On Fri, 9 Jul 2004, Stephen Smalley wrote:
On Fri, 2004-07-09 at 10:18, Kirk Vogelsang wrote:
Having a problem w/ sudo now however:
$ rpm -q selinux-policy-strict sudo selinux-policy-strict-1.14.1-2 sudo-1.6.7p5-27 $ id uid=600(admin) gid=600(admin) groups=10(wheel),600(admin) context=user_u:user_r:user_t $ sudo sh sudo: unable to exec /usr/sbin/sesh: Permission denied $ dmesg audit(1089381994.953:0): avc: denied { execute_no_trans } for pid=845 exe=/usr/bin/sudo path=/usr/sbin/sesh dev=sda3 ino=32091 scontext=user_u:user_r:user_sudo_t tcontext=system_u:object_r:shell_exec_t tclass=file
I receive the same results if running in staff_r or sysadm_r as well.
sudo is presently broken; the SELinux patch and policy for it are being reworked. Hopefully there will be something newer in rawhide soon.
Thanx once again Stephen...
----- Kirk M. Vogelsang kvogelsa@ccs.neu.edu Northeastern University College of Computer Science