List of avc for fedora 16

David Highley dhighley at highley-recommended.com
Sat Sep 24 03:10:25 UTC 2011


I checked bugzilla but did not see anything about this list of avc
alerts for fedora 16. Should they be reported or is something miss
configured?


#============= accountsd_t ==============
#!!!! This avc is allowed in the current policy

allow accountsd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow accountsd_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy

allow accountsd_t var_yp_t:dir search;

#============= automount_t ==============
#!!!! This avc is allowed in the current policy

allow automount_t var_yp_t:file read;

#============= policykit_t ==============
#!!!! This avc is allowed in the current policy

allow policykit_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow policykit_t kerberos_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow policykit_t kprop_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow policykit_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy

allow policykit_t var_yp_t:dir search;

#============= sshd_t ==============
#!!!! This avc is allowed in the current policy

allow sshd_t ftp_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow sshd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow sshd_t hi_reserved_port_t:udp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow sshd_t spamd_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow sshd_t var_yp_t:dir search;

#============= system_dbusd_t ==============
#!!!! This avc is allowed in the current policy

allow system_dbusd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow system_dbusd_t portmap_port_t:tcp_socket name_connect;
#!!!! This avc is allowed in the current policy

allow system_dbusd_t rndc_port_t:tcp_socket name_bind;

#============= xdm_dbusd_t ==============
#!!!! This avc is allowed in the current policy

allow xdm_dbusd_t hi_reserved_port_t:tcp_socket name_bind;
#!!!! This avc is allowed in the current policy

allow xdm_dbusd_t portmap_port_t:tcp_socket name_connect;


More information about the selinux mailing list