|
提示信息如下:
Summary
SELinux is preventing /usr/sbin/vsftpd (ftpd_t) "execute" to unix_update
(updpwd_exec_t).
Detailed Description
SELinux denied access requested by /usr/sbin/vsftpd. It is not expected that
this access is required by /usr/sbin/vsftpd and this access may signal an
intrusion attempt. It is also possible that the specific version or
configuration of the application is causing it to require additional access.
Allowing Access
Sometimes labeling problems can cause SELinux denials. You could try to
restore the default system file context for unix_update, restorecon -v
unix_update If this does not work, there is currently no automatic way to
allow this access. Instead, you can generate a local policy module to allow
this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385
Or you can disable SELinux protection altogether. Disabling SELinux
protection is not recommended. Please file a
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package.
Additional Information
Source Context system_u:system_r:ftpd_t
Target Context system_u: object_r:updpwd_exec_t
Target Objects unix_update [ file ]
Affected RPM Packages vsftpd-2.0.5-16.fc7 [application]
Policy RPM selinux-policy-2.6.4-14.fc7
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name plugins.catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain 2.6.21-1.3228.fc7 #1
SMP Tue Jun 12 15:37:31 EDT 2007 i686 i686
Alert Count 3
First Seen Wed 27 Jun 2007 12:07:09 AM CST
Last Seen Wed 27 Jun 2007 12:39:03 AM CST
Local ID 1f355ccc-d090-4b0e-b438-0f8234a13136
Line Numbers
Raw Audit Messages
avc: denied { execute } for comm="vsftpd" dev=dm-0 egid=0 euid=0
exe="/usr/sbin/vsftpd" exit=-13 fsgid=0 fsuid=0 gid=0 items=0 name="unix_update"
pid=4565 scontext=system_u:system_r:ftpd_t:s0 sgid=0
subj=system_u:system_r:ftpd_t:s0 suid=0 tclass=file
tcontext=system_u: object_r:updpwd_exec_t:s0 tty=(none) uid=0
如题,在线等候. |
|