allow -R : :#============= xauth_t ============== :allow xauth_t initrc_tmp_t:file open; :
Created attachment 646697 [details] File: type
Created attachment 646698 [details] File: hashmarkername
*** This bug has been marked as a duplicate of bug 877597 ***