List of avc for fedora 16
David Highley
dhighley at highley-recommended.com
Sat Sep 24 03:10:25 UTC 2011
I checked bugzilla but did not see anything about this list of avc
alerts for fedora 16. Should they be reported or is something miss
configured?
#============= accountsd_t ==============
#!!!! This avc is allowed in the current policy
allow accountsd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow accountsd_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy
allow accountsd_t var_yp_t:dir search;
#============= automount_t ==============
#!!!! This avc is allowed in the current policy
allow automount_t var_yp_t:file read;
#============= policykit_t ==============
#!!!! This avc is allowed in the current policy
allow policykit_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow policykit_t kerberos_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow policykit_t kprop_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow policykit_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy
allow policykit_t var_yp_t:dir search;
#============= sshd_t ==============
#!!!! This avc is allowed in the current policy
allow sshd_t ftp_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow sshd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow sshd_t hi_reserved_port_t:udp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow sshd_t spamd_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow sshd_t var_yp_t:dir search;
#============= system_dbusd_t ==============
#!!!! This avc is allowed in the current policy
allow system_dbusd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow system_dbusd_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy
allow system_dbusd_t rndc_port_t:tcp_socket name_bind;
#============= xdm_dbusd_t ==============
#!!!! This avc is allowed in the current policy
allow xdm_dbusd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy
allow xdm_dbusd_t portmap_port_t:tcp_socket name_connect;
More information about the selinux
mailing list