|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21573/task/21573/root/usr/share/setroubleshoot/plugins/ |
Upload File : |
mň
Ą8Hc @ s5 d k Td k l Z d k Td e f d YZ d S( ( t *( s Plugint pluginc B sD t Z e d Z e d Z e d Z d Z d Z d Z RS( NsW
SELinux is preventing the $SOURCE ($SOURCE_TYPE) from executing $TARGET_PATH.
s
SELinux has denied the $SOURCE from executing $TARGET_PATH.
If $SOURCE is supposed to be able to execute $TARGET_PATH, this could be a labeling problem. Most confined domains are allowed to execute files labeled bin_t. So you could change the labeling on this file to bin_t and retry the application. If this $SOURCE is not supposed to execute $TARGET_PATH, this could signal a intrusion attempt.
sÜ
If you want to allow $SOURCE to execute $TARGET_PATH:
chcon -t bin_t '$TARGET_PATH'
If this fix works, please update the file context on disk, with the following command:
semanage fcontext -a -t bin_t '$TARGET_PATH'
Please specify the full path to the executable, Please file a <a
href="http://bugzilla.redhat.com/bugzilla/enter_bug.cgi">bug
report</a> against this selinux-policy to make sure this becomes the default labeling.
t c C s! t i | t | i d d S( Ni<