|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21573/root/usr/share/setroubleshoot/plugins/ |
Upload File : |
mò
¡8Hc @ sR d k Z e i d d d e ƒi Z d k Td k l Z d e f d „ ƒ YZ d S( Ns setroubleshoot-pluginss /usr/share/localet fallback( t *( s Plugint pluginc B sD t Z e d ƒ Z e d ƒ Z e d ƒ Z d Z d „ Z d „ Z RS( NsV
SELinux prevented the CVS application from reading the shadow password file.
sÓ
SELinux prevented the CVS application from reading the shadow password file.
The CVS application requires this access when it is configured for direct
connection (i.e., pserver) and to authenticate to the system password / shadow
files without PAM. It is possible that this access request signals an intrusion
attempt.
It is recommended that CVS be configured to use PAM, authenticate to a separate
user file, or use another protocol (e.g., ssh) instead of allowing this access.
See the CVS manual for more details on why this access is potentially insecure
(<a href="http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html">http://ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html</a>).
sg
Changing the "$BOOLEAN" boolean to true will allow this access:
"setsebool -P $BOOLEAN=1"
s setsebool -P $BOOLEAN=1c C s t i | t ƒ d S( N( t Plugint __init__t selft __name__( R ( ( t: /usr/share/setroubleshoot/plugins/allow_cvs_read_shadow.pyR 4 s c C sp | i d g ƒ oU | i d g ƒ oB | i d d ƒ | i | t d ƒ | i | i | i | i
ƒ Sn d Sd S( Nt cvs_tt shadow_tt BOOLEANt allow_cvs_read_shadowt CVS( t avct matches_source_typest matches_target_typest set_template_substitutionsR t reportt _t summaryt problem_descriptiont fix_descriptiont fix_cmdt None( R R
( ( R t analyze7 s &( R t
__module__R R R R R R R ( ( ( R R s
( t gettextt translationt Truet lgettextR t setroubleshoot.utilt setroubleshoot.PluginR R ( R R R R ( ( R t ? s